Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 10:31

General

  • Target

    6774a06aa7558fce73fa53d9558eb7a3.exe

  • Size

    49KB

  • MD5

    6774a06aa7558fce73fa53d9558eb7a3

  • SHA1

    c8d3eb76606c9bd79c663fcaa69cadd9a13996a1

  • SHA256

    c1bbd17d3f641e494bc0a6808b74365ca93ebaf82b7a4675a50ed6f11724e562

  • SHA512

    eb8523f720e40d4d49669a486de143750d309d7ff6b3bd84ec7140565bf575e65434fd279219c4c08b776109330dfad90a82b26421148c02d3927705f2ecf745

  • SSDEEP

    1536:g7t7m5dUyHatEMwlYFCajqyBY+s7tp6o2oeqfRAY:gh7m5ahAMY+Ypn1eqfz

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Runs .reg file with regedit 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6774a06aa7558fce73fa53d9558eb7a3.exe
    "C:\Users\Admin\AppData\Local\Temp\6774a06aa7558fce73fa53d9558eb7a3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\mybar\conime.exe
      C:\Windows\mybar\conime.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2724
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "google" /d "c:\windows\mybar\conime.exe " /f
        3⤵
        • Adds Run key to start application
        PID:300
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\index.vbe" 0
      2⤵
      • Drops file in Windows directory
      PID:1964
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s C:\Windows\SetWindowsIndex.reg
        3⤵
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Runs .reg file with regedit
        PID:2768
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\0\8.dll"
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:596
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c regedit.exe /s C:\Windows\reg.reg
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\SysWOW64\regedit.exe
        regedit.exe /s C:\Windows\reg.reg
        3⤵
        • Installs/modifies Browser Helper Object
        • Runs .reg file with regedit
        PID:1880
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Windows\7\searchOld.vbe" 0
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s C:\Windows\search.reg
        3⤵
        • Modifies Internet Explorer settings
        • Runs .reg file with regedit
        PID:308
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\iecollection.vbe" 0
      2⤵
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:1644
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s C:\Windows\ShowIeLinkIe6.reg
        3⤵
        • Modifies Internet Explorer settings
        • Runs .reg file with regedit
        PID:524
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s C:\Windows\ShowIeLinkIe7.reg
        3⤵
        • Modifies Internet Explorer settings
        • Runs .reg file with regedit
        PID:1404
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c regedit.exe /s C:\Windows\WindowsMy.reg
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\SysWOW64\regedit.exe
        regedit.exe /s C:\Windows\WindowsMy.reg
        3⤵
        • Modifies registry class
        • Runs .reg file with regedit
        PID:2764
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://dianxin.online.cq.cn/api/tanchuang/url.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1968
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1716
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:537614 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2340
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://dianxin.online.cq.cn/api/tanchuangone/url.htm
      2⤵
        PID:2328
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\del.bat
        2⤵
        • Deletes itself
        PID:2932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ie.vbe

      Filesize

      288B

      MD5

      0bd157d1a9e93eaaf163990efd3c6636

      SHA1

      5ffa7272f7e95057646859f248bc114247b4309e

      SHA256

      5703e5eb54bf7bd1a9a46e88b883a0c6f73be3a9445c94c4bbdb55b0982f6162

      SHA512

      6f82a517ca3db260598c6d09372c8a4bc0b3cbfc7fdc3790ddb4d5703cc82beeb443a9996f0f0fb4c5bf633adbf8a24afdfa03b53a643df2b37244098e28af8b

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\iecollection.vbe

      Filesize

      27KB

      MD5

      36219ca941541565e5efbe3e59a59150

      SHA1

      738fbbbcafb06d27890b032c64c38b2e08eab93a

      SHA256

      782010cbacd867d5d34fcc98a429efee6be41b1d4d5bdc63e765c93cc6b442fe

      SHA512

      d474f12239849b8ea0034bf3e272c91309c9bbd7d1b0693d28dae91be4fe2ce573dbc3d4f0e44abef886844396643928755c09d6bfd65aeb0c9f47f30003a49f

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\index.vbe

      Filesize

      82KB

      MD5

      a3cca02ae84bba169833d00e8c3555d4

      SHA1

      27317330e4dfe7c1fffc6efb97296217c8d8325a

      SHA256

      d7c785afa6436e45bb8a95d2bd92aa711a36acb5bc8e843deeff99d74ebd7ed6

      SHA512

      ebc3abb60426099535f2c9cf781310e85575a6a2f017273fec6c3f2ddf31867256f95fb33fcacae40a16c05f4bd08f67440f0a1904c513f8ff5d187b4431c350

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4a694ba74622dd7b2e4da9e1ce195381

      SHA1

      a7992f012f7f7f117759e853fe265eebb0d94451

      SHA256

      35a670563f45735250b5c14693d6432306e83eb9a52a7e7b0f3fafd30f8bdc8a

      SHA512

      57cb33a8ea77c3811b694d233ee67a9be6268c273cefb64c88bbe3b003b687223b4734273e5b5d83340137f70b2fe625b75f5b18089491946121604b3786e040

