Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
7731e2a4fbe7744d6452bb2ea41ff532.exe
Resource
win7-20231215-en
General
-
Target
7731e2a4fbe7744d6452bb2ea41ff532.exe
-
Size
1.3MB
-
MD5
7731e2a4fbe7744d6452bb2ea41ff532
-
SHA1
3ff93b9b6870dcd2efd7ef1de4afd9bcae207f3d
-
SHA256
c917944cdffeb82d6e332884bdbcfbcbab780e022c51ffe9501e1d676eb75f98
-
SHA512
2cc75a9f50f22cba18cced5ff2d52de2c38e5dc54c5098dbf017a513ce076e64c88fdeb3eed1a96842834c028c2b437b315548f4de3661ee730b9c7818276d34
-
SSDEEP
12288:Ch/pCHxW4pbAOeeeZeeeeEhMEr6CX4zistN:U/eDNAuaE6tiI
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7731e2a4fbe7744d6452bb2ea41ff532.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409892078" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main 7731e2a4fbe7744d6452bb2ea41ff532.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000048e75bef32649f4f57e4798d1e4682aa7e3bf90efe73036de635a4b78a265306000000000e800000000200002000000069a3e0e760ebbd41e1f21fdcafcdaa113f9c52a33019f1142223c6e915f6005e20000000628583a682a03e95d39a3f895076b71b6125de273557e3bb08411ff062043e79400000006bb5cf8c11bcb27188f8743c3da26ea5a0c081f3ba6f0b81787729bb18d5badec2734640e261635daf793b8fe3946fcaac164322510fb27009493e207a4ea6ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1380C891-A528-11EE-B331-6A53A263E8F2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b6b6093539da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2400 7731e2a4fbe7744d6452bb2ea41ff532.exe 2400 7731e2a4fbe7744d6452bb2ea41ff532.exe 2400 7731e2a4fbe7744d6452bb2ea41ff532.exe 2836 iexplore.exe 2836 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2836 2400 7731e2a4fbe7744d6452bb2ea41ff532.exe 29 PID 2400 wrote to memory of 2836 2400 7731e2a4fbe7744d6452bb2ea41ff532.exe 29 PID 2400 wrote to memory of 2836 2400 7731e2a4fbe7744d6452bb2ea41ff532.exe 29 PID 2400 wrote to memory of 2836 2400 7731e2a4fbe7744d6452bb2ea41ff532.exe 29 PID 2836 wrote to memory of 2832 2836 iexplore.exe 30 PID 2836 wrote to memory of 2832 2836 iexplore.exe 30 PID 2836 wrote to memory of 2832 2836 iexplore.exe 30 PID 2836 wrote to memory of 2832 2836 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7731e2a4fbe7744d6452bb2ea41ff532.exe"C:\Users\Admin\AppData\Local\Temp\7731e2a4fbe7744d6452bb2ea41ff532.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.bigfishgames.com/download-games/1244/kudos/download.html?afcode=af628d3a27a22⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c11aa47166f0d377c418ac6462138c2
SHA12a1be13cff7e4c3883796ad4b4664687c407b41a
SHA256f60fc0473705a57b2bc6c616b2a418a9bf2d23f5d32712bf2924af4869759ac7
SHA51296060b09ba11f11bb7e5fdee5508e8f1aa0eec0af1339b18db1aa608b4c038ea0f9aa862088ce09a4ba34167593c1db343ea1c49ea2837b8edf4a7a8f37581f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bbe776c598d3b4a5835992c416fd8a9
SHA1cf5a9edef2cb41ce90a8d994b12b27b6af77b57a
SHA256996df1d4415a439bf2cb5455e36480ff7dbc8b7c8b3a4e2eb67ce65d4a887c1b
SHA51255aa0df123683a04119ff59dccc3d8f1aa59a1d169d05458525ea2546f593a5f130ce8576455f32d0bed2bfc1902e1780177266b0cebc65d28e91e22ea08871d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e71fcd66b8c88384fd1e076fdc71b823
