Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe
Resource
win10v2004-20220812-en
General
-
Target
afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe
-
Size
361KB
-
MD5
5cc8d64efd9cd603559d26c6f58bbb4a
-
SHA1
a4426b98175fa378ba7565d57c7444e154189da6
-
SHA256
afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481
-
SHA512
48b46e943315f831022f3f4b741291faec219b66d7858ee67f27112e414ce6adbd815a857287ca9cf28cd461fd1195edcae742ac45cfa913ee42674f22f330bd
-
SSDEEP
6144:EflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:EflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1832 rmaytsrmcbwvqpfa.exe 1148 CreateProcess.exe -
Loads dropped DLL 3 IoCs
pid Process 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1832 rmaytsrmcbwvqpfa.exe 1832 rmaytsrmcbwvqpfa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402f0e51630cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CEBB2A0-7856-11ED-99B1-EA25B6F29539} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008e803c396e445f49a5e4cf0e198799ed0000000002000000000010660000000100002000000005aa812317fa7303f811d8d1294103c927661691e2f891cd321e9313e4bb8f6f000000000e8000000002000020000000bbad43fdf1b21d645929fdccfa4b901e6fb228ec871362730e680a955d27e88220000000b35b94364c5037908a4f84cf7f5d637907617903837864eb7e955b473bac45354000000072bb5f07d82b2809dd812d70fd690610c60d094008b190d8c85f859ae6eb1e8bb58fac397d0c998d29c4a4188907c455707c6c8397b92f1c8145c1bfe9500aed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1832 rmaytsrmcbwvqpfa.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1832 rmaytsrmcbwvqpfa.exe 1832 rmaytsrmcbwvqpfa.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1832 rmaytsrmcbwvqpfa.exe 1832 rmaytsrmcbwvqpfa.exe 1832 rmaytsrmcbwvqpfa.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1832 rmaytsrmcbwvqpfa.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1304 iexplore.exe 1304 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1832 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 27 PID 1688 wrote to memory of 1832 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 27 PID 1688 wrote to memory of 1832 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 27 PID 1688 wrote to memory of 1832 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 27 PID 1688 wrote to memory of 1304 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 28 PID 1688 wrote to memory of 1304 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 28 PID 1688 wrote to memory of 1304 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 28 PID 1688 wrote to memory of 1304 1688 afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe 28 PID 1304 wrote to memory of 1716 1304 iexplore.exe 30 PID 1304 wrote to memory of 1716 1304 iexplore.exe 30 PID 1304 wrote to memory of 1716 1304 iexplore.exe 30 PID 1304 wrote to memory of 1716 1304 iexplore.exe 30 PID 1832 wrote to memory of 1148 1832 rmaytsrmcbwvqpfa.exe 32 PID 1832 wrote to memory of 1148 1832 rmaytsrmcbwvqpfa.exe 32 PID 1832 wrote to memory of 1148 1832 rmaytsrmcbwvqpfa.exe 32 PID 1832 wrote to memory of 1148 1832 rmaytsrmcbwvqpfa.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe"C:\Users\Admin\AppData\Local\Temp\afe6ede4045fa6f48a536131f83658f48f647c3b23cfa1c679f45039bf032481.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Temp\rmaytsrmcbwvqpfa.exeC:\Temp\rmaytsrmcbwvqpfa.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\cyvrrnkgcu.exe ups_run3⤵
- Executes dropped EXE
PID:1148
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58e44bfaabbb06d37cfe02afad06f24b9
SHA196e7bff8daa140f3695c946469512582c36e8d1f
SHA256142b9abdd2a61b377d12cc72f8d9d7b9ab302e1d9c7c72cabdf81220ec7100e3
SHA512b1c02c9c8e1dc8a09c31eeeb679f137a4968d08a672b1aa61d4fa0e5861dccd2f6d14d75572da91f999a8266e4d4e41e5a3dac140f46c6db7622e4aae3e4d80e
-
Filesize
361KB
MD54cdb7127edecc50bfa272ef99e8b84d4
SHA11e688c009fd5b7dbe0b84430f971820e1603176e
SHA2563a8c6cd009f571f9cce5493231998dd3695fcaa5c861a43375b395f05d75045b
SHA5125a9d2877ab25c88b67e67160d82a414cb2c374baf05ee5331a28643902edf5591720feb10f379f6ce442b69e8f3a6ba7f08a484462deb8b3ff9b36e25234c866
-
Filesize
361KB
MD54cdb7127edecc50bfa272ef99e8b84d4
SHA11e688c009fd5b7dbe0b84430f971820e1603176e
SHA2563a8c6cd009f571f9cce5493231998dd3695fcaa5c861a43375b395f05d75045b
SHA5125a9d2877ab25c88b67e67160d82a414cb2c374baf05ee5331a28643902edf5591720feb10f379f6ce442b69e8f3a6ba7f08a484462deb8b3ff9b36e25234c866
-
Filesize
3KB
MD58e44bfaabbb06d37cfe02afad06f24b9
SHA196e7bff8daa140f3695c946469512582c36e8d1f
SHA256142b9abdd2a61b377d12cc72f8d9d7b9ab302e1d9c7c72cabdf81220ec7100e3
SHA512b1c02c9c8e1dc8a09c31eeeb679f137a4968d08a672b1aa61d4fa0e5861dccd2f6d14d75572da91f999a8266e4d4e41e5a3dac140f46c6db7622e4aae3e4d80e
-
Filesize
3KB
MD58e44bfaabbb06d37cfe02afad06f24b9
SHA196e7bff8daa140f3695c946469512582c36e8d1f
SHA256142b9abdd2a61b377d12cc72f8d9d7b9ab302e1d9c7c72cabdf81220ec7100e3
SHA512b1c02c9c8e1dc8a09c31eeeb679f137a4968d08a672b1aa61d4fa0e5861dccd2f6d14d75572da91f999a8266e4d4e41e5a3dac140f46c6db7622e4aae3e4d80e
-
Filesize
3KB
MD58e44bfaabbb06d37cfe02afad06f24b9
SHA196e7bff8daa140f3695c946469512582c36e8d1f
SHA256142b9abdd2a61b377d12cc72f8d9d7b9ab302e1d9c7c72cabdf81220ec7100e3
SHA512b1c02c9c8e1dc8a09c31eeeb679f137a4968d08a672b1aa61d4fa0e5861dccd2f6d14d75572da91f999a8266e4d4e41e5a3dac140f46c6db7622e4aae3e4d80e
-
Filesize
361KB
MD54cdb7127edecc50bfa272ef99e8b84d4
SHA11e688c009fd5b7dbe0b84430f971820e1603176e
SHA2563a8c6cd009f571f9cce5493231998dd3695fcaa5c861a43375b395f05d75045b
SHA5125a9d2877ab25c88b67e67160d82a414cb2c374baf05ee5331a28643902edf5591720feb10f379f6ce442b69e8f3a6ba7f08a484462deb8b3ff9b36e25234c866