Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
179c225bcff75d26ca4577d77732f67d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
179c225bcff75d26ca4577d77732f67d.exe
Resource
win10v2004-20231215-en
General
-
Target
179c225bcff75d26ca4577d77732f67d.exe
-
Size
26KB
-
MD5
179c225bcff75d26ca4577d77732f67d
-
SHA1
5e96cf772e4143e28cdd7693319c7d0d704ea305
-
SHA256
93d63a89c3831bd2c922accb28ce7b02ab18e92c9856eaa465c09102f4d74a96
-
SHA512
638af6d8b499af41993536ef0a5d21cfbb929765cec9009ce7579fc53c53835b78f2f91c75281c04ad5add2db57f548ea0ff12c5cd772dc8dfbc46faba183729
-
SSDEEP
768:cf7T23HlfKG3hT/sCWTxVsIhxN0qfFXGn:kH2Xl39EdL92n
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys 360safe.pif -
Executes dropped EXE 1 IoCs
pid Process 2332 360safe.pif -
Loads dropped DLL 2 IoCs
pid Process 1332 179c225bcff75d26ca4577d77732f67d.exe 1332 179c225bcff75d26ca4577d77732f67d.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\360safe.pif 179c225bcff75d26ca4577d77732f67d.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9F006A1-0028-11D6-99C1-56B3956C75C7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1332 179c225bcff75d26ca4577d77732f67d.exe 1332 179c225bcff75d26ca4577d77732f67d.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1332 179c225bcff75d26ca4577d77732f67d.exe Token: SeSystemtimePrivilege 1332 179c225bcff75d26ca4577d77732f67d.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 800 IEXPLORE.EXE 800 IEXPLORE.EXE 800 IEXPLORE.EXE 800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2068 1332 179c225bcff75d26ca4577d77732f67d.exe 28 PID 1332 wrote to memory of 2068 1332 179c225bcff75d26ca4577d77732f67d.exe 28 PID 1332 wrote to memory of 2068 1332 179c225bcff75d26ca4577d77732f67d.exe 28 PID 1332 wrote to memory of 2068 1332 179c225bcff75d26ca4577d77732f67d.exe 28 PID 2068 wrote to memory of 1972 2068 cmd.exe 30 PID 2068 wrote to memory of 1972 2068 cmd.exe 30 PID 2068 wrote to memory of 1972 2068 cmd.exe 30 PID 2068 wrote to memory of 1972 2068 cmd.exe 30 PID 1972 wrote to memory of 2356 1972 net.exe 31 PID 1972 wrote to memory of 2356 1972 net.exe 31 PID 1972 wrote to memory of 2356 1972 net.exe 31 PID 1972 wrote to memory of 2356 1972 net.exe 31 PID 1332 wrote to memory of 2376 1332 179c225bcff75d26ca4577d77732f67d.exe 34 PID 1332 wrote to memory of 2376 1332 179c225bcff75d26ca4577d77732f67d.exe 34 PID 1332 wrote to memory of 2376 1332 179c225bcff75d26ca4577d77732f67d.exe 34 PID 1332 wrote to memory of 2376 1332 179c225bcff75d26ca4577d77732f67d.exe 34 PID 2376 wrote to memory of 2388 2376 cmd.exe 33 PID 2376 wrote to memory of 2388 2376 cmd.exe 33 PID 2376 wrote to memory of 2388 2376 cmd.exe 33 PID 2376 wrote to memory of 2388 2376 cmd.exe 33 PID 2388 wrote to memory of 2368 2388 net.exe 35 PID 2388 wrote to memory of 2368 2388 net.exe 35 PID 2388 wrote to memory of 2368 2388 net.exe 35 PID 2388 wrote to memory of 2368 2388 net.exe 35 PID 1332 wrote to memory of 2672 1332 179c225bcff75d26ca4577d77732f67d.exe 36 PID 1332 wrote to memory of 2672 1332 179c225bcff75d26ca4577d77732f67d.exe 36 PID 1332 wrote to memory of 2672 1332 179c225bcff75d26ca4577d77732f67d.exe 36 PID 1332 wrote to memory of 2672 1332 179c225bcff75d26ca4577d77732f67d.exe 36 PID 2672 wrote to memory of 2796 2672 cmd.exe 38 PID 2672 wrote to memory of 2796 2672 cmd.exe 38 PID 2672 wrote to memory of 2796 2672 cmd.exe 38 PID 2672 wrote to memory of 2796 2672 cmd.exe 38 PID 2796 wrote to memory of 2648 2796 net.exe 39 PID 2796 