Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
06a410454b1f0524ddf8df5e33201ed4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06a410454b1f0524ddf8df5e33201ed4.exe
Resource
win10v2004-20231215-en
General
-
Target
06a410454b1f0524ddf8df5e33201ed4.exe
-
Size
164KB
-
MD5
06a410454b1f0524ddf8df5e33201ed4
-
SHA1
c45664f51a910935cc3035e42f750a470a2a3c22
-
SHA256
3ba00d19455f442072d8afa52f94783070d474ddf0c1eaf0cec28481130f9b19
-
SHA512
58100c3a449ac8d40ee02ec2227e2baddc66f0f98284507dad62b45acea62bc6e2af0fb731b268b15794d04f5ff3bd6c506749b56f5371a77ef76c76e03a3bef
-
SSDEEP
1536:iICvS60bmM+DLgI4MaHoHuCj/WaPLNcE9J7gGifarSwjfRnqpfNiXN8sWLhJz:zFpbmM+DL8MpAaquJhuL4ZqOiLvz
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 06a410454b1f0524ddf8df5e33201ed4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\zyn_df = "C:\\Windows\\system\\zyndle080809.exe" 06a410454b1f0524ddf8df5e33201ed4.exe -
Deletes itself 1 IoCs
pid Process 2972 cmd.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system\zyndle080809.exe 06a410454b1f0524ddf8df5e33201ed4.exe File created C:\Windows\system\zyndld32080809.dll 06a410454b1f0524ddf8df5e33201ed4.exe File created C:\Windows\system\zyndld32080809jt.dll 06a410454b1f0524ddf8df5e33201ed4.exe File created C:\Windows\system\zyndle080809.exe 06a410454b1f0524ddf8df5e33201ed4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2DAB901-A6DF-11EE-AD08-DED0D00124D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" 06a410454b1f0524ddf8df5e33201ed4.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410080923" iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 660 PING.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2644 06a410454b1f0524ddf8df5e33201ed4.exe 2644 06a410454b1f0524ddf8df5e33201ed4.exe 2644 06a410454b1f0524ddf8df5e33201ed4.exe 2644 06a410454b1f0524ddf8df5e33201ed4.exe 2644 06a410454b1f0524ddf8df5e33201ed4.exe 2644 06a410454b1f0524ddf8df5e33201ed4.exe 2644 06a410454b1f0524ddf8df5e33201ed4.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2644 06a410454b1f0524ddf8df5e33201ed4.exe Token: SeDebugPrivilege 2644 06a410454b1f0524ddf8df5e33201ed4.exe Token: SeDebugPrivilege 2644 06a410454b1f0524ddf8df5e33201ed4.exe Token: SeDebugPrivilege 2644 06a410454b1f0524ddf8df5e33201ed4.exe Token: SeDebugPrivilege 2644 06a410454b1f0524ddf8df5e33201ed4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2772 2644 06a410454b1f0524ddf8df5e33201ed4.exe 28 PID 2644 wrote to memory of 2772 2644 06a410454b1f0524ddf8df5e33201ed4.exe 28 PID 2644 wrote to memory of 2772 2644 06a410454b1f0524ddf8df5e33201ed4.exe 28 PID 2644 wrote to memory of 2772 2644 06a410454b1f0524ddf8df5e33201ed4.exe 28 PID 2772 wrote to memory of 2572 2772 iexplore.exe 30 PID 2772 wrote to memory of 2572 2772 iexplore.exe 30 PID 2772 wrote to memory of 2572 2772 iexplore.exe 30 PID 2772 wrote to memory of 2572 2772 iexplore.exe 30 PID 2644 wrote to memory of 2772 2644 06a410454b1f0524ddf8df5e33201ed4.exe 28 PID 2644 wrote to memory of 1240 2644 06a410454b1f0524ddf8df5e33201ed4.exe 14 PID 2644 wrote to memory of 2972 2644 06a410454b1f0524ddf8df5e33201ed4.exe 31 PID 2644 wrote to memory of 2972 2644 06a410454b1f0524ddf8df5e33201ed4.exe 31 PID 2644 wrote to memory of 2972 2644 06a410454b1f0524ddf8df5e33201ed4.exe 31 PID 2644 wrote to memory of 2972 2644 06a410454b1f0524ddf8df5e33201ed4.exe 31 PID 2972 wrote to memory of 660 2972 cmd.exe 33 PID 2972 wrote to memory of 660 2972 cmd.exe 33 PID 2972 wrote to memory of 660 2972 cmd.exe 33 PID 2972 wrote to memory of 660 2972 cmd.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\06a410454b1f0524ddf8df5e33201ed4.exe"C:\Users\Admin\AppData\Local\Temp\06a410454b1f0524ddf8df5e33201ed4.exe"2⤵
- Adds policy Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\dfDelmlljy.bat" "3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD536465d106a381034e6d1b7583160226a
SHA17bd7e768b5aad49fdcb13eacb1e92a6af54ba92f
SHA256630754e068e8369a089f920a7b22cbf3ca350dd87e99e0d334af22018cabb3ba
