Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
66df698cb05de01a352563c9cdde2560.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66df698cb05de01a352563c9cdde2560.dll
Resource
win10v2004-20231215-en
General
-
Target
66df698cb05de01a352563c9cdde2560.dll
-
Size
406KB
-
MD5
66df698cb05de01a352563c9cdde2560
-
SHA1
0604ca00b007745550eb180667fa4a4ca1a1fc67
-
SHA256
69e4e93dff6f8917d615f5bd43ddd169dac02ce6a66c35fc668fca97b1e29a1f
-
SHA512
fe640d7be1aee9d9261950bc234e9d130119cc0d1401efd46ecc9cd0b71d9cba0c0ea94611b90b57cdcb968d7fbf54f577fe7c06704741538e1b1a709de35964
-
SSDEEP
6144:x94UYYo/pATA7VboU5Ek8/yG6wKc9FFPAEVgQeeaQeetQeesQeeqxQeehQeeXv5K:/4UYYo/pATA7ZPSk2yG6wGEPiNP
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2772 2884 WerFault.exe 16 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{109AACD1-AC77-11EE-8568-DED0D00124D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DOMStorage\facebook.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DOMStorage\facebook.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410695663" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1392 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2884 2216 rundll32.exe 16 PID 2216 wrote to memory of 2884 2216 rundll32.exe 16 PID 2216 wrote to memory of 2884 2216 rundll32.exe 16 PID 2216 wrote to memory of 2884 2216 rundll32.exe 16 PID 2216 wrote to memory of 2884 2216 rundll32.exe 16 PID 2216 wrote to memory of 2884 2216 rundll32.exe 16 PID 2216 wrote to memory of 2884 2216 rundll32.exe 16 PID 2884 wrote to memory of 2868 2884 rundll32.exe 29 PID 2884 wrote to memory of 2868 2884 rundll32.exe 29 PID 2884 wrote to memory of 2868 2884 rundll32.exe 29 PID 2884 wrote to memory of 2868 2884 rundll32.exe 29 PID 2868 wrote to memory of 2632 2868 cmd.exe 31 PID 2868 wrote to memory of 2632 2868 cmd.exe 31 PID 2868 wrote to memory of 2632 2868 cmd.exe 31 PID 2868 wrote to memory of 2632 2868 cmd.exe 31 PID 2884 wrote to memory of 2772 2884 rundll32.exe 32 PID 2884 wrote to memory of 2772 2884 rundll32.exe 32 PID 2884 wrote to memory of 2772 2884 rundll32.exe 32 PID 2884 wrote to memory of 2772 2884 rundll32.exe 32 PID 2632 wrote to memory of 1392 2632 iexplore.exe 34 PID 2632 wrote to memory of 1392 2632 iexplore.exe 34 PID 2632 wrote to memory of 1392 2632 iexplore.exe 34 PID 2632 wrote to memory of 1392 2632 iexplore.exe 34
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66df698cb05de01a352563c9cdde2560.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start http://www.facebook.com/little.deblonkz2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.facebook.com/little.deblonkz3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1392
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 4082⤵
- Program crash
PID:2772
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66df698cb05de01a352563c9cdde2560.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e46aeeee3e5a6547535202ce9f7dca
SHA1d2b8b1c3ad7a21fe4d6ca27c4a9cb459e16e3e00
SHA256164b502cfd3f2c797c4c3449d76690cca309079d69d139e03c7bd96cf28c5613
SHA5127d11cf49089574ef1bd17f1b7a197682580b476e72315d07bea8d7dfd78d51b4511288d2bb095479fcc311a41664b6d3dd7c6d9663fc426e82ff80f0f73b5958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e604583fd38fe4616c3487404a4d4f5
SHA1ea4baa5c0b9caa2c77bcce6cbf1d1bd2ba9e52b2
SHA2569aeee86690e040c2d2a4197ea8b34345b05330568f32b6f0ddc8061d478090d4
SHA51272b47218ed8af9657123b50404e62de703fbffd49be69180153bfc829d8b40c42f6436da3ecd38390966e400c8a78f1159c5025045fb744a8213081e6f095c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5592e56ec2b429093f889b01807ba73b5