wrote to memory of 2648 2796 net.exe 39 PID 2796 wrote to memory of 2648 2796 net.exe 39 PID 2796 wrote to memory of 2648 2796 net.exe 39 PID 1332 wrote to memory of 2856 1332 179c225bcff75d26ca4577d77732f67d.exe 41 PID 1332 wrote to memory of 2856 1332 179c225bcff75d26ca4577d77732f67d.exe 41 PID 1332 wrote to memory of 2856 1332 179c225bcff75d26ca4577d77732f67d.exe 41 PID 1332 wrote to memory of 2856 1332 179c225bcff75d26ca4577d77732f67d.exe 41 PID 2856 wrote to memory of 2688 2856 cmd.exe 42 PID 2856 wrote to memory of 2688 2856 cmd.exe 42 PID 2856 wrote to memory of 2688 2856 cmd.exe 42 PID 2856 wrote to memory of 2688 2856 cmd.exe 42 PID 2688 wrote to memory of 3032 2688 net.exe 43 PID 2688 wrote to memory of 3032 2688 net.exe 43 PID 2688 wrote to memory of 3032 2688 net.exe 43 PID 2688 wrote to memory of 3032 2688 net.exe 43 PID 1332 wrote to memory of 3024 1332 179c225bcff75d26ca4577d77732f67d.exe 47 PID 1332 wrote to memory of 3024 1332 179c225bcff75d26ca4577d77732f67d.exe 47 PID 1332 wrote to memory of 3024 1332 179c225bcff75d26ca4577d77732f67d.exe 47 PID 1332 wrote to memory of 3024 1332 179c225bcff75d26ca4577d77732f67d.exe 47 PID 3024 wrote to memory of 2716 3024 cmd.exe 44 PID 3024 wrote to memory of 2716 3024 cmd.exe 44 PID 3024 wrote to memory of 2716 3024 cmd.exe 44 PID 3024 wrote to memory of 2716 3024 cmd.exe 44 PID 2716 wrote to memory of 2588 2716 net.exe 45 PID 2716 wrote to memory of 2588 2716 net.exe 45 PID 2716 wrote to memory of 2588 2716 net.exe 45 PID 2716 wrote to memory of 2588 2716 net.exe 45 PID 1332 wrote to memory of 2608 1332 179c225bcff75d26ca4577d77732f67d.exe 48 PID 1332 wrote to memory of 2608 1332 179c225bcff75d26ca4577d77732f67d.exe 48 PID 1332 wrote to memory of 2608 1332 179c225bcff75d26ca4577d77732f67d.exe 48 PID 1332 wrote to memory of 2608 1332 179c225bcff75d26ca4577d77732f67d.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\179c225bcff75d26ca4577d77732f67d.exe"C:\Users\Admin\AppData\Local\Temp\179c225bcff75d26ca4577d77732f67d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c net stop McShield2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\net.exenet stop McShield3⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield4⤵PID:2356
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop KWhatchsvc2⤵
- Suspicious use of WriteProcessMemory
PID:2376
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop KPfwSvc2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net.exenet stop KPfwSvc3⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KPfwSvc4⤵PID:2648
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Symantec AntiVirus"2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net.exenet stop "Symantec AntiVirus"3⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus"4⤵PID:3032
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Symantec AntiVirus Definition Watcher"2⤵
- Suspicious use of WriteProcessMemory
PID:3024
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "McAfee Framework ·þÎñ"2⤵PID:2608
-
C:\Windows\SysWOW64\net.exenet stop "McAfee Framework ·þÎñ"3⤵PID:2540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfee Framework ·þÎñ"4⤵PID:2560
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Norton AntiVirus Server"2⤵PID:2576
-
C:\Windows\SysWOW64\net.exenet stop "Norton AntiVirus Server"3⤵PID:1924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Norton AntiVirus Server"4⤵PID:2348
-
-
-
-