SHA5129100bf7c8686467b42a67e2599ef38953bb9ccb45a0131bfe6d80be8377e8e4ec4e869ef3ac31a0b0a630c9f45dc5cba0806e1d29d465c82a2d6e9b6ae9e7757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c350814b2dc946b2b7d9dbdc0e97f10
SHA19975e16e4f9fab6dc9601744e6fd2cb8a68df6e8
SHA2564c64a4b0ad19d38ef54699a0f22e2a787bd10ee7dd8e261a44f58dc1bc0df453
SHA5128aa3acf542d0b34e58a0362733e066e31a117b5c01a3273a1c9f89b8c3767d47a725d010e0f169faaf81ed0f16bb6b88489f09247f6410c91efae29fd976e85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518fdc801482187713ebd3f6fdb026248
SHA15ce54adbe0029927a8b7194be2adc2c5cc22ca55
SHA25667e95a4470c6d9b380f7aece1fe85521690b0a98e3a2ce9b5c85e90f51cbf3e0
SHA51240775f643b6511c2a8cc0c6d2c5424c90c24409c136a8a393afe1e9f14589934c07a5b36726650b56f84153493ec0e29648acbfe959af3f9230add15abf3c2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd21ff19c4bb691ed5e5a19b02a234a5
SHA195669d1e2b7c2a5d71641b11771e6f617290e232
SHA256af9917fe033621012786a7845dc743856247d27bf8177e794f9a1e9155b6ac6e
SHA512291fafc36ddc433839ca631c013bcd943637ebd39df0b17d06bb0d532b2eab7396ae1ca7643abf02b5ce0df6dbfeb030d45c536f136dfd73727074ed40c649ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57270bf51011a57a749a935009aa18199
SHA11c3655e390397c0c4c2fda4f7299531619e33bf1
SHA2565dcd038bdda1bfbcb90e8649ac5893ea1e513ccb9e1460b9795a9738dcc7a901
SHA512bea12d2b398f6b1862762b3bf6d2b069489fa34726039c158e2aaa246505d49b59556aed0809335eea07ec8c103eb27d35af5a25de001e36c2363e702a563ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1499d3f87ac5471f4c634699050343
SHA135a07c13deb95bf1d0ad0ddea802c66882b20120
SHA25665c2434eb2b355dd5b715988bba7c870a45832ee353070b4c823a61914ca37fe
SHA512abd9f80187fbdd563bd16596d649a7f88f4874502171c38c37a4ed91dee3f13857c8aa48f4225b95c43701ac0a5ffdb42c3632cf92214abd1cc1c92caefee8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5161792f8e39f5365d7773e2a725c3340
SHA1e57b5cfeeeefe77030549552105f2976baf38480
SHA256ea09033e51fe8a36decff2c6524be2fc0d16a10f92885ef7ed4da5f52d181fc7
SHA51299f57d2e7478f4a003c48c324cd64930e0030f025997f8121aa1a934d876d4b19583dc74abac0964dbd99287e8218073ffdf9c38066559ff60e0b2f3f94949b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0cdf7cbed94734d657d1b0c5a88dc0f
SHA11195c8db2721a1d65f3066613a553e437f2c5a15
SHA2567b3d566a0f0bef46f54a90b8a7536a618e50156cc1493086415a23078b43e959
SHA512fa72a8ffe6d317f84745522af8af3fbe2412e8fbad07a34134cfc071cd58b2fb912c089e4dab63397ebb8aa5e094f2af9c8403201231606be4cd75fde12201dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5256266ee5ade0ff2fc10cb590c5ad756
SHA136e1ab783567eff6d24eab31880cefe416406ef6
SHA256e0d6f2b93b2151df7a89291d813f9240a4fc67be0a2686cd0fa931858d1e3815
SHA512207e0b94f294bd1282e227eae624b2b8734e50d2fa253f56bbc6c4f567632589ca6b0cfb88f3d5b34f0f9a0fa3f2f5efd6e290e1e832c8575fef4ad151a69623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922745de80a083dd8e7b58ae470445f9
SHA18ce6039ea317d6bc005eae4b7716d50588d85df3
SHA256d540e3ab11310e4337cf01a38b8ad21c0bc27865943c55f93242635dfda80170
SHA512217d025f821bb8216a9f3631ea20ce6d379b81c53e3088585433d8ed6313819788ba8730a7f27c772b8c2644b51e40374e837ee6166270cbaf7c214c62eb791a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed33fdde3b708d188804caf608f91230
SHA1870b7a05ab74dc88a8c3d21e08d67ef24f2da563
SHA2566454b7b47cb438cf2ba5625250ee89ec97f326b73e86a3b7af0304564bc64397
SHA512f3f3869d6cca38a90d03e1d9239871908664c42551daa586ece2e295e6205f529d28785b46190a00ad9cee0ad27ad4899cd02c520b4de68a1b12e9e7eba9bcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5187e52a78f674916ac4337bcf7a65c14
SHA1360f7c35e3929243d749544b064c38d37f171bb0
SHA256b0a47e8848e341eb08a4a13c7097d02a5f590de1d2e053fd84fb78175fec2c7f
SHA5123253f65e7f8b9ca3466248729de1b87c2f265b89ee29c5874b512b86cc658ced7b6f660245a0f67d691e4539dfd86cc004ba5dbf8a8dfa7e1d11105eadaad3c3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
205B
MD550cf598db4e0aa063c5278f03ff33e25
SHA15a50dd4493a8d878a298040df6aee820ecbaf095
SHA256697ca5b19ee635ef73f755118201af2d881e93e4e503775fcb2a9a66e265f98d
SHA5128edca7ed8fffdc20bc07d7805e7324d6e868b9b23f053931ea8ffb1b3408aeb0f58d0a1f8e10a64bbd6465afa65bbe4211c928a58c566d0e8acd8bfddbea20fc