Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe
Resource
win10v2004-20221111-en
General
-
Target
c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe
-
Size
208KB
-
MD5
7b3813454300d27588703ead9b7c63a1
-
SHA1
7d91526941954ffc94ae8bea2fe2d368f99e7df8
-
SHA256
c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e
-
SHA512
f1d3e7a7c223a8bf457713f52f70f7f28d1a96cd896338ac75cf6b2308b616f817b6d3d7faa4ba2674abbf4b1a624ed825c893691440d52322d68feeb1f9e961
-
SSDEEP
3072:F+hYT3zFqCtUzuq332x33333333333333333333333333333333333333333333S:l3ML1NKwiEhht7+iaERRGBD6Jp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4936 Hvqjqq.exe 4240 Hvqjqq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Hvqjqq = "C:\\Users\\Admin\\AppData\\Roaming\\Hvqjqq.exe" c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3164 set thread context of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 4936 set thread context of 4240 4936 Hvqjqq.exe 85 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F83EAA07-787A-11ED-BF5F-E2CDD1D11107} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4764 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 4764 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4240 Hvqjqq.exe Token: SeDebugPrivilege 940 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1912 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 4420 IEXPLORE.EXE 4420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 3164 wrote to memory of 4764 3164 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 83 PID 4764 wrote to memory of 4936 4764 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 84 PID 4764 wrote to memory of 4936 4764 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 84 PID 4764 wrote to memory of 4936 4764 c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe 84 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4936 wrote to memory of 4240 4936 Hvqjqq.exe 85 PID 4240 wrote to memory of 940 4240 Hvqjqq.exe 86 PID 4240 wrote to memory of 940 4240 Hvqjqq.exe 86 PID 4240 wrote to memory of 940 4240 Hvqjqq.exe 86 PID 4240 wrote to memory of 940 4240 Hvqjqq.exe 86 PID 4240 wrote to memory of 940 4240 Hvqjqq.exe 86 PID 940 wrote to memory of 1912 940 iexplore.exe 88 PID 940 wrote to memory of 1912 940 iexplore.exe 88 PID 940 wrote to memory of 1912 940 iexplore.exe 88 PID 1912 wrote to memory of 4420 1912 IEXPLORE.EXE 89 PID 1912 wrote to memory of 4420 1912 IEXPLORE.EXE 89 PID 1912 wrote to memory of 4420 1912 IEXPLORE.EXE 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe"C:\Users\Admin\AppData\Local\Temp\c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe"C:\Users\Admin\AppData\Local\Temp\c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Roaming\Hvqjqq.exe"C:\Users\Admin\AppData\Roaming\Hvqjqq.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Roaming\Hvqjqq.exe"C:\Users\Admin\AppData\Roaming\Hvqjqq.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:17410 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4420
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD57b3813454300d27588703ead9b7c63a1
SHA17d91526941954ffc94ae8bea2fe2d368f99e7df8
SHA256c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e
SHA512f1d3e7a7c223a8bf457713f52f70f7f28d1a96cd896338ac75cf6b2308b616f817b6d3d7faa4ba2674abbf4b1a624ed825c893691440d52322d68feeb1f9e961
-
Filesize
208KB
MD57b3813454300d27588703ead9b7c63a1
SHA17d91526941954ffc94ae8bea2fe2d368f99e7df8
SHA256c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e
SHA512f1d3e7a7c223a8bf457713f52f70f7f28d1a96cd896338ac75cf6b2308b616f817b6d3d7faa4ba2674abbf4b1a624ed825c893691440d52322d68feeb1f9e961
-
Filesize
208KB
MD57b3813454300d27588703ead9b7c63a1
SHA17d91526941954ffc94ae8bea2fe2d368f99e7df8
SHA256c9ebc9aea9c0037a65e81971a9cd4df84b190ed1edbee680bf7f0c650fe8f08e
SHA512f1d3e7a7c223a8bf457713f52f70f7f28d1a96cd896338ac75cf6b2308b616f817b6d3d7faa4ba2674abbf4b1a624ed825c893691440d52322d68feeb1f9e961