C:\Windows\SysWOW64\360safe.pifC:\Windows\system32\360safe.pif2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:2332 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:800
-
-
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\packet.dll /e /p everyone:f2⤵PID:1704
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\pthreadVC.dll /e /p everyone:f2⤵PID:2180
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f2⤵PID:3040
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f2⤵PID:2640
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f2⤵PID:2728
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\drivers\acpidisk.sys /e /p everyone:f2⤵PID:844
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\wanpacket.dll /e /p everyone:f2⤵PID:1944
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Documents and Settings\All Users\¡¸¿ªÊ¼¡¹²Ëµ¥\³ÌÐò\Æô¶¯ /e /p everyone:f2⤵PID:2132
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1532
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:23⤵PID:332
-
-
-
C:\Windows\SysWOW64\net.exenet stop KWhatchsvc1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KWhatchsvc2⤵PID:2368
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec AntiVirus Definition Watcher"1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus Definition Watcher"2⤵PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d13bcbe7a7869935c27deb4db9f52f10
SHA14dd526602f7245e810d177da3f41621e50459ada
SHA25612032736cbec35eb09c3068afafc90253cc4acf7c264795eb6221dd808d98e2c
SHA512fc97654c0b81c97d2998dbb79cefa60fabc6dc072578b9b5c53e735440c59293407e4f36a0745426072833fc5adb5db12eeb687c3a664f38345b9c4278c02e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5f8530615d3897267d3d27acaf5836c
SHA168bf7d34e1fdfb8e10cd3083ad6b01b277e3ec72
SHA2566b312dc789746744ea6f738f951740aa0bf069b0b6613f7701355f0486d5ed85
SHA5123220b734265dc6e75619836c6f2b7a2b558eeeb2b2f63260ce37d38e5c15ea428490b6f37e5fe078f5c1cc4d21c4d75efb07fed442180a86782a1483419a99da
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A9F006A1-0028-11D6-99C1-56B3956C75C7}.dat
Filesize5KB
MD52ec68152c7bcf16c0dc952f32ae50366
SHA151241891728bfa7e76fae2087cf69e7dcdfdfa64
SHA256a20afca755e1dbd82529048205393ec7e228f7ebe83f543b1ee5f65218dac585
SHA51248dabb803ea9027251dcaa970c00bc672a49487e64760cc1b92b96da1ce21fb9373893148171799723e073769a52f97b212f429818ca0c8901846b56478020f4
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{A9F006A3-0028-11D6-99C1-56B3956C75C7}.dat
Filesize3KB
MD50766cae17cd7abbe57d48ee076ea58dc
SHA170671e7499e9df65bed18e241da955da094ff354
SHA256843d35ff9f0d20b46659c9952ac8cce7ebc3c704620c1caadb60d7de71044baf
SHA5124bec4732d1ae9f5eef0704618e818d72fea76fa44eb7e9c3a82e02f73b49a60215b9fe9965d1a7b2b6adf76e4771a50746f4c6d63230e459f07704460e261b7f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B4E68B60-0028-11D6-99C1-56B3956C75C7}.dat
Filesize3KB
MD585ec75f5bc0a1bc8e77c44e8b6f99ccf
SHA1c5a57cf6b1e434cbee310783bf4d90aabfa66a24
SHA256b71cb21fbb525232bc18903cf6093887f5d3e09b427529cffa668b6adfbe95df
SHA512e4cf28f09deb267d64749b1dbad651cae387b211eb7c801475d0f36ac5a8122ffd1d88e540b24d70834d897deb9b9d0609179e099f13c8f2a603ab64759ff42f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
4KB
MD5b8f28133525c53a754c4c9b6e76f0ca6
SHA18fa6e2b123fbbefea1cf5d3af04c73a81f73f5a4
SHA25656b6985ef209c84cc7015fbffd6200829f2893d4c985c9b48caaf42662553a48
SHA5127e225e7c585eac3ce1a50f378fe8932601df84fbd535c32323743216e33f15cadf32e6a0cca3a00a1fe0a027cd639db3a3260a38d7775c4d2a58aa8601074a40