Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2023, 23:33
Static task
static1
General
-
Target
-
Size
14KB
-
MD5
19dbec50735b5f2a72d4199c4e184960
-
SHA1
6fed7732f7cb6f59743795b2ab154a3676f4c822
-
SHA256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
-
SHA512
aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
SSDEEP
192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C84F901-DD89-11ED-A19B-F2A4F945A9C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02168f89571d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a00000000020000000000106600000001000020000000fa6f43443a934e8bd90c382619281bc08ca340b4bcae83e0d0ef7d88a2ed74a0000000000e8000000002000020000000f6152c81130f14ae8142be2a4b399a61fad40b97bfcd6d6613000668497d96e820000000e9de33b172f7192dedae1ad9bc0b199a5929f5af45004f60bbeacf19b9c2dcda4000000034072ac591299b357dcbdbdbcfe532c56ac264de3940d3e93319f9f571d1dca24d03bc26b839facd593bb088500338a2f54c345c3267ef571d6400ac059338aa iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1960 [email protected] Token: SeShutdownPrivilege 976 [email protected] -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1160 iexplore.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
-
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1756 1744 [email protected] 28 PID 1744 wrote to memory of 1756 1744 [email protected] 28 PID 1744 wrote to memory of 1756 1744 [email protected] 28 PID 1744 wrote to memory of 1756 1744 [email protected] 28 PID 1744 wrote to memory of 1960 1744 [email protected] 29 PID 1744 wrote to memory of 1960 1744 [email protected] 29 PID 1744 wrote to memory of 1960 1744 [email protected] 29 PID 1744 wrote to memory of 1960 1744 [email protected] 29 PID 1744 wrote to memory of 976 1744 [email protected] 30 PID 1744 wrote to memory of 976 1744 [email protected] 30 PID 1744 wrote to memory of 976 1744 [email protected] 30 PID 1744 wrote to memory of 976 1744 [email protected] 30 PID 1744 wrote to memory of 1188 1744 [email protected] 31 PID 1744 wrote to memory of 1188 1744 [email protected] 31 PID 1744 wrote to memory of 1188 1744 [email protected] 31 PID 1744 wrote to memory of 1188 1744 [email protected] 31 PID 1744 wrote to memory of 672 1744 [email protected] 32 PID 1744 wrote to memory of 672 1744 [email protected] 32 PID 1744 wrote to memory of 672 1744 [email protected] 32 PID 1744 wrote to memory of 672 1744 [email protected] 32 PID 1744 wrote to memory of 984 1744 [email protected] 33 PID 1744 wrote to memory of 984 1744 [email protected] 33 PID 1744 wrote to memory of 984 1744 [email protected] 33 PID 1744 wrote to memory of 984 1744 [email protected] 33 PID 984 wrote to memory of 540 984 [email protected] 34 PID 984 wrote to memory of 540 984 [email protected] 34 PID 984 wrote to memory of 540 984 [email protected] 34 PID 984 wrote to memory of 540 984 [email protected] 34 PID 984 wrote to memory of 1160 984 [email protected] 35 PID 984 wrote to memory of 1160 984 [email protected] 35 PID 984 wrote to memory of 1160 984 [email protected] 35 PID 984 wrote to memory of 1160 984 [email protected] 35 PID 1160 wrote to memory of 816 1160 iexplore.exe 37 PID 1160 wrote to memory of 816 1160 iexplore.exe 37 PID 1160 wrote to memory of 816 1160 iexplore.exe 37 PID 1160 wrote to memory of 816 1160 iexplore.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]" /main2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://google.co.ck/search?q=how+to+download+memz3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1160 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:816
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78dcaacf4fa7916f9789a3e8b26fab1
