Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe
Resource
win10v2004-20221111-en
General
-
Target
78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe
-
Size
171KB
-
MD5
f4bb3032518e961b52fe8ec748d52b57
-
SHA1
36013cceefabb5bd1b3b874ff814a799bd6af612
-
SHA256
78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972
-
SHA512
ac600141b8b0eeb8dc7f30e394bb317896d806ce426500e696791ac886f7dde43b1d78c430b81fcb84eaaf64bbd8d1533e7e64f77839940d3519ac055fe16ad0
-
SSDEEP
3072:6F9dhYmj7zb6Vx9OunUxPR8+rv2bVJWZuAxIkgV7DsNq5Mo:k/uS7zbKUVibVJWZuAxIkwDsNR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1176 IEXPLORE.EXE -
Loads dropped DLL 5 IoCs
pid Process 956 rundll32.exe 956 rundll32.exe 956 rundll32.exe 956 rundll32.exe 1176 IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AAFC93A1-7803-11ED-B4BC-4A12BD72B3C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 956 rundll32.exe 1640 iexplore.exe 1640 iexplore.exe 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 956 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1776 wrote to memory of 956 1776 78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe 27 PID 1776 wrote to memory of 956 1776 78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe 27 PID 1776 wrote to memory of 956 1776 78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe 27 PID 1776 wrote to memory of 956 1776 78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe 27 PID 1776 wrote to memory of 956 1776 78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe 27 PID 1776 wrote to memory of 956 1776 78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe 27 PID 1776 wrote to memory of 956 1776 78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe 27 PID 1640 wrote to memory of 1512 1640 iexplore.exe 30 PID 1640 wrote to memory of 1512 1640 iexplore.exe 30 PID 1640 wrote to memory of 1512 1640 iexplore.exe 30 PID 1640 wrote to memory of 1512 1640 iexplore.exe 30 PID 1640 wrote to memory of 1176 1640 iexplore.exe 31 PID 1640 wrote to memory of 1176 1640 iexplore.exe 31 PID 1640 wrote to memory of 1176 1640 iexplore.exe 31 PID 1640 wrote to memory of 1176 1640 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe"C:\Users\Admin\AppData\Local\Temp\78ce50361ad70e8824af59de0cb9deaf0d749091420a268f70d778b22db6e972.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\vcmsoc.dll",ReplaceChars2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:956
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275461 /prefetch:22⤵
- Deletes itself
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1176
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD5dd2bb3298a47e030f947fa35c05b53e3
SHA1ae5f477b486588507663dea9e64ca7197c16dd12
SHA2569aed3ca3c9e81020db98c056db2fce934b13871a735458469f514cb5644c45c2
SHA512ef29e2294204de92b38272ab307dc1db486b67ead8f0131c3531cdaac7b9f9c08a418a7e19c7d76a8aba2bb7d1c7cd38ce2961dba6d129148b1fd8cf441c02b8
-
Filesize
171KB
MD5dd2bb3298a47e030f947fa35c05b53e3
SHA1ae5f477b486588507663dea9e64ca7197c16dd12
SHA2569aed3ca3c9e81020db98c056db2fce934b13871a735458469f514cb5644c45c2
SHA512ef29e2294204de92b38272ab307dc1db486b67ead8f0131c3531cdaac7b9f9c08a418a7e19c7d76a8aba2bb7d1c7cd38ce2961dba6d129148b1fd8cf441c02b8
-
Filesize
171KB
MD5dd2bb3298a47e030f947fa35c05b53e3
SHA1ae5f477b486588507663dea9e64ca7197c16dd12
SHA2569aed3ca3c9e81020db98c056db2fce934b13871a735458469f514cb5644c45c2
SHA512ef29e2294204de92b38272ab307dc1db486b67ead8f0131c3531cdaac7b9f9c08a418a7e19c7d76a8aba2bb7d1c7cd38ce2961dba6d129148b1fd8cf441c02b8
-
Filesize
171KB
MD5dd2bb3298a47e030f947fa35c05b53e3
SHA1ae5f477b486588507663dea9e64ca7197c16dd12
SHA2569aed3ca3c9e81020db98c056db2fce934b13871a735458469f514cb5644c45c2
SHA512ef29e2294204de92b38272ab307dc1db486b67ead8f0131c3531cdaac7b9f9c08a418a7e19c7d76a8aba2bb7d1c7cd38ce2961dba6d129148b1fd8cf441c02b8
-
Filesize
171KB
MD5dd2bb3298a47e030f947fa35c05b53e3
SHA1ae5f477b486588507663dea9e64ca7197c16dd12
SHA2569aed3ca3c9e81020db98c056db2fce934b13871a735458469f514cb5644c45c2
SHA512ef29e2294204de92b38272ab307dc1db486b67ead8f0131c3531cdaac7b9f9c08a418a7e19c7d76a8aba2bb7d1c7cd38ce2961dba6d129148b1fd8cf441c02b8
-
Filesize
171KB
MD5dd2bb3298a47e030f947fa35c05b53e3
SHA1ae5f477b486588507663dea9e64ca7197c16dd12
SHA2569aed3ca3c9e81020db98c056db2fce934b13871a735458469f514cb5644c45c2
SHA512ef29e2294204de92b38272ab307dc1db486b67ead8f0131c3531cdaac7b9f9c08a418a7e19c7d76a8aba2bb7d1c7cd38ce2961dba6d129148b1fd8cf441c02b8