Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
0cd30e2262762b165f137ce1260ad06d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cd30e2262762b165f137ce1260ad06d.exe
Resource
win10v2004-20231215-en
General
-
Target
0cd30e2262762b165f137ce1260ad06d.exe
-
Size
141KB
-
MD5
0cd30e2262762b165f137ce1260ad06d
-
SHA1
67e58987648c09fb34a671ca5fbdeda3c66f259a
-
SHA256
bdc7413cd2d2030fea4283747bd223ad083cd038e52d80d9c407ad9eb62a3ffd
-
SHA512
7cad7883eafa89107c90871cbb453e064ca96f2892e3aef615f6a2c9024dc663a71b88b9f4b8d01e0485b89f6843a8ef59a3af144b235a36923cc4a6b437e726
-
SSDEEP
3072:yeTm+CNY4t+DXMf1zeO3hubUEhqau/+58joUBtB0UD301gff6:yv+/D8JJjEh8/BjLj1fff
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\mplayer2.exe" 0cd30e2262762b165f137ce1260ad06d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409836118" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8D678D1-A4A5-11EE-9B34-6E556AB52A45} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 0cd30e2262762b165f137ce1260ad06d.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000007d464258abca02558db53484d2a32fb6ee72c0e6005499619d37e68df9133c29000000000e80000000020000200000004a310d3c74c2f35af9876cecfd1a994df53d1b5c8cdbf5d98fbf408366bf883a200000009922c06b56bf7ce1c549d1e61c45c3cff3d0b5773a5c060806b2dbf981287cb0400000009db2ba83f6a780e27635abdaf2a4b5f33bdfdb22957eef802aac14689a10da399c649bc5505d935df28255487bdd562a39eb9614b3ff269ec8fb1996bc51abec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d94fa1b238da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Download 0cd30e2262762b165f137ce1260ad06d.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 0cd30e2262762b165f137ce1260ad06d.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2720 0cd30e2262762b165f137ce1260ad06d.exe 2600 iexplore.exe 2600 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2600 2720 0cd30e2262762b165f137ce1260ad06d.exe 29 PID 2720 wrote to memory of 2600 2720 0cd30e2262762b165f137ce1260ad06d.exe 29 PID 2720 wrote to memory of 2600 2720 0cd30e2262762b165f137ce1260ad06d.exe 29 PID 2720 wrote to memory of 2600 2720 0cd30e2262762b165f137ce1260ad06d.exe 29 PID 2600 wrote to memory of 2596 2600 iexplore.exe 31 PID 2600 wrote to memory of 2596 2600 iexplore.exe 31 PID 2600 wrote to memory of 2596 2600 iexplore.exe 31 PID 2600 wrote to memory of 2596 2600 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cd30e2262762b165f137ce1260ad06d.exe"C:\Users\Admin\AppData\Local\Temp\0cd30e2262762b165f137ce1260ad06d.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=vsd3g0h_vs02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559e9044561541c991db310596f3f844
SHA1697effbad50f0ae44646cc68422194246d67d02f
SHA2560cda469fe81e8e3f7ca1985d28d9e50439258c7b75de1d89c470f1c5fbefbaeb
SHA51236dbbf4f65cf8295c7d3c37280885dc106c848a931d29e4b59d5dddd799c2350c1df2f788e00d7a1aa4c6572271a078090402cd1dd93dcc109a8fd83299ec29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558da832452cb19535e1d643bf653b2ec
SHA17e022806d41414c48dd05c566e13b322149c11d3
SHA256c1edc6800d82bffd5f2e69d13a05ea78b196a28ab55fddb2ef9d8ba051347ce1
SHA512a23860a110c35e039203a4579aedd641c847982a1ea64bdf129b58571eeceb09d886b09bfe85631cc3790e382fbcaa6c57736dfdb3d15a661f74564f667a9aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836f863063ce89a65f38414868a1d78f
SHA1b4512de4c9c57262323af6ea7e5cea100f3958ca
SHA256b14ce188a4dfd966fc8795199cbe34278ae5307698d404aa24e67b60185d91c0
SHA51213159526e6c0a37035d1d648ce29440985fa1aa5348d97e1fd8f7bfee2c45a78502d8c3c9c770c4a7b364daae1c8b8415bc3a0366f6f7a914c7bad88098be38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4057c2fe9b2c075d22ba7dfdab897a8
SHA18f130d491e92167b3380845d0cd762a81700c233
SHA256173ff76f4f42631eeb29f9dca4eeec54f18cf936a7c7f30c11d6ec466efea1c5
SHA512b05722771d51635e949c43c7b7faf1e2944a32d3a2b44b720a2fa1db8150f55bdd4940ed7da971711bca46af85ee13c54abfab06b27e06f4000340c7e281c737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5791d1c5a308257a7cd7bc3ba54b5315a
SHA13f574507e2013695df1a4640dc21d447567c9872
SHA2560556f42e091e2d8e0ce5085830b4de6dedaf17b40a33f0f78dd685e22b80a472
SHA512d4425b502a2f6c7f66145069fa3ed5e6ed3ae36dbcb48e5d425bb36765caefe08a9317ca5c1def02c13bfef0e32031b7767fa270d1bf37667eb8950c74f31c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57da372143e78fe681e574b4fba4c3ebd
SHA1a0b19ca993f4be8f77f1d56801ef4c4785548c58
SHA256a900820cc1e2cfe23644ddd29810bbc9d02ee5b51a7822d48203003431e0a8a5
SHA512b4d54f6bdccdac5b5e9a36ab495b518952b656be97fd3fd1733361a02d02b629b0a6e2d85f73ff6ff0ba16fb81511360063cb16530ebdd10b644b278ffd3104e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f30b589a2efd202c83f9b9f155830b9
SHA1b37d4cbd2053278033a9d5aa76b86b66b0022118
SHA2568ae411a8341e9f01b75e2a60234153d2d367c7b6a4da56509fca33b33abf4c8a
SHA51241a00fe356947abda186fcf6382018e41eb75d0597c99784929e3f8309448ca5c15e9a03e9105a1e894ba026705b598d853159ca7f8c7d2236a882e655929ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175fc6cbba610faa1fd3526896df44d4
SHA1bc3b667b35596091011892213795cbb5de09bbf4
SHA256b479928a3c6374b381add988611570bd845be172c56cbe7f2455abb5b2d09687
SHA512b4f9c4650979345ca39ac9a46c4e772c66c2ce61b912b95ad770de79e9dd32e9dff97c33425ec0c39be6c300122ea2d455f0ad655d805dafe9fe234e1c79c89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ba2ff2dfbe0f002d4b061923bbc2bb
SHA188020fb0e9ee7ff14d6f94a2f4693fd3f11414d6
SHA2563231b9d9091440a5c1bac42dbe935f9fe6cd4fc02ac3bad403bc612a2f8879fd
SHA512f26c522a200edabb2c662806883fb34293f0755475967a6289592adc80d2bde8926bb643833e469b2d98c37c25d66a1f77df5d1553ead3f852320882c98cef5c
-
Filesize
1KB
MD58c61e8f9493d34392cd2a9ad95f45a10
SHA179d1a46207dc52adf7a1a539bd770cb7a3319912
SHA256cd530d516168c783f0bdedeb15a9c58c4c60940ce1ea3516b032d6d14882c1c5
SHA51263ad0d4177ea6db5f6b30f8a74c60f086e8ce5648e84fd42ead83a39c643f4dc034aef6a603a3026d4a9c5f699d233bccd4cbac552a8ccd6a3d1d50eedda0006
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YT4IJQ91\favicon[1].ico
Filesize1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06