Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
130be10e503004cb652d838cb28d985e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
130be10e503004cb652d838cb28d985e.exe
Resource
win10v2004-20231215-en
General
-
Target
130be10e503004cb652d838cb28d985e.exe
-
Size
441KB
-
MD5
130be10e503004cb652d838cb28d985e
-
SHA1
97735414841cce2b6e01dcbec55866cf393b9858
-
SHA256
cfeae44425361dc32d4293313d7d380f3a07ef174fe0ceb0e0006f7181c87f72
-
SHA512
c0754d3f44f824c048c649cfd30df2a2bbe5609be9014f42106927c9798857643d202a1f61d9ecf23604581dc62f517107cf3ca4397cabd448fc22efe1c33367
-
SSDEEP
12288:3+i4OPDSTX0dZ+XPhFaioyyRhX9y/i5GDQrf:upbQprBff
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2692 TMP.exe 2708 is-1OI55.tmp -
Loads dropped DLL 3 IoCs
pid Process 2692 TMP.exe 2708 is-1OI55.tmp 2708 is-1OI55.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1212 set thread context of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\TMP.exe 130be10e503004cb652d838cb28d985e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2660 1808 WerFault.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000003e18df8ea3243e6a45a7907957487b24140d89832e38cf6fee99c1e6ca615085000000000e8000000002000020000000d7210747f41bf61406c60aeb5d7ddbe189a45da5ff66107e5276b68878c2946a200000009151739fa855c4e78f148d90a7ef10402f5e39214de5960d11437a8dbfb21e2f400000009255af180aa4d78647b9fa00cb1002a874b4dae7c24cccd93b4b6111b6591af23ab5271a21073f39796eac9442370818f03e63d97ecae78d088a07b5c4b80050 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BED1EC41-A7AF-11EE-8AA0-CE9B5D0C5DE4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b009eb95bc3bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410170245" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1212 130be10e503004cb652d838cb28d985e.exe 2552 iexplore.exe 2552 iexplore.exe 704 IEXPLORE.EXE 704 IEXPLORE.EXE 704 IEXPLORE.EXE 704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 1808 1212 130be10e503004cb652d838cb28d985e.exe 19 PID 1212 wrote to memory of 2692 1212 130be10e503004cb652d838cb28d985e.exe 17 PID 1212 wrote to memory of 2692 1212 130be10e503004cb652d838cb28d985e.exe 17 PID 1212 wrote to memory of 2692 1212 130be10e503004cb652d838cb28d985e.exe 17 PID 1212 wrote to memory of 2692 1212 130be10e503004cb652d838cb28d985e.exe 17 PID 1212 wrote to memory of 2692 1212 130be10e503004cb652d838cb28d985e.exe 17 PID 1212 wrote to memory of 2692 1212 130be10e503004cb652d838cb28d985e.exe 17 PID 1212 wrote to memory of 2692 1212 130be10e503004cb652d838cb28d985e.exe 17 PID 1808 wrote to memory of 2660 1808 130be10e503004cb652d838cb28d985e.exe 18 PID 1808 wrote to memory of 2660 1808 130be10e503004cb652d838cb28d985e.exe 18 PID 1808 wrote to memory of 2660 1808 130be10e503004cb652d838cb28d985e.exe 18 PID 1808 wrote to memory of 2660 1808 130be10e503004cb652d838cb28d985e.exe 18 PID 2692 wrote to memory of 2708 2692 TMP.exe 16 PID 2692 wrote to memory of 2708 2692 TMP.exe 16 PID 2692 wrote to memory of 2708 2692 TMP.exe 16 PID 2692 wrote to memory of 2708 2692 TMP.exe 16 PID 2692 wrote to memory of 2708 2692 TMP.exe 16 PID 2692 wrote to memory of 2708 2692 TMP.exe 16 PID 2692 wrote to memory of 2708 2692 TMP.exe 16 