SHA153747be0b8bc094be5ec8799d9a1179dd29e3bb1
SHA256c1a5bf2ed19e17f6a57c02100f1de3cec96ab7b6b9d30990aa2646280dd449e1
SHA512a943937634cb2c05cbb1fac08cba3f3c357c200036821e8ecf74f70c33efb0b30bd4e8711136bc4c95aa807687c0673f1f5f5f68ab7c93639a831e24c4c99b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c64c546310690c75ed50769db06fd75e
SHA153e83123f679c464ebe6046e8cbf3c8f9ea14b35
SHA2560d62a5971eb552bf195642d095d214e9d7dff8772d8b992c44b7900c57872486
SHA512cb24880b74bb4a60136009e9d969d02c9a96e311b4c38f58eede734dfc0550574899fa380a995f065e68db0380c9c9033c77b2a0798aa5c2abd98843b9fc3d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8f50fd0d4bb2b52e2bae12cfe936e2
SHA11ac5abd5b30e61e8f7ac256d85bd71ccd5f7a042
SHA2562da293e9918c32f31df2ff4f6a063a3d4ef35b9dfadbb89cd8e06d6015577a3b
SHA51283b0ac7e9fefcdfae408a1ad214991ab4a254312025cf8a5d05644a33604a4fa517e7f4b743187c7248d073ac911b8352e977136e0594de362a641bbd8b5592d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6d5e6a7141e59003bce52e9f5e889b
SHA1a7b40b274e69a2fdb9f572062b5317419aaed875
SHA25612bf42618c553f78095f786e9294a1685e4797799dafae620c9159cf0bfd5ccb
SHA512c8462795e71ca50e55232c49ac6842c84a0fc0651cc8f947579efd180e29f9c2a9097bed312a9d47c75f034cbb4b23515d98d30f5e7f9be14669f8acbc7cb3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6ba18a0ace3f00ca22ef80b87b77fa4
SHA1dc4e0d446f22db9839c538b9f293cbb8a43aeb4e
SHA256b0482deeaff9d7b202590ae3f4c336788e9e5912152fe1ba37a67099809cd81e
SHA512e7b4636470d5b022f42dd7e77cd0f8304f1a3a2e8abba60f112e7e99351f97dbae8c9fea657244f8064aa320c58a71f14d8206bcaec1125f14030542759d7915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7849961c44be367dc55d12bbb3d5280
SHA15eeef1671ab04ec41ed3d0dd4268c732c59c0f5a
SHA256c8189566189c422fbbc32c6adef1b4000f76c707b3f6395781f4cb523e5ae2ef
SHA512fa6103ce47123ea77fce34c07b36b487a039c866a76f65d03c375639455bb9a156b4d851d6c5a1030f5d6fdfc60c5324e1c8826038bc6fcd2a61d9fc004c4221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53034918aa1e16bf8f49bb65cdff48a88
SHA1f1a82cc1917fad6eef543c6214340d7966107b58
SHA256f456a519d575fd2bc1e2815e74789a9aced63db2e1c09aef014726af6f227271
SHA512e7b5720a65894c0912dbb8f7ff4ea29d46b0528b3312ee614264b24e29a4467a77fb37a6c966e64f0393a5146a7c73e30074453840078a42dbbc6d19b44af242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b696cac4b18b76156fa11bbbf76d81e
SHA168cced3d0f6bf662c14d97af3eda3f4922506b83
SHA256b977fc5e03939039a94f48ec2f0cdce924339e1166fe109ce425656c576df63c
SHA51261da265eb2cd53be35d6f031d24d6ff51c5b5d72389f568b41e08e021e91cb8f42c1e63e06b2f0bb2bcea4e26b6a5fe3c950ab0d864ab775741c31457425961d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ec60924cb7b61db4e88cb9d33a585ed
SHA1bb56a81b895417c42282ba814ce9738b7cc2a7b5
SHA256ce2996c2d2b4bd15245d3df359076271b6b0e677368531923c1577fb2ec64674
SHA512005e1958455496929d23f0a185c0e69f8a8ec97c5b15d07fe41ece4af3f7a0dc16479fa7fe3cbe71e1b1c92ecbeda39910c9186e1375b084c06868f4dc7c2214
-
Filesize
6KB
MD5441d6bc1a3d7ace1789eadea7861d6b8
SHA18525113868f4fe7f1cbce7e40aff7b00ab505f60
SHA256e3c97974d7678c23e3467c68db7cbdc17aea5897fc272950e018fc946a828a18
SHA512fec2773cc5c9b613bf19d6c86f5a9414c42fa383e7d3993532dd513dc362d6c7f495f114bec5973b6c80943551c5f0e144a7eb46f6e4b742fe322b160d5575ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\gB76kJXPYJV[1].png
Filesize6KB
MD5389dfa18be34d8cf767e06fd5cde4ec6
SHA147b751cffab47d076816c63ce08d3e84600376ee
SHA2563c45ce612f41b1e7936e7cf5b235047344fd3146d1630e342f186d1d1e8e00d5
SHA512c4db18f636ad85e87f93a208fb4b02b528659ba367e51cfa6d7826ac1159f445a85fbca8d12ac67556e8fb5208dae24ae309e783d50feb088ef0e9f47ac19430
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06