Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 06:21
Behavioral task
behavioral1
Sample
bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe
Resource
win10v2004-20220812-en
General
-
Target
bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe
-
Size
172KB
-
MD5
e2271fbc453b32701e301007420f837a
-
SHA1
89491dac9bbeb41bc8746b4cd898a72c475da4e8
-
SHA256
bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0
-
SHA512
3f21def3512ce3c1da5f7e03db81717cfc1a398ec95d195c07f01656456e3bdb629f45b0db0bc975e8cdf8d717e12255511f4f3f6b6aa03962c57bba46850750
-
SSDEEP
3072:MoNYnnW133uZ9nhx43Ccb1ij7Rfk1sEGga7zWTzHnXO+yK+:MoinqW9nhSScb1ij5REyWzXvyd
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/800-132-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/800-133-0x0000000000400000-0x0000000000474000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\54.exe bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2df712261f57142b49e6a12627e4a9a0000000002000000000010660000000100002000000055e712f1d0ea48dd89eb2c0f780e93a9cf9f9339de480927f228c913ddce0886000000000e800000000200002000000096400f0639ced824c7a52ce6e9fc71b83bff402053860acf1e429372f6c6029620000000984b4f75e3a98005c313a9882bb653830029d02999efde09b0a7d96d24ac79b340000000889702b6203262255ed629e5fbec495314e661f51e272b27610010cd670777766ddea7c5bec34742c250ec05c2c12043193ecfa4b581749c437703a1af927752 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001523" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3342884294" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001523" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3342884294" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309c6fcfb30bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001523" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07142cfb30bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F1B144B3-77A6-11ED-AECB-5203DB9D3E0F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377344421" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3378177613" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2df712261f57142b49e6a12627e4a9a000000000200000000001066000000010000200000006742452bd4fd4c95c40fdef83d737a5b13d57b09659ca10b8c6dda09f31e462b000000000e80000000020000200000006614208474382de7ca5566305af63a89ee16a6d164361fb4fff7552cb403bd89200000002df8f9fc794621216809f73ccc06dafd53b7cddbdea1d8df4afd41f2211cd0a640000000daf69b3ab28c1870aaa731e0b46872c494f062f7a71a1f3037ec4480d81f4a512efff0c9ee8b34fe1afef529c97bfe9e26a6c0305ef27b4ba1e87b422284eca4 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 iexplore.exe 2448 iexplore.exe 3524 IEXPLORE.EXE 3524 IEXPLORE.EXE 3524 IEXPLORE.EXE 3524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 800 wrote to memory of 2448 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 78 PID 800 wrote to memory of 2448 800 bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe 78 PID 2448 wrote to memory of 3524 2448 iexplore.exe 79 PID 2448 wrote to memory of 3524 2448 iexplore.exe 79 PID 2448 wrote to memory of 3524 2448 iexplore.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe"C:\Users\Admin\AppData\Local\Temp\bf8453f1c847da3fd4385b18d1561233fef215e05a8519207e88e14ea0d977a0.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.0750car.net.cn/cracksafe/tj/ctfmen.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3524
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a1e11b6a6713dfb445339ee9dd3eea8f
SHA1d6ac79e842ec2b94c5329ba195fa4f682c1ac742
SHA256975d6ab3671e7e0e88ffed6a7a637d5cd16ac633b28f41f2891f30a614c8ef34
SHA5121a4dacd68738bc81d3609082c899db1b5757887d191fee664a228df52f0af6db84ab6628ce52945c722e4ac8aeba856fdcf49fb177a6e4696430ceef7b83c052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5e5f609b9f4d4cce7a33b899707edbe72
SHA10bbbe63484bd7e3a9f16c69bc104a8efd6d41dda
SHA25695897d8bb29f78b3aeae0ec298b98d8a5856a551094d70e365f6c7f088443d16
SHA512686f048c08f78379b09455b64e807f0b8ab4458bd5dd53167adc5906c1f271de651fd81f88f8dec2485c0ab96710f80edce374f7ab54ea87ed88534864602e17