SHA16cc84ca813685193aceaf788a22943d4c85317b4
SHA256a1dfa04d2c294f115a1c50cccd9618d6f7d0234ce2f7f9bece5b6e6f0ee62dbd
SHA512a36c9460bf6ec46f94ce6784410e4543eeda3b850213b36f7deb26e7721f2c90aa64e208f7e40b8b3354edd06ced9f3e0124c0087ac2692f29fe545450a794b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ed28a7d8be1b8783ad301fd42e79e2
SHA17980d23a6998bb2dff897fd77ed39af77ada602b
SHA256e4c07e6cc9c138d6cd09533d29b1ff9b38bc3fa1926a720173c2e91f916f8be4
SHA51252b73d333fff8ac0eb8b25a270d3e35c314a20b07c73173ce479609fd9ac2f9bce42c4b81088b585b4386234f8a8adcce4061b02c80f69673de421a501db97a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3005a6d7260e503c5f63fa949c931de
SHA16bcd56faa02255b7b113ecaf9f6cc45891c1d94d
SHA2563aa93acaaef3877d47c2c565322b699bd224bce7c5af4103dd9c31793e65d72d
SHA512c07ebe064b7e2807917f4435bb8d7f3431c8c0778d2e7d091cd6202cd8684bc367428ed620bab4c77f55184e6f61639b4cbb92930fef18cb2df9fdd9fa5377b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d23f5683aae9878ed4168089ecf269
SHA1d0a937f29c0d6291867e5a987f281fd54b61690a
SHA256a2dfdb976570d3167f73787d0c3dd343cb7c02b694d1357b1db290eabbb51b28
SHA5122647b484fb6265a0bc4f7eba1e782086ba38cdc02f9ccdb635cb902477b93ee8a31980698f6819911578fd758d9ab61225d9f71f5d1491dc8f6f2afde20bf6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52258fbdbcec82bc23857b314786e3011
SHA11efc2ef45c9532d9dd3407c301f9711af3264527
SHA256c32fba82b93b5c6fefdb1f2b850f0f649716da3682bd956065458ea312ce72d3
SHA512c6f11e1a2f2097b5d397029a93924f2c3b0b6d69b8b38a65ce6364539b4cbf75f57cd4590532bfed10d8e115a9f758552d29deadbbecd97d69e8aede79461724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1d44fdc06522c4d99d5f552a89a6909
SHA11c09cd7d3abfe83bfa2a71919c2cb66f34f8754c
SHA25674bde8c7dd7bf52b407b1ef5a035787e76c8bbfaa125a132995584e021e7e82f
SHA5124132d4fc73cda054b4f3628240d3f3fe4a5dc44bca13df522f339f738c97e44018230a09a84d714fc0c743966beb28e058fc5b3238df30abd02e104fcdbb0ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7f05d1c377cc50067e921bdb5caa79f
SHA115e4b9c9a1e0362a7c873ad2ac05a81e6a33ac2a
SHA25634730e8630850c7e39d8a0bbb8a9340f92a0f21e4105529fdbda5735e67ec606
SHA51269ff1749767a29d898156575817f4e6f51de3da571b5467ac4e08cf5306e63f3840d5086d22f8f69391b501daae917f628ffeb322b82075a32b097cc5159fbd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59926902402f0a9c0dbc6d5322f801222
SHA14bc7de37b43e3ca9d8ee72aae1a5cfd96e15ee87
SHA2561037bd1d08cc60a09c37c51a33319d57006ff501cca6794892b21a75f637de1c
SHA512fef49cef3bfb3553204c4ed364ae592b54fe2c6e7c1d44f5042d85fa455c1a3066a0998ead62df51b23f5c406400a0edef4dc142eabc6767952f0e5053c01f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c674748f9068e4ea205b107fcf58b6b
SHA1f72008aaab3eb5b7ef0bc32bcd1442c6ee1a530e
SHA256bcf04a576c7627eb86093eb5101c36e8798b273025ef5e38ac3f9ad5481a4026
SHA512a1c6511d6f7501a5aaf71727b77a64496c7d59c11c723edd10639b2a2c5b2a5de3df68d15d2d12b73fed0af523fcec4a01ebf201acd2ac8da9c4aa86a3d75055
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06