Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
1a0936002281fc58559d27d659a22a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a0936002281fc58559d27d659a22a2d.exe
Resource
win10v2004-20231215-en
General
-
Target
1a0936002281fc58559d27d659a22a2d.exe
-
Size
109KB
-
MD5
1a0936002281fc58559d27d659a22a2d
-
SHA1
b07e453222d0e9495130627a07723e19c47deada
-
SHA256
e500256df42739711a7766aa026d48a54e368963052e847faf188b677001783e
-
SHA512
bcb4dcc270507714660ec502c79b8b8c3f5646b39a132089c121870c5c4cac46b5389b0510cc2fd8616f3c886468e5208bae36a49285654e423c11db7716d31e
-
SSDEEP
3072:fUgSUQetyhhEYUa767xmoa+ByriZJe7NUsTld424:fUghAjVelV9ZJEKs0J
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\1a0936002281fc58559d27d659a22a2d.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\1a0936002281fc58559d27d659a22a2d.exe\"" 1a0936002281fc58559d27d659a22a2d.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409718460" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D82407C1-A393-11EE-9695-6A53A263E8F2} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000d9c306591fc1913b634a20e5bf9a1a188169ebb8866a439060d07317bc9d98cd000000000e8000000002000020000000515ec732781507c96bbf06c65437ca0b485f8e9d41450eb9aa348d0aa8308e7b200000000996dd23eeed4c784628ab45e8617a6bfa1903230231263debf4bd3071ac3a3f400000001c1985fa582e29d707aa4266f92a39b5f7bcfcd9496f02655f1b29d83ec9dd7efacf8a91c9ae77527a7929c6278c4f087ac28e8c040dfd0c6113dd4157321774 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dd67b1a037da01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2868 2864 1a0936002281fc58559d27d659a22a2d.exe 28 PID 2864 wrote to memory of 2868 2864 1a0936002281fc58559d27d659a22a2d.exe 28 PID 2864 wrote to memory of 2868 2864 1a0936002281fc58559d27d659a22a2d.exe 28 PID 2864 wrote to memory of 2868 2864 1a0936002281fc58559d27d659a22a2d.exe 28 PID 2868 wrote to memory of 2420 2868 iexplore.exe 29 PID 2868 wrote to memory of 2420 2868 iexplore.exe 29 PID 2868 wrote to memory of 2420 2868 iexplore.exe 29 PID 2868 wrote to memory of 2420 2868 iexplore.exe 29 PID 2420 wrote to memory of 2768 2420 IEXPLORE.EXE 32 PID 2420 wrote to memory of 2768 2420 IEXPLORE.EXE 32 PID 2420 wrote to memory of 2768 2420 IEXPLORE.EXE 32 PID 2420 wrote to memory of 2768 2420 IEXPLORE.EXE 32 PID 2420 wrote to memory of 2316 2420 IEXPLORE.EXE 31 PID 2420 wrote to memory of 2316 2420 IEXPLORE.EXE 31 PID 2420 wrote to memory of 2316 2420 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a0936002281fc58559d27d659a22a2d.exe"C:\Users\Admin\AppData\Local\Temp\1a0936002281fc58559d27d659a22a2d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"http://www.yeerea.com"2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" "http://www.yeerea.com"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\ctfmon.exectfmon.exe4⤵PID:2316
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec7b7abcc185ce19fcfc5a7ced9a022f
SHA1abbe60f878f5c281ce4bd90d42e69dcb6d4e6981
SHA256aae0c60ad3837679236733d58cd95db202e5495cca26f059684d39f468e5bcb2
SHA512561ce97d0728a51d341545bc20ccb0d8492795d583a87184c3f4476b2de2ff874545e19806bb7e9faf20b05749368bc117aaaa7a1a50465b65a35c433a3bc8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1f70406bf3336bce5cedd530fe557e4
SHA1004c6ddd241c834a5468ec1fe60862d81ab01470
SHA256b37f2a7dd64ab0799840362a36ba5886316e3e81aa2f28f216bd755d2a1be769
SHA512559db22cfef109426be34cf6b5376275f47261cd75c4e48782c7d52f04600d2d0fbf26199d0fa41804c0db1960239e82733c1a790505cb581c1f081af62a7a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4479d8011cf577d70f4a53600683e7f
SHA1cbc9e003366e02799a52982cacf245261b06879b
SHA256503d889da808228f888916d9e597aa70539619f9709126d1451e2e5cbfadbf9f
SHA512f6d7aecb9978d047e556c8835cef877c8b8875e8f17654025ddeca2336b00cdde2301c939f3b903c935f447db201f7760ade9bf6b804656cd56c0643636e0f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d60aa468b081f910e6183fd59ada3e45
SHA1bc6c38c6782a2c4a9d2130165dcbd9b71bd4b254
SHA2569136ddf33425f7257207a597b5fb945e4c332ec1112d0b27768387a299947c37
SHA5123094a59b6351438a910cb74ea2845fb0efe9dbd6cfd0882a6013f22e8bb065bea1c847e9d61b4a070c1df8c8c8ec0632ec7d8e70c246a96a67067b996a690a0c