Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17/12/2022, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
138ddc03dc3ec84727bd1b5c3374d325e373971980e288ecf28366363c83a71d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
138ddc03dc3ec84727bd1b5c3374d325e373971980e288ecf28366363c83a71d.dll
Resource
win10v2004-20220812-en
General
-
Target
138ddc03dc3ec84727bd1b5c3374d325e373971980e288ecf28366363c83a71d.dll
-
Size
2.0MB
-
MD5
bba24aab3e1746f6de73404a1377d8ec
-
SHA1
d4afbf943b3ede26d2a862d6f71fcde7eb5fc7a9
-
SHA256
138ddc03dc3ec84727bd1b5c3374d325e373971980e288ecf28366363c83a71d
-
SHA512
e26f7f5d84261ace5e728f7c418046be22be70b0713a48aa8f42942cdc374d681a560115031a1dad67e1bfafdcf422eb64a333f7ba91d9f87b59346d11db2f46
-
SSDEEP
49152:4ImzpJJeD1EIDR3WmuDadUuNi/SOmvVfCvG1GyY3:dmzlebmbDadUnKOmcT
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1584 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1584 rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19B6FA91-7E46-11ED-BB94-5A21EB137514} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b8bdf55212d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378072482" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f65fe6def735dd4395619f3a9b29b2a700000000020000000000106600000001000020000000378f336ed13de49d08de062f80d34fe5b63f73b8a0f0b3a3b3315c684b917ca1000000000e800000000200002000000043afbf4ac5289a0cbacbb96b9bbc7ea07a15df61b8e658e7f9236c24b9af253c200000008dabb0d031c562f8eda67e9931df4e923fe19af2af02a65c37b1e875f8ef290e400000002cc37110bab7bfa60bbeeed5203df7cbe5d131565864bd294faa532a79491a680bef408067ec9b944b2e1563e8ee77c9b4ea2e9ffacba78e77cae49b9fd280ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 1584 rundll32.exe Token: SeDebugPrivilege 1584 rundll32.exe Token: SeIncreaseQuotaPrivilege 1824 wmic.exe Token: SeSecurityPrivilege 1824 wmic.exe Token: SeTakeOwnershipPrivilege 1824 wmic.exe Token: SeLoadDriverPrivilege 1824 wmic.exe Token: SeSystemProfilePrivilege 1824 wmic.exe Token: SeSystemtimePrivilege 1824 wmic.exe Token: SeProfSingleProcessPrivilege 1824 wmic.exe Token: SeIncBasePriorityPrivilege 1824 wmic.exe Token: SeCreatePagefilePrivilege 1824 wmic.exe Token: SeBackupPrivilege 1824 wmic.exe Token: SeRestorePrivilege 1824 wmic.exe Token: SeShutdownPrivilege 1824 wmic.exe Token: SeDebugPrivilege 1824 wmic.exe Token: SeSystemEnvironmentPrivilege 1824 wmic.exe Token: SeRemoteShutdownPrivilege 1824 wmic.exe Token: SeUndockPrivilege 1824 wmic.exe Token: SeManageVolumePrivilege 1824 wmic.exe Token: 33 1824 wmic.exe Token: 34 1824 wmic.exe Token: 35 1824 wmic.exe Token: SeIncreaseQuotaPrivilege 1824 wmic.exe Token: SeSecurityPrivilege 1824 wmic.exe Token: SeTakeOwnershipPrivilege 1824 wmic.exe Token: SeLoadDriverPrivilege 1824 wmic.exe Token: SeSystemProfilePrivilege 1824 wmic.exe Token: SeSystemtimePrivilege 1824 wmic.exe Token: SeProfSingleProcessPrivilege 1824 wmic.exe Token: SeIncBasePriorityPrivilege 1824 wmic.exe Token: SeCreatePagefilePrivilege 1824 wmic.exe Token: SeBackupPrivilege 1824 wmic.exe Token: SeRestorePrivilege 1824 wmic.exe Token: SeShutdownPrivilege 1824 wmic.exe Token: SeDebugPrivilege 1824 wmic.exe Token: SeSystemEnvironmentPrivilege 1824 wmic.exe Token: SeRemoteShutdownPrivilege 1824 wmic.exe Token: SeUndockPrivilege 1824 wmic.exe Token: SeManageVolumePrivilege 1824 wmic.exe Token: 33 1824 wmic.exe Token: 34 1824 wmic.exe Token: 35 1824 wmic.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1584 rundll32.exe 1056 iexplore.exe 1056 iexplore.exe 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 752 wrote to memory of 1584 752 rundll32.exe 28 PID 752 wrote to memory of 1584 752 rundll32.exe 28 PID 752 wrote to memory of 1584 752 rundll32.exe 28 PID 752 wrote to memory of 1584 752 rundll32.exe 28 PID 752 wrote to memory of 1584 752 rundll32.exe 28 PID 752 wrote to memory of 1584 752 rundll32.exe 28 PID 752 wrote to memory of 1584 752 rundll32.exe 28 PID 1584 wrote to memory of 1824 1584 rundll32.exe 29 PID 1584 wrote to memory of 1824 1584 rundll32.exe 29 PID 1584 wrote to memory of 1824 1584 rundll32.exe 29 PID 1584 wrote to memory of 1824 1584 rundll32.exe 29 PID 1584 wrote to memory of 1056 1584 rundll32.exe 32 PID 1584 wrote to memory of 1056 1584 rundll32.exe 32 PID 1584 wrote to memory of 1056 1584 rundll32.exe 32 PID 1584 wrote to memory of 1056 1584 rundll32.exe 32 PID 1056 wrote to memory of 1516 1056 iexplore.exe 34 PID 1056 wrote to memory of 1516 1056 iexplore.exe 34 PID 1056 wrote to memory of 1516 1056 iexplore.exe 34 PID 1056 wrote to memory of 1516 1056 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\138ddc03dc3ec84727bd1b5c3374d325e373971980e288ecf28366363c83a71d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\138ddc03dc3ec84727bd1b5c3374d325e373971980e288ecf28366363c83a71d.dll,#12⤵
- Blocklisted process makes network request
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://6666.ys168.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD58d22bb6fa2563895710b9b8c57b9deb7
SHA1e363d5f8a4bb8580dc1cca171fd823f247ff6f89
SHA2561c3d063ab2a0362318bec0f82e1224a8ef8a97a507da6f1804c2e49e7ebef79d
SHA512d0e61519997b78a1804806e44e3c80c7306d2ac06706879c48252411fdc9384bc1380cb7e7adb1fc3b3c033529a96cd6508bda6651e07764694f5e71b465d3b9
-
Filesize
5KB
MD5d423c0399bc40d47a07802288e3b2935
SHA11229b0a48ed1283262671afbcd58a65caafd178b
SHA256db0e940c78213b671f37a17fd5812f4952105f8fefff964b8bf6d5ad2141b798
SHA5127ef89da6f34e06f553d70749d2e04776055f211b72d1f34d68138b1651cf5978d49cd0d1048e34be91f05db3e91c37546bd257225a02e90574dcccff54f2988c
-
Filesize
597B
MD514fb520b498fcecf64435876dd2b64b8
SHA1f722a8d57c0b768edefcc3bd7b301c0b238eedc1
SHA256ca72969675e2a7c32e4aff7d09ae1e13499a471b894c813e3d77bf5af1b31c11
SHA512758b126213d03b00842e379a181e3405bb23e63fe08c971206f512f8b1d1da36c7727946e542bd64e23064df0e3e2dcdc6022b1e316b4623178a64ad62376326