Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
599efaa8ae4f37beda54f57b98b09da0.dll
Resource
win7-20231129-en
General
-
Target
599efaa8ae4f37beda54f57b98b09da0.dll
-
Size
456KB
-
MD5
599efaa8ae4f37beda54f57b98b09da0
-
SHA1
140022bf32af7d27896d8e85af3c42d49ae4b5da
-
SHA256
24b7d682b49cdce81fd7a6f9832a9c634ba2bd14fef7dd43ee92797d1def4f54
-
SHA512
aa70e5cbb83e79c75abe557dd57c6504969744f39398fb32089a0b61857c69bf46d983e4ada2ead80a2a6a1d7149431c3804a423e354cac0afaace92fa6ab2f3
-
SSDEEP
6144:J4TmSt9uNNtXlD2K0Hp/59dB9SzH2xLBzWjKEyS4X1OGTUX7x8A3u:xYQtXlD2N7SD2xF0BY1DTUX7x8A3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 696 Pdf4513 3628 Pdf4513 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 696 set thread context of 3628 696 Pdf4513 97 -
Program crash 2 IoCs
pid pid_target Process 3228 3752 WerFault.exe 2724 4980 WerFault.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EB56CD6C-AC31-11EE-8184-524326B4BB5C} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3218459894" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3218459894" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31080510" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31080510" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3628 Pdf4513 Token: SeDebugPrivilege 3628 Pdf4513 -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 3220 IEXPLORE.EXE 3220 IEXPLORE.EXE 3220 IEXPLORE.EXE 3220 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 232 IEXPLORE.EXE 232 IEXPLORE.EXE 232 IEXPLORE.EXE 232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1036 1996 rundll32.exe 88 PID 1996 wrote to memory of 1036 1996 rundll32.exe 88 PID 1996 wrote to memory of 1036 1996 rundll32.exe 88 PID 1036 wrote to memory of 696 1036 rundll32.exe 92 PID 1036 wrote to memory of 696 1036 rundll32.exe 92 PID 1036 wrote to memory of 696 1036 rundll32.exe 92 PID 696 wrote to memory of 3628 696 Pdf4513 97 PID 696 wrote to memory of 3628 696 Pdf4513 97 PID 696 wrote to memory of 3628 696 Pdf4513 97 PID 696 wrote to memory of 3628 696 Pdf4513 97 PID 696 wrote to memory of 3628 696 Pdf4513 97 PID 696 wrote to memory of 3628 696 Pdf4513 97 PID 696 wrote to memory of 3628 696 Pdf4513 97 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 3752 3628 Pdf4513 96 PID 3628 wrote to memory of 2500 3628 Pdf4513 105 PID 3628 wrote to memory of 2500 3628 Pdf4513 105 PID 3628 wrote to memory of 2500 3628 Pdf4513 105 PID 2500 wrote to memory of 2276 2500 iexplore.exe 106 PID 2500 wrote to memory of 2276 2500 iexplore.exe 106 PID 2276 wrote to memory of 3220 2276 IEXPLORE.EXE 107 PID 2276 wrote to memory of 3220 2276 IEXPLORE.EXE 107 PID 2276 wrote to memory of 3220 2276 IEXPLORE.EXE 107 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 4980 3628 Pdf4513 110 PID 3628 wrote to memory of 2768 3628 Pdf4513 114 PID 3628 wrote to memory of 2768 3628 Pdf4513 114 PID 3628 wrote to memory of 2768 3628 Pdf4513 114 PID 2768 wrote to memory of 3872 2768 iexplore.exe 113 PID 2768 wrote to memory of 3872 2768 iexplore.exe 113 PID 2276 wrote to memory of 232 2276 IEXPLORE.EXE 112 PID 2276 wrote to memory of 232 2276 IEXPLORE.EXE 112 PID 2276 wrote to memory of 232 2276 IEXPLORE.EXE 112
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\599efaa8ae4f37beda54f57b98b09da0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\599efaa8ae4f37beda54f57b98b09da0.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Pdf4513"Pdf4513"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\Pdf4513"C:\Users\Admin\AppData\Local\Temp\Pdf4513"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:17410 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3220
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:17416 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:232
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:4980
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\pqbvqbaajejohers.exe"C:\Users\Admin\AppData\Local\Temp\pqbvqbaajejohers.exe"5⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\pqbvqbaajejohers.exe"C:\Users\Admin\AppData\Local\Temp\pqbvqbaajejohers.exe"6⤵PID:4124
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3752 -ip 37521⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 841⤵
- Program crash
PID:3228
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe1⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 2081⤵
- Program crash
PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4980 -ip 49801⤵PID:548
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"1⤵
- Modifies Internet Explorer settings
PID:3872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
95KB
MD56fe3c6f9b2dc02cba4d1a5492a768bac
SHA1c858037abdcf7068cb2382e8281c7123b6ddd02b
SHA256138722e949348f67a43bc58e40dfc3669e9bac75cf8c6a609fbb5e2330aba5b2
SHA5126abb0e86fd721bf00b661c42304c9f317dee432db53f547d0b28d0518f2d5ae6c40ee78e42efdd23fcd6ba67bce85a29140b0aa57b5a4b7226425c6cfee0ea55
-
Filesize
100KB
MD5c43c51d12dab7d81aa13e6a16af1e6d0
SHA11fb4751c7831a1c8ceab47bfc869e95e1dd06af5
SHA2565a388b21e1ec19fd9a99f154cb863b6cc4c5bbefd75c7dd81bf781408e69e2f6
SHA5127bafb0bf2437232cecbef7c0e0c1cb459db5267a23cb1309dbd3689dce095f92b7875d6921fd123505e9008bb40713f9243525db0da3abc897ec9a010ee33a91
-
Filesize
92KB
MD5ca1c2d15c1328ba3ead2778915afeed2
SHA10a8402524b0ba398229e18641fc0dabb09d60c4d
SHA25637fd129a1983b56cc2586b6fff9237e745e51a499dab219156cb3c399376427d
SHA512097b7c977c658004b1eff003c767b9ebadaabdae227cb057e2e9da37a390da63bb91b38327c7289806216fe78754fa7646ab00d2d1b8d024dc0f9c3f81079182