PID 2708 wrote to memory of 2552 2708 is-1OI55.tmp 34 PID 2708 wrote to memory of 2552 2708 is-1OI55.tmp 34 PID 2708 wrote to memory of 2552 2708 is-1OI55.tmp 34 PID 2708 wrote to memory of 2552 2708 is-1OI55.tmp 34 PID 2552 wrote to memory of 704 2552 iexplore.exe 32 PID 2552 wrote to memory of 704 2552 iexplore.exe 32 PID 2552 wrote to memory of 704 2552 iexplore.exe 32 PID 2552 wrote to memory of 704 2552 iexplore.exe 32 PID 2552 wrote to memory of 704 2552 iexplore.exe 32 PID 2552 wrote to memory of 704 2552 iexplore.exe 32 PID 2552 wrote to memory of 704 2552 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe"C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\TMP.exeC:\Windows\TMP.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exeC:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\is-0BAA9.tmp\is-1OI55.tmp"C:\Users\Admin\AppData\Local\Temp\is-0BAA9.tmp\is-1OI55.tmp" /SL4 $A0118 "C:\Windows\TMP.exe" 53192 522241⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.eset.com/download/index.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 361⤵
- Program crash
PID:2660
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5130ff6efe58b9ee240a8d994cab9d736
SHA1ed71c496e2f7337882bca8c3b649cdc87d0aaedc
SHA256bc5843cba22e2ab0244de0a1c44301132d77fc9eb6c9f271e9128e50f0dcf656
SHA512e503dbe711c500eee863f33d90a2260ac261331a2216396fd7b07bdedfa2b2c1ddd6443b5139456034a37c9072c46f6301b49d4fcd9005b212e32da0a861faf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57640abedbcef73e28ba26fff255d50f4
SHA111e7b17846325131f75c788fb82f1d511233a3c5
SHA2565a6f3c278dc8142af1892b6569455cd8ca6a8f5fe75b331da67c5fb9542e01ab
SHA51266ed3774ed300d5c9ee0e0068b50a4cc94b8c4e5917cbac433c858bd7b22c4365094f831ec8a6031caca24dd8ff8b20e55047ab1825ab8f6244e16276a7e8ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55efe659005f544a49860599e38ba42fe
SHA15e475a7efd06028e9804271ed8d32a85b3224756
SHA25604f3f6594be561e4c18221b7d2fb276d689a9392de21d4dc84a0828a75e207fd
SHA51258856658c2b03f3f624d1e9b5dfecd3fa87a306146d94eb80f2ae0681e6576abf23692cff8a2d0c5d3a513f2bc02441c9d6aacaa4ea3ddb3e58c3eae207312a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5613f893a46b43eaa3c76645c1ace5292
SHA14241dfb58afbd9a3ed85bb3f51bb20b9564b2728
SHA256b43e3623264b6845fbb57fd2159a17fc4498d852a55334165ff36d6594d41221
SHA512280a25805766f95003743f726d9359af0ef332d8c7798fdaf747b582ea9fcc40a287e285a24eb3c278dffdf411d4d4d274b363b9f02716a8043687e17b021be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bed8deaf9646a1493c09433fa18ed66
SHA14b76e6af195890d8a5dfc73b60ecea9bcb7350aa
SHA256f3f45b4b3846dbb6590d6a2ce9ecd092957901804d121d9738aef9cba43c0ad9
SHA512d340d0e847724984f6f6038db57a074deac0ab29a0cce6f68b2e60aaeadcd2fb823c19b275f756e6e44f83a27927fd404f105ae6ee2d6c3071375cdca45acebb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
93KB
MD5ec6099f55e3a703b32194f501f0281a1
SHA13076854190b5376a1a90ca8ff25d53f03f4d0cff
SHA25666407e6a06eb6c49900204f9a96b2128451496ce567bfb8a98c76636b4d44fa7
SHA5121b2c5b146a084ecabc95b9125e807cb9dc67a56060b04ee8735d061aa95a6c7fe3d36c9c31ced0d63130eaed9a6521b846d0bb200794989499fe500a115d7aa1
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3