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fb237b8d5e1ab5b13518018bf4d13d16

      SHA1

      617328169caaf24364b787edcac3ecdafbb349b3

      SHA256

      08b4bb1092d1b07d4af8d869ec7dbf638de5b9f3b8893287479a7e3e01097e2d

      SHA512

      3da0688e3b0ae612419ec5e093fcb95ba810b2a4fa440e77f30408d068b136040e4e431ec528d1078d0a09f21ec15632296dab4f9f82132da857ab8c6dd1e49a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d0d3c8d68f3ec9876e0aa20ee5542f97

      SHA1

      1bdcd2d730523743fbd2f2b199ca23169027fcf7

      SHA256

      a36b2f8208fbc6b5ae5e66250a686eff09562a62b8eebc88f27f7e861f9e55d1

      SHA512

      05f1ad969900d5e84ce98c3553be0638df0674ed090bcbf9bedcc028b42ae7953551ce9c773da0a59ff85633bd07a40b0ea729a53afe50061053b9e4cdc6a410

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      eee155a0ad295b6182098dc63135d87c

      SHA1

      27359a7018cc617478df1f1410ba65d1f54161bc

      SHA256

      4be3a365214d45f66317bf0c5fe0fdc437688885d910567b6657172674b9d248

      SHA512

      34960580bd883dd3acc599dc07f0bee317a6b6db5ef25f18ba949e0309921ee6fc50d210b17bf4e8920c2ad0e9b6cd37632839d55971869be1bf5147e6ef06f5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c4d6b63fc64f8bf5c7231ef929359481

      SHA1

      c92db74e9ea6f8e44773cca6b71573e829d9429f

      SHA256

      373f7b4aaf675c9ad2ba5264c1995c4b61f5f06045aff9e1b477c0d9758bb09b

      SHA512

      5db68b31b8165637899e3487e360705b27fd8b872eb3fb2d07240d90f9ebe624b22ae7fd62c5291cc06d30fff01e50cbcba90889c7c1ff869834e95f0740c85f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2a3a272b4e538b5645d5631bdfdb09d1

      SHA1

      5dfe227d5bdb5f66f384901a37bdb4154a54bfae

      SHA256

      1d308b4d3e2f0dd308f594dd0da07a000fff4631d7e863c638a8cdcc16070ee3

      SHA512

      4e9e2c3128faa4a06f203427e598e9a2b9773113f70d6e92908bbcd49c4339813a271dccb5295faafddad1a4e00a55f43b5a952b68c179947e3d25b2cf60315a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      254ca3e78683131aa765f58e4ad8b1a1

      SHA1

      0b28aaa9b6b7882244ead4175d1fe8078a2df94f

      SHA256

      701e45a22e742c7bf4758057e3d985288eaa2c7a802775df0e7141e7b6695fa6

      SHA512

      a60e5873b2f7cb4c723d2847132dde2cee915c0a1475b9454a2e88cf1a39e422ff84398e8b607eb5667fb6735831cdf8f90e2e3258908155e6b38a3d7e624816

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\errorPageStrings[2]

      Filesize

      2KB

      MD5

      e3e4a98353f119b80b323302f26b78fa

      SHA1

      20ee35a370cdd3a8a7d04b506410300fd0a6a864

      SHA256

      9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

      SHA512

      d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\httpErrorPagesScripts[1]

      Filesize

      8KB

      MD5

      3f57b781cb3ef114dd0b665151571b7b

      SHA1

      ce6a63f996df3a1cccb81720e21204b825e0238c

      SHA256

      46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

      SHA512

      8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

    • C:\Users\Admin\AppData\Local\Temp\CabF2E9.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarF83A.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Windows\0\8.dll

      Filesize

      28KB

      MD5

      fbe32b3eb39297d21c8a9693922f2b03

      SHA1

      b261b975d400f6ade195b65c83c9de645f9156db

      SHA256

      1d7ebda8b43d465aea6ad5a291f1f093488a36b5c9aae7a9b3982ae1a105d17d

      SHA512

      5b23bc1c2b52cfd4ea17af92386762d2a7d5b149a30ed9bf48538a5e2274a69183260c92b98ac2b287231fdda30cfa30d7afe9eaa21267c7d5504752b20bffa0

    • C:\Windows\7\searchOld.vbe

      Filesize

      2KB

      MD5

      6e0f1a44a991ba646d30719de7ee2d9b

      SHA1

      a42c11be86419238ba592eb3b79692f0111096b0

      SHA256

      5a4ee98975aeaefc7e784c36f1faf611ac421bad2ff71e461cbdafc8f937b4ba

      SHA512

      37e1a0d8e1087e11ad51f6038bc5f725484a9aceadf6b697457db1259fbb29e6a672af4af92c451d47ee57911845ae4728826b9612d27223431de691ceb1c7bc

