Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
12/11/2023, 09:11
Behavioral task
behavioral1
Sample
d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe
Resource
win7-20231025-en
General
-
Target
d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe
-
Size
1.3MB
-
MD5
e6ff6956aa4c690633fb48830d418b23
-
SHA1
f0511abedcbaefd119c478378d5b74ff806323d4
-
SHA256
d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31
-
SHA512
79e1f2dfa751c91c9389833aec2f883d9244bc0676b97aaf69ba5a4a4cd76f92906bff99dc0934008ad6fc5369d788278c7d280462f3fdb3eb72478c44597f71
-
SSDEEP
24576:Qak/7Nk4RZlljiKZu0zoFmDcpii9iGn+66rLfJIgtEqPILWz8oDqE:Qak/bljLZu+k0WdEacJRIo+E
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\O: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\Q: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\X: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\Z: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\B: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\G: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\H: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\L: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\M: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\U: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\V: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\A: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\E: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\K: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\P: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\R: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\T: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\I: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\N: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\S: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\W: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe File opened (read-only) \??\Y: d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e71718400000000020000000000106600000001000020000000255579c91efe30873f782defdaafe4de31cecea1de1cfeedbcc712e69d391754000000000e8000000002000020000000b9ec0dd34fd8e372c25e27f7221176f900383acbc003f41584cf7467290dd27b20000000559f2ccd55eb7173d79ed4f15c3fed82c89ed21773f02f00aa5371c04bec90d34000000051003a26fa41f8c13d46a40729995f4dbe90e7d5552519cd0bf2f70e022c8c8466c13073ab227bfa9b125a4524be9d3841c965f4e0e16d84dff3f6cdd7f3b9ca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307ba36d4815da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F0D9451-813B-11EE-9CF6-F25AE810FCAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405942170" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e717184000000000200000000001066000000010000200000000d0c292a6ea0dcec568a3589636ece5bd538fb72421952a6ad6a4d18368f17a8000000000e8000000002000020000000b27ef876702faebfb103f8fe6c9f4b91ac5f164601cb1d9ebc26b2f96b349c9790000000870da3e559a51871bad35dd29a2212e1d1636755c9a74b04391396b9ace1a6829ba5ade842e3a308faf1adec04c15dc5188aba48107f276bd1bf3b51e46d97226a58dcb5658341d5cf86c5ad4affd944731ff6b6743406951a119bd813241a625befcd77743f338ffafc9bbf900b882e184a1c73de02b3cfdd84c4c76d165a2d401555827f7705008f76d58aede5e0bb4000000032e7ed758cf687e1ca4cf6b120ee3e0cf29cdecb56a092ec62e836aea61cda2ddefdc6a725d4a464afc962dd11d69ae35fff803fe8dd5bed1ad21a8f6a61488c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1804 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe Token: SeDebugPrivilege 1804 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe Token: SeDebugPrivilege 2340 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe Token: SeDebugPrivilege 2340 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2616 iexplore.exe 2616 iexplore.exe 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2340 1804 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe 28 PID 1804 wrote to memory of 2340 1804 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe 28 PID 1804 wrote to memory of 2340 1804 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe 28 PID 1804 wrote to memory of 2340 1804 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe 28 PID 2340 wrote to memory of 2616 2340 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe 30 PID 2340 wrote to memory of 2616 2340 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe 30 PID 2340 wrote to memory of 2616 2340 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe 30 PID 2340 wrote to memory of 2616 2340 d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe 30 PID 2616 wrote to memory of 1388 2616 iexplore.exe 31 PID 2616 wrote to memory of 1388 2616 iexplore.exe 31 PID 2616 wrote to memory of 1388 2616 iexplore.exe 31 PID 2616 wrote to memory of 1388 2616 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe"C:\Users\Admin\AppData\Local\Temp\d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe"C:\Users\Admin\AppData\Local\Temp\d4893fb3b267c9398acd4ce44933b24f815d008f5b41392b08f485bbe0642e31.exe" Master2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a08d5751841a815e8b7bb2c484fce3d5
SHA1041e0f49c1beddcc7d87cf2c3919741c81dd20b6
SHA25699a34ed278786a18fd30b1249ad4561c94d4e51bb9115749f7580c06be0a260a
SHA51221c484ab8bc39c64bbc950950116e1305f0c9af198545950d904f82c8607d036243cea365bf40cf5eb0bfe91a46b1603be35927acff3cdde355f47b2ad8da302
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf