Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe
Resource
win10v2004-20231222-en
General
-
Target
6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe
-
Size
253KB
-
MD5
6ce5afac5ba2fe2015d5bf0e3d8c9f93
-
SHA1
885c8b2a08cc32ed2943928f9cbbe481d71b0d82
-
SHA256
44ee1342f0017083995ffaff831d09e459932a0a3c911c06e62a68ffe84db884
-
SHA512
7657d60299f2e6d71dd9040df8422f3aa854b3abe090129bea7d8040e9ae3683342b06e679c90815591fafcfca943f0df223cc8b50064a07721eadefd1d59abc
-
SSDEEP
6144:SY94Narf098CKA+PwBy6cSz0fg/mOqKqhrIMu/3:R9OaT0981Jl1fgOdKQg3
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2932 rinst.exe 2652 MSN Password Stealer.exe 2588 key.exe -
Loads dropped DLL 12 IoCs
pid Process 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 2932 rinst.exe 2932 rinst.exe 2932 rinst.exe 2932 rinst.exe 2588 key.exe 2652 MSN Password Stealer.exe 2588 key.exe 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\key = "C:\\Windows\\SysWOW64\\key.exe" key.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "PK IE Plugin" key.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\keyhk.dll rinst.exe File created C:\Windows\SysWOW64\keywb.dll rinst.exe File created C:\Windows\SysWOW64\inst.dat rinst.exe File created C:\Windows\SysWOW64\rinst.exe rinst.exe File opened for modification C:\Windows\SysWOW64\pk.bin key.exe File created C:\Windows\SysWOW64\pk.bin rinst.exe File created C:\Windows\SysWOW64\key.exe rinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A} key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32 key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\ = "IE Class" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32 key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR\ = "C:\\Windows\\SysWOW64\\" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "IE Plugin Class" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS\ = "0" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID\ = "PK.IE.1" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID\ = "PK.IE" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0 key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\ = "IE Plugin Class" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\Programmable key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer\ = "PK.IE.1" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ThreadingModel = "Apartment" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\ = "BPK IE Plugin Type Library" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0 key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ = "C:\\Windows\\SysWOW64\\keywb.dll" key.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\keywb.dll" key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 key.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1 key.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2588 key.exe 2588 key.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2652 MSN Password Stealer.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe 2588 key.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2932 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 30 PID 2416 wrote to memory of 2932 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 30 PID 2416 wrote to memory of 2932 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 30 PID 2416 wrote to memory of 2932 2416 6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe 30 PID 2932 wrote to memory of 2652 2932 rinst.exe 29 PID 2932 wrote to memory of 2652 2932 rinst.exe 29 PID 2932 wrote to memory of 2652 2932 rinst.exe 29 PID 2932 wrote to memory of 2652 2932 rinst.exe 29 PID 2932 wrote to memory of 2588 2932 rinst.exe 28 PID 2932 wrote to memory of 2588 2932 rinst.exe 28 PID 2932 wrote to memory of 2588 2932 rinst.exe 28 PID 2932 wrote to memory of 2588 2932 rinst.exe 28 PID 2588 wrote to memory of 1724 2588 key.exe 34 PID 2588 wrote to memory of 1724 2588 key.exe 34 PID 2588 wrote to memory of 1724 2588 key.exe 34 PID 2588 wrote to memory of 1724 2588 key.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe"C:\Users\Admin\AppData\Local\Temp\6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2932
-
-
C:\Windows\SysWOW64\key.exeC:\Windows\system32\key.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} about:blank2⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD575293f36b29713ddf9e491575cd9ba3c
SHA1d44ecf7167e4680979afd372181d5ef948d07214
SHA2567d0bc3f71c5b3e1ccf0d7ad31c6f47c09c77ff909b32ca414f5ab155f11a89fd
SHA512d494fba249f9f9715c314188f346427c8fa93b5807b4076a1bb7602e759e5161ec9ba5bea69175b0a6688cf3f9905deff6455ba007e53917ac7f4efefc3f6e4f
-
Filesize
388KB
MD56f2ea067f9861eb3dcbc1a997ee365e0
SHA17984ce64ee493a87024fb26cc2150b7cafc23b1f
SHA2567777081a4414739790bf06c7a642c35b14394415dbb9572cb06e1d79e8dc918a
SHA5122beb68b268bfd517254447b393e0cb448b08a69427a12a95d32b09304dfccdb70a1ba67922479dc3f5161ab8600e5144273bed1d89c93d05c4c37610b5673a2a
-
Filesize
24KB
MD501e4b6bbc6407336756588818c6f57e0
SHA13ef1fdd3e2a9e7dc492d73b0005f72ceffa9c101
SHA256dae5493e60f8c8f1bf33276084d3b4207ab1d24ff66453de59e786249c4f0d00
SHA512d715c0b4abe812fec73e78d3db985ed24515365d1d217a4df37f193120373f142afb3979dab66caa147285eaeddd6e15d569617274004b4e4932027f10f76762
-
Filesize
40KB
MD5c8f8519eda854af35f03e56ef14aee6e
SHA1dd5bd23b60b2c9f3e8d96ca1616d5d36ffaecb48
SHA256254660543a306e520ebc2c3fd4bbbfda6775154417db8f5fc3a4cd45cb85faef
SHA512ee77fb75a5a2f0f7bec34237466f63a81e8e4b972540fd6c49bf8a89e5cf6da92c23f605cebfd761f8d7a758c826e199f65fd4a9992122bf66936f08e31ee242
-
Filesize
4KB
MD5b570d4fdfcd44eea5ff8564b6099286d
SHA19560ef5d473ed86653f969c37745865d28af2caf
SHA2567165a1c89e0468756e2e37cf1539767e80bc2d26cf8a0d498aa56d32ac78d122
SHA512e8fbd7ede0e5468f622f58b5ae47760a1138c991a2202da6b835169cb08550d9275b1f666b273a6f8cf95b6aee9f15405dc2e4e7fa579762a7c13554fe0605c5
-
Filesize
7KB
MD5fbe4bab53f74d3049ef4b306d4cd8742
SHA16504b63908997a71a65997fa31eda4ae4de013e7
SHA256446658dd5af649857fff445c600f26cdc1d0c19c86a080f312b89b1890182092
SHA512d458ab806a3ed3d1494a13ad8a75df874a0b227cb4f337996cb82df3c4a26dc9c4fe48a664b53b052a4af123ea8d89911d9d9493870e6b5992d5621a32260c2f
-
Filesize
93KB
MD58fad8bcd45ca0dfc8d0d895eb4ce76ce
SHA15d0d4457fad064c96bd56c3b90d9634ed86f68bd
SHA25658027cabffadfd5434af0d894ed139c908bccf6cfeb72b9b7c2938833bb04d5e
SHA512e12d2d29d0a6b929d4ea2eef3cd47596bb8c465eb84b21cf219ff4bafd5b03dce90c8886649d7c101efdc417462e09ccf86aa99c23e0cdeb32e4695afc1f4bea
-
Filesize
92KB
MD56eac27001764be8027b24fa419fe1713
SHA1df8d25dde5481eda7530bfaa2af9db3992e25082
SHA2566871983aabd896266879f3e5b22a24f83cc336941b9bfc83b2909e207723722e
SHA5124882d8b44265c3484a59ac37a1e8d76a60505ad3829d7df1b3e4c83381b6ae4787bf95033b22921a74c5e84191befe47ef9808144b9f7ac4bf70af4e3e1fc023
-
Filesize
28KB
MD508ca19d445eecb4a4f2e01ef3dbbf936
SHA11660d70693ab06ab9cf10d193300f3a8daa2e05e
SHA25695223cc4c108fc7dd3289c8bb420219403cdb2c37a13397f9badde4163aa42ad
SHA512db7c1a4c8317df071a9e1f3507a1a349fc97298e2dc56e020059466f52e56ddc057e352e21ae2336a1519d3eeb4b73524061770b3e968d33ea2092f850becffa
-
Filesize
382KB
MD512027a98d8184144a7f453231d0671dc
SHA1491d50c97930c9ccfbc366cbd62d6d61b2ec3538
SHA2562aa80075201d1da0128107853d02d47c72a51c1d4b3dae5504564b3572787566
SHA512b6f0d68dd7a86b53be1bf59b45fb6a724f29291b96198645451e54c1e2e0f43e8d60d574d3669cebe8d0664f08835241de362f9137953498e8ba3bcf8c304e11
-
Filesize
24KB
MD57719e3244553dce7b70a9d1083e291dc
SHA1d7147a052b19bb08356ba6dea5cc0e6486a0121d
SHA2566c48b4fe62614ad35aab89b534310024770fbcaa669d50a462f4973feeee926f
SHA5125ea1aad723e1043028136c943899e5a33e4b58b119c927fb001891facae656277969ec31cd7035680eb5d97e401c22577a082c2cf728e9142a3f0c62d1d99beb