    • C:\Windows\SetWindowsIndex.reg

      Filesize

      143B

      MD5

      4c3fcb0fe03094280e5790b954494d23

      SHA1

      083ea34d4766c0f1d816baa5aae4daf6600fd7ca

      SHA256

      5694d2c8a0db92e0878dae0d1f9dd3dc6079b9375633ad07e65c9e879c37bcd7

      SHA512

      cbe7fd8c0185dc5b91478ed5f609528de34810283a286acc67e48c70cfe32c96be226d0c6543ba6468a1c532786c7135032f636f1b584e8eba20bb8ebe8cd4d0

    • C:\Windows\ShowIeLinkIe6.reg

      Filesize

      7KB

      MD5

      4f69fa82c34c91514da21a5933644af8

      SHA1

      e131f57f41ce95b46195d460852718b83517579a

      SHA256

      7cd8b741bfaee5cd14779b69d71b362aac4c928097c6b4af8ce0ce16bde52a46

      SHA512

      276588f960d28023febd87873c7852f401ab6ebfb3d90bf8b21b1998949d8ab00badb42d1a05934587aa6b4ad0ab06a3d649dcdb70f384ca70339049243463c4

    • C:\Windows\ShowIeLinkIe7.reg

      Filesize

      9KB

      MD5

      dbd46bf2e72f6dfbb21295f4e3066d47

      SHA1

      cdd6ca2f6455c1e528c40a520bcdb8669df8f548

      SHA256

      71927f4f034db038385346e34209ad069139f54d73bae34bfaf4f29b7010fc6b

      SHA512

      ad013387a0c7608375b7a3c5fdb27f0d9e79b051d84b1ee9221346499f386d30473b5e2727f6a4e8a8122cf8ac2d473a5ce5e368e62da09441ed48e5c088bd11

    • C:\Windows\WindowsMy.reg

      Filesize

      1KB

      MD5

      713e7542ede7975f60b6361e4b234eac

      SHA1

      3a11cd2def80f43ac02850cfeac0e54f6ebf7a95

      SHA256

      8c4b40dfd44928643dd5dea8ff3e15eb9d25f020722bd2095d7d37f3a64fac5d

      SHA512

      da0578694cddb363d6f4f6d01f9881bbecc8c775c121aae3470bc6e49575fa2c65244043d7276d6f62390fab2926881a7bcfba5210ae312e374badd2b306dc8c

    • C:\Windows\reg.reg

      Filesize

      185B

      MD5

      f62c5deb08df74f7f3cea25c6b7af137

      SHA1

      43adc1ba72c8983fae70f29bdc3ba6ae15b81141

      SHA256

      ff6236d2e884773dfebd61af053776caf3cccf815124343abcab4734bad4b602

      SHA512

      ccf6294eaeedff8a386dad260e6927507a3da0146cb5a3a06a6ab62c85009a09fbc056ae73e0264eaf3542a3bb4be24e8f142a81f0ec4820d9790fbdb614aed5

    • C:\Windows\search.reg

      Filesize

      1KB

      MD5

      9fc297755434ae17309f0a37a5eb9e36

      SHA1

      d1ae58eebcf5564f2e8542091cc4724e6cf2f90d

      SHA256

      4d910952568649b688572a188e9d1dc90933c4a098bccdf615f30655b121ed25

      SHA512

      b5b9e11c43b591a48f0a4799c41b57a69b68da6364cf095e1ff21e4c4333cefb66b5d31d495c1ac70e4f220afddc1b41379c74865b783465b21951406a67f0cb

    • \Windows\mybar\conime.exe

      Filesize

      64KB

      MD5

      ce08bdb45107f41826d1feb4507a8886

      SHA1

      12c3cfc71b6028a187d2b10f179552c14a7bb22f

      SHA256

      701a246d1a6a182b7176a3f8c1c913b131c0fdd351b9610d398cfb88ffa2d1bd

      SHA512

      467727b3f675e8ae73e25e4a0be5b73a79da5c09ff7d1d2b331b8a4cb93fa2c6ce026b00419c1770408415331c777dc2ecbcd9b5ec4a70d6e372342ad0edec88

    • memory/2164-71-0x0000000005910000-0x0000000006972000-memory.dmp

      Filesize

      16.4MB

    • memory/2164-72-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2164-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2164-570-0x0000000000230000-0x000000000023D000-memory.dmp

      Filesize

      52KB

    • memory/2164-568-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2164-9-0x0000000000230000-0x0000000000264000-memory.dmp

      Filesize

      208KB

    • memory/2164-8-0x0000000000230000-0x0000000000264000-memory.dmp

      Filesize

      208KB

    • memory/2164-6-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2164-3-0x0000000000230000-0x0000000000264000-memory.dmp

      Filesize

      208KB

    • memory/2164-2-0x0000000000230000-0x0000000000264000-memory.dmp

      Filesize

      208KB

    • memory/2164-1-0x0000000000230000-0x0000000000264000-memory.dmp

      Filesize

      208KB

    • memory/2724-900-0x0000000005110000-0x0000000006172000-memory.dmp

      Filesize

      16.4MB