Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe
Resource
win10v2004-20221111-en
General
-
Target
cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe
-
Size
1.1MB
-
MD5
1ab84840a608d243cc351d8a3a40d2b6
-
SHA1
607b229d480589c21ba617121bfb4beb11c87d57
-
SHA256
cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354
-
SHA512
362c52a4e4f9c53e7aecc3c2f94adf15e6abeb1305464cd7ba6720f163d02af4534f5773292162c7c294e6179ee672601f47cd86f458207a95cde0ce98869dbf
-
SSDEEP
24576:b1dlZo5l+LyKX/8vL3t/2g576R54en9n0CDU/36hRcDRIJcw0lu/24Xow:b1dlZol+LlXOhU04aCY/3QaRIJcyuhw
Malware Config
Extracted
cybergate
2.6
morenaa
morenaa.no-ip.org:80
morenaa.no-ip.org:81
morenaa.no-ip.org:82
morenaa.no-ip.org:2000
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
ftp_password
ª÷Öº+Þ
-
ftp_port
21
-
ftp_server
ftp.webcindario.com
-
ftp_username
ftp_user
-
injected_process
explorer.exe
-
install_dir
windll32
-
install_file
win32.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\windll32\\win32.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\windll32\\win32.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe -
Executes dropped EXE 4 IoCs
pid Process 632 spy-net encryptado.exe 1472 iexplore.exe 1000 iexplore.exe 1836 win32.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Windows\\windll32\\win32.exe Restart" iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Windows\\windll32\\win32.exe" explorer.exe -
resource yara_rule behavioral1/memory/1472-64-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1472-66-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1472-67-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1472-72-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1472-73-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1472-77-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1472-80-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/1472-89-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/2008-94-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/2008-97-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1472-99-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral1/memory/1472-107-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/1000-112-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/1472-113-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1000-114-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/1000-118-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1552 cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe 632 spy-net encryptado.exe 1472 iexplore.exe 1000 iexplore.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\windll32\\win32.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\windll32\\win32.exe" iexplore.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 632 set thread context of 1472 632 spy-net encryptado.exe 27 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\windll32\win32.exe iexplore.exe File opened for modification C:\Windows\windll32\win32.exe iexplore.exe File opened for modification C:\Windows\windll32\win32.exe iexplore.exe File opened for modification C:\Windows\windll32\ iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1472 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1000 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1000 iexplore.exe Token: SeDebugPrivilege 1000 iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 320 DllHost.exe 1472 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 632 1552 cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe 26 PID 1552 wrote to memory of 632 1552 cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe 26 PID 1552 wrote to memory of 632 1552 cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe 26 PID 1552 wrote to memory of 632 1552 cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe 26 PID 632 wrote to memory of 1472 632 spy-net encryptado.exe 27 PID 632 wrote to memory of 1472 632 spy-net encryptado.exe 27 PID 632 wrote to memory of 1472 632 spy-net encryptado.exe 27 PID 632 wrote to memory of 1472 632 spy-net encryptado.exe 27 PID 632 wrote to memory of 1472 632 spy-net encryptado.exe 27 PID 632 wrote to memory of 1472 632 spy-net encryptado.exe 27 PID 632 wrote to memory of 1472 632 spy-net encryptado.exe 27 PID 632 wrote to memory of 1472 632 spy-net encryptado.exe 27 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13 PID 1472 wrote to memory of 1220 1472 iexplore.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe"C:\Users\Admin\AppData\Local\Temp\cc60c09fa463d4ad4a230dbd9f43652585e401b97fe017f21bf697f9b8305354.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Extracted\spy-net encryptado.exe"C:\Extracted\spy-net encryptado.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\AruEZbyzDsaXzh\iexplore.exeC:\Users\Admin\AppData\Local\Temp\AruEZbyzDsaXzh\iexplore.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Modifies Installed Components in the registry
PID:2008
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\AruEZbyzDsaXzh\iexplore.exe"C:\Users\Admin\AppData\Local\Temp\AruEZbyzDsaXzh\iexplore.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1000 -
C:\Windows\windll32\win32.exe"C:\Windows\windll32\win32.exe"6⤵
- Executes dropped EXE
PID:1836
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
747KB
MD5963c729465ac6ca040fcc036de87b496
SHA198650b0723976a5f7ac9dc9d54100537cd296cad
SHA2568ae9457ea0fbfd500e962e56fc964ab2460975c3c07dcd22e5c1fcd7dde98baf
SHA512a81bda3ce8a2823465eceac564183437b5f8df5ffc0bf33e6710ce5b801fec25a1347dabce88c190bfe8be87cffa71c96b55de664a5f93eee8e79519772c6819
-
Filesize
394KB
MD56fa7ade462e02f8527aafe65530f7873
SHA1b03a59b3613d37aba606411db8006053360ecbe1
SHA256b160d1795a5eb053b5e9cfe22697fa0292484dc35d7039fa91c4a2fa7a06ad35
SHA512c894c9a3f86a58e46a416214e11353f0dfbf978ebee308952ac3bc5c464021fe12c9f1d273e992e2531fd5a3959b5f9cc22f2f3bf337dbc3cf5e9936ec63bb34
-
Filesize
394KB
MD56fa7ade462e02f8527aafe65530f7873
SHA1b03a59b3613d37aba606411db8006053360ecbe1
SHA256b160d1795a5eb053b5e9cfe22697fa0292484dc35d7039fa91c4a2fa7a06ad35
SHA512c894c9a3f86a58e46a416214e11353f0dfbf978ebee308952ac3bc5c464021fe12c9f1d273e992e2531fd5a3959b5f9cc22f2f3bf337dbc3cf5e9936ec63bb34
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
229KB
MD534868c7036e0e186118fe2920dfb51b7
SHA19693604ab06646674a1dab490a18f8002bf8cafe
SHA25696e231c463ac07faa32e41ba324778b6892dc62811beac1bbea78062116c788a
SHA512025b58e8c06d9835f5772ff6e6ad1130c9bb9c29fe9795017bea536db0faa85ab3b05d4004329f89a10381e33d3484b114ff518bec64cfdf2ca73104f98e6b88
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
394KB
MD56fa7ade462e02f8527aafe65530f7873
SHA1b03a59b3613d37aba606411db8006053360ecbe1
SHA256b160d1795a5eb053b5e9cfe22697fa0292484dc35d7039fa91c4a2fa7a06ad35
SHA512c894c9a3f86a58e46a416214e11353f0dfbf978ebee308952ac3bc5c464021fe12c9f1d273e992e2531fd5a3959b5f9cc22f2f3bf337dbc3cf5e9936ec63bb34
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98