Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
088ba4935a7c50f16e59f234baa6739d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
088ba4935a7c50f16e59f234baa6739d.exe
Resource
win10v2004-20231215-en
General
-
Target
088ba4935a7c50f16e59f234baa6739d.exe
-
Size
57KB
-
MD5
088ba4935a7c50f16e59f234baa6739d
-
SHA1
ebdbc0ba82c0d8e0e34fa898aab949605ccd72a0
-
SHA256
ae0e2c384d44212273a9beb87db8892eaefea61e89bab6671d67161e2bd495b2
-
SHA512
2a2a6c82da6261b5d0981b49827755ec70c96095eaeef2d8ac2357086d1fca2dffc6f5941a6726603ff2c49bb2aeabea6b9c4cb413f17dfee1267d8d74bc5a79
-
SSDEEP
1536:6qF+qJB0ODqnmmmcLLWBPkUZ9vAbOu/Ys5MpmMe4s:RF5J2OGnmmJLtogOu+mMLs
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1628 attrib.exe 2976 attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1628 attrib.exe 2976 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\088ba4935a7c50f16e59f234baa6739d.exe"C:\Users\Admin\AppData\Local\Temp\088ba4935a7c50f16e59f234baa6739d.exe"1⤵PID:2356
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kage2011_check.bat" "2⤵PID:2608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\1.bat3⤵PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\088BA4~1.EXE > nul2⤵PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\inl8B51.tmpC:\Users\Admin\AppData\Local\Temp\inl8B51.tmp2⤵PID:612
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl8B51.tmp > nul3⤵PID:2628
-
-
-
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?716281⤵PID:2484
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵PID:968
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?i"" /f1⤵PID:1384
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\tmp" /v "key" /d ""http://www.71628.com/?i"" /f1⤵PID:1828
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1628
-
C:\Windows\SysWOW64\rundll32.exerundll32 D:\VolumeDH\inj.dat,MainLoad1⤵PID:1988
-
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r1⤵PID:1104
-
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o2⤵PID:2300
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\2.inf1⤵PID:1544
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2976
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\PPLive\3.bat""" /f1⤵PID:320
-
C:\Windows\SysWOW64\reg.exereg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f1⤵PID:1684
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?i"" /f1⤵PID:2800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\2.bat1⤵PID:2320
-
C:\Windows\SysWOW64\rundll32.exerundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\1.inf1⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5492b30a1d12652f681a78f056ef33fd5
SHA1351d2a1e3f1fb5d74b4de1a619cbd65e3a0777f3
SHA256a9556c97b2c85a5decd9dd9cf7493f2c820bf9787fe57651afb16d73de085287
SHA512f24d957dd2e10564f24a87c79ff7d80336ccc14fa1ddb0ae434425b1c8cc4b4dd88ac69ef013155a61cae965dc98a9f640bc471b9708e5cd76c2885320e06faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD542a52be4120462075f2c053a54573f05
SHA12418b45fa738936c56d0bae0b83066e66f0f3417
SHA25605f3499eef1ed187f5391ceb084d4683318632f7944010a09c0a973f672ea2d2
SHA512cc6f66434abb098ce0ffbe0c48cbd700f586fb7e954c19f103e5713ed95574162e5902d4ce8a2dd33077d9eef4f8769a1e1233798667257d009e31d628f871e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06