Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe
Resource
win10v2004-20220901-en
General
-
Target
c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe
-
Size
120KB
-
MD5
d4d4284a95570af5f7c2253238ff447f
-
SHA1
df0287f2c672950818cbe1776a0891b0db6907be
-
SHA256
c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67
-
SHA512
3f35e8f549f48cb7d6b7d2098991e3b535fa4ae4ee871c8fd14fc71e56a204ee00961b7535650f452c754b2a7799c2f486525e896945559e3e233a6fb89530b7
-
SSDEEP
3072:qRKTmmOdPwxisvT44eWue2N6+rI0//TlgKlpT7mnQQgCKn4:86I3044m8II0/LeyyVLV
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSINET.OCX c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe File opened for modification C:\Windows\SysWOW64\VSListview.ocx c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000489ffe8051de08fce16b5a0057930639bd0fed461689ed195e3ff0fe344e2416000000000e80000000020000200000005508b05c91cf5b336d58d7deb2da401300e0009d1dd520489a134b59122fee9820000000ab75c2b44db02c54a754eed7178aa6f6c2c170ef3ff7733ac621b047edc833c040000000944aa5ad502412840eaffdee2d48a1d0756b01d13bc01acd0a514b214c3115505ec5011a9ec72f213def116907c79acd87785a07958dd8075a90d42f9759d956 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2005ec10230dd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{208F6801-7916-11ED-B7FC-D2F8C2B78FDE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377502137" iexplore.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\InprocServer32\ = "MSINET.OCX" c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D05C3AD7-7EF1-4749-885E-A2006408FC13}}\InprocServer32 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D05C3AD7-7EF1-4749-885E-A2006408FC13}} c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D05C3AD7-7EF1-4749-885E-A2006408FC13}}\InprocServer32\ = "VSListview.ocx" c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\InprocServer32 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908} c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 960 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe 960 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe 960 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe 960 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe 1936 iexplore.exe 1936 iexplore.exe 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 960 wrote to memory of 1936 960 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe 28 PID 960 wrote to memory of 1936 960 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe 28 PID 960 wrote to memory of 1936 960 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe 28 PID 960 wrote to memory of 1936 960 c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe 28 PID 1936 wrote to memory of 1420 1936 iexplore.exe 30 PID 1936 wrote to memory of 1420 1936 iexplore.exe 30 PID 1936 wrote to memory of 1420 1936 iexplore.exe 30 PID 1936 wrote to memory of 1420 1936 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe"C:\Users\Admin\AppData\Local\Temp\c7c933ff2e182e3cdb1497f16d3de99831e8c8b63ad2e6912da9ece82edd0e67.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://bbs.hao73.cn/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD5bc16254e564492ac7e08ce1101b5b301
SHA12900775145ed78bc98cd09358a962d8da9b8300d
SHA256680f4c45915bcbf273be8c53b91d8fd5c5d310284d505a46291c77b5ffce6091
SHA512150dc5f8f9e6a110bcc12c2658546633767a478f179afc97715568c83e660d1b856e44e3bdf1394e14aad038b7eb039e8ec0d038cacad1e00d32556781ecb7e5