SHA1562df6f8c684e96908444e458983d06d98c982ef
SHA2568d1e2cc4b61e6deed52cfe04a49226c9d7b8602ef5292fc3e8ef49e56d24c421
SHA5128322aa41e691ea768c7a6a8159f1d73ebc6bc6360b1270fdc6dbe6d0824078e32bf4d808d0417d1620dc37d1756cd7c752be193d6e3e7aaa99cd2d2a4bce2e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54682ebf782e326d31e3fb6e424805f69
SHA1795912744f6e4bd38a14e3361de9e6cb7387d915
SHA256900e447979741b3965a6054c343ffe82345ca31e1804b3155abf84f56236f2a4
SHA5127b3b61994297b090d2adc1c7ff64a063d784c7e9dab43536aaf8aff294d3b73be76b79c84d27f6131ce99d6d4848c2d6cd13bfe63250ff3b1d929e362a54c7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43c1abe57b0c53df766d6c72bccd2f0
SHA11d2ec971ca12bf91b8f539a470e2bdad080aa0b7
SHA256ece1bd97b37a33ca24bd26c29ba1dd8cc2ba3917b24ae7f208c7f51fb96163ac
SHA512cabb6af8a6f886a2da966bf8d1c22497e2490c1e6f9bc867ba8df08f9093a08605e4176b21ced3b0aba31b8046891b8a3903dca1a2f5cae5e2c47a21b666b86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4badae0d2edba6793aeb5d40061fb6
SHA15f978eb891f3e837553a54d7d9c206d9650e51a7
SHA2563c8348a5e4b3a230ad0d92fb44a9f4c1330691b9389fd557f13778c3bacc5187
SHA5127dce606a458d232397a0f68d6ff258f87f9ad2bea55a0d06ecc56520bd61a019b72e92d55698547e392e4d383a14c9d4a22da4cbbcaae3efb73984605f424d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c4aed34a80fc3f781269f7f5a95ad0
SHA168d2525aa779972f2c9fcd1d1e0468ca0367571f
SHA256897a2b38bc3c56eb1ac2145d56b25f9c45ffe91658cebd9dc8445425a62c89b2
SHA512b18334e524306571cc882d86e25f2ceac0de42cd3d60e0c57fc20669ceeff435f50ad76b5ef5d34c0c7048579698094e345c466938355db6862403af3a0bd7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f42ef8c3c4a506f25385d755f4fce11a
SHA1366c2128e1a7a2e83546d8c2c6f04cb0db5d9984
SHA25653b76ec25bcc41c22072f8d4a6eadc85e9c5a68252987d3fb5c28d2d66cbbe85
SHA512a62e037d3a904c73ca4d3a43264bdc6dcc8a55bc1691e198e28c3e5eeab30f683f2b8430f285c8a6d7129156216c605b3cf6d76531faf5680e98a1d795f3b49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9ad65a24a2673f7855e0e7537e9463
SHA12629c7075da960f653231cf8b454bf83b1ec43a6
SHA256dc97289c0c12b6e9eddaa6cb31237237c87a59a3873214ef4f831a7ece21b381
SHA512a9dbcbbe0b2c343e22f6f5201d2ac9b047b4a4fb3027deeaf5c0f4464eb3decbb92434c2ba7758953abe86b6c8a4519d891837453173326c6575f5c360d00782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff250ba24d1493aaac77d85d4def08a
SHA1fda8d390fd9a9ad6ce446f842f8160e6cd13d87f
SHA256f102b00f895460f8c8edd91671123e6cab3060b3291da7df00dc402ef2b5a5c6
SHA512b02e995ec7f7c01886af8b0b0f802d69ba24054329830247d415bd328205193962412b4cf4025ee58058b95b1a9aee200d7701213b420c323b6f59f227b7c1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e862580aecd5671c61c30e26704cc3a
SHA1543a07333f56d9e3635a62daf34b0355126d777c
SHA25639da587497e865aa674ac972a0aa87ac3bf033bda14a55bec5258f9dc97e7188
SHA512e3ca4d7dcd203d7f141ad6417598b700c5ef4d13607a965e41f7e877fc28517a5475d2a23f8134dd15c9b053c5031653413f8d0fe5d80735dff522f35afca52a
-
Filesize
9KB
MD5b2a5c370866f1127f946e446cb7c8080
SHA1a15be260088766d17c7f402348e9c306241d6142
SHA256459781971e6253f9d07cc7fd0824a829173c4b142fba1bb499d776bce565b09f
SHA5125218445f1bafa607d5c1feed992cd68295e16aee8bf80c6b4eb287ad92f6c00acf65f592641c4b27a967ae583dc9eb378717d9c1286cb8c9c70851840a73192a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NMXH1C0L\favicon[2].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
16KB
MD58241e309864d8317f6412a79f4aa04f0
SHA1432b19086ce79495f9d17605aca4c659963dc29c
SHA25662f13dfca97e89c23ea3282f190c33a58804c2e0bb7b6790385ee864fd05232c
SHA5129f75a63317ec030dc4be00579d340f5a9837e032813cf00e6f3538d50869faf8fead3fb3baec221d01408ec0215f1e5f432f11e753de1508f0a8fc965d1ac0e6
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf