Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:53 UTC

General

  • Target

    063159b0fdc7f018ef67d9fce5a474d1.exe

  • Size

    39KB

  • MD5

    063159b0fdc7f018ef67d9fce5a474d1

  • SHA1

    52e768e6f7e1158ea9048c27ffb9c7c3f4288cdc

  • SHA256

    c604f076eccd12399592a23f3f7f3bcbf6963937f356be19767ea92c9bcc3de8

  • SHA512

    d8cc3e286840f81ff2ff49276355ce9d4aea38f32a532e5a961af8dd2a8a640b2af8963cf58e8ec7612651f124dd7e9d8c863f55d5e1b04cece0068f2f3844eb

  • SSDEEP

    768:AFQ6iz8orPRcO3qlZ9MT1Xl9eGn8qSKdNFz9A8i9lo0o/qeU:cLixbqlHM5XHeR8NzA8Iq00

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\063159b0fdc7f018ef67d9fce5a474d1.exe
    "C:\Users\Admin\AppData\Local\Temp\063159b0fdc7f018ef67d9fce5a474d1.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2668
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\063159b0fdc7f018ef67d9fce5a474d1.exe"
      2⤵
      • Deletes itself
      PID:2508
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2732

Network

  • flag-us
    DNS
    api.bing.com
    iexplore.exe
    Remote address:
    8.8.8.8:53
    Request
    api.bing.com
    IN A
    Response
    api.bing.com
    IN CNAME
    api-bing-com.e-0001.e-msedge.net
    api-bing-com.e-0001.e-msedge.net
    IN CNAME
    e-0001.e-msedge.net
    e-0001.e-msedge.net
    IN A
    13.107.5.80
  • flag-us
    DNS
    www.microsoft.com
    iexplore.exe
    Remote address:
    8.8.8.8:53
    Request
    www.microsoft.com
    IN A
    Response
    www.microsoft.com
    IN CNAME
    www.microsoft.com-c-3.edgekey.net
    www.microsoft.com-c-3.edgekey.net
    IN CNAME
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    IN CNAME
    e13678.dscb.akamaiedge.net
    e13678.dscb.akamaiedge.net
    IN A
    2.17.5.133
  • flag-us
    DNS
    iexplore.exe
    Remote address:
    92.123.128.194:80
    Response
    HTTP/1.0 408 Request Time-out
    Server: AkamaiGHost
    Mime-Version: 1.0
    Date: Sat, 30 Dec 2023 12:22:37 GMT
    Content-Type: text/html
    Content-Length: 218
    Expires: Sat, 30 Dec 2023 12:22:37 GMT
  • flag-us
    GET
    http://www.bing.com/favicon.ico
    iexplore.exe
    Remote address:
    92.123.128.194:80
    Request
    GET /favicon.ico HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like Gecko
    Host: www.bing.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Cache-Control: public, max-age=15552000
    Content-Length: 4286
    Content-Type: image/x-icon
    Last-Modified: Mon, 01 Jan 1601 00:00:00 GMT
    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    X-MSEdge-Ref: Ref A: FF7F9C6CB1714EC59EFAB3D4C612DCB2 Ref B: LTSEDGE1121 Ref C: 2023-01-04T16:48:40Z
    Date: Sat, 30 Dec 2023 12:21:57 GMT
    Connection: keep-alive
    X-CDN-TraceID: 0.c2777b5c.1703938917.37e6319d
  • 92.123.128.194:80
    www.bing.com
    http
    iexplore.exe
    440 B
    638 B
    9
    5

    HTTP Response

    408
  • 92.123.128.194:80
    http://www.bing.com/favicon.ico
    http
    iexplore.exe
    640 B
    5.1kB
    9
    7

    HTTP Request

    GET http://www.bing.com/favicon.ico

    HTTP Response

    200
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    1.4kB
    7.8kB
    15
    13
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    899 B
    7.9kB
    12
    13
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    831 B
    7.9kB
    10
    13
  • 8.8.8.8:53
    api.bing.com
    dns
    iexplore.exe
    58 B
    134 B
    1
    1

    DNS Request

    api.bing.com

    DNS Response

    13.107.5.80

  • 8.8.8.8:53
    www.microsoft.com
    dns
    iexplore.exe
    63 B
    230 B
    1
    1

    DNS Request

    www.microsoft.com

    DNS Response

    2.17.5.133

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\jjjydf16.ini

    Filesize

    110B

    MD5

    84cfe80eeb0798b904f2343f29307f66

    SHA1

    0ac39599b78605e815c51abf3c3aa6963f72b86e

    SHA256

    c80370e44b7838477d3d2a01f5e0b7af464594dc7a35ad91a5209e7dbbf4d598

    SHA512

    fbb907a8b56e55e5d6f644135b5bc505e43dd5860ea2380dd23770bcec5249bf3b4c22ae1d04b491777c780fb2448cf3b5a1a4aed8efc302754dd390a7dd7080

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    32KB

    MD5

    8fe278bd8eac660d0161a869da96b8d8

    SHA1

    eac6f73862d89fc8c49b5331cabe89b6a57019b1

    SHA256

    e8a6de34603eb9e91ba82f555080758e480ab044ffa9c140028706f916eb2c0a

    SHA512

    b180b8df22e421493dcc75a2caed123f7c7756295f691579ea5c426c741f80e381b4960b5cbd6b5e87547d75e44ab654d1c4704fe34b4b743a57f334bd05846c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94ac1c21c77c5dc9c198eb55800cae4c

    SHA1

    f7f57a76927beb1fab8445de386a7f34d6988e8d

    SHA256

    fdea905e2383374599981e7c215f669ef4e54e31f40e6168ad1ea3f70c7950c9

    SHA512

    c4504843c0b45ab60848a80172dccb5dc20785b7e6d0d118b00bdc3ddc6a560f3cc2b86856ba2695e03f84791783e0adef2ff14e8df0bee9e88e4314b476bb3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • memory/2236-0-0x0000000000130000-0x0000000000161000-memory.dmp

    Filesize

    196KB

  • memory/2236-12-0x0000000000130000-0x0000000000161000-memory.dmp

    Filesize

    196KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.