Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 13:26
Behavioral task
behavioral1
Sample
19fa4877aa1c78adeeb533a3cf2baea5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19fa4877aa1c78adeeb533a3cf2baea5.exe
Resource
win10v2004-20231215-en
General
-
Target
19fa4877aa1c78adeeb533a3cf2baea5.exe
-
Size
32KB
-
MD5
19fa4877aa1c78adeeb533a3cf2baea5
-
SHA1
d75afdd6fa3aa0ba480c0bfc4eb7707fe402ca78
-
SHA256
f93189551b6350bfccca998a53d81d334493c4a5f614f433dd5d3eced9593838
-
SHA512
a02956daa8c63600ad320894a7059c4c55e1e9c459bc8b967c63ae3ca69d13ac9d6be632dad53f765f33b57faf6f3998d7c9c37bccbc590c288097b59c70de99
-
SSDEEP
768:IGMMYw0PyHD1jSI4h5lgFrcP114lZaQv4cpSnbcuyD7U:INMYlyjAI4rlkcd14lZaQv/onouy8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2420-0-0x0000000000010000-0x0000000000031000-memory.dmp upx behavioral1/memory/2420-3-0x0000000000010000-0x0000000000031000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DOMStorage\adult.oo.lv\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02a1874693eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000f83a4a2d24a12ee09f392fabbb0cc001aaa32ba1e7f30457468bb1d6b22a2f39000000000e80000000020000200000005a3b3dcb02378916f9ea73d6dd1fe8d3abacdc5748d920ee6b00d323f1d025ce20000000c0e70375f114242f3e08365741434c224801c2cce033a26c2218be7b9b92923740000000aa47a76cb971ba0ce75ca4f666ed07464f538103770c95be49f8e17c99bc868a7d5854404c93105ca052763b7940287970af8d2847deb11694ab184a51dc9d42 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DOMStorage\adult.oo.lv IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = b104000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000ef9f17b98e7a68f2eaaafa99b4d254cb4ee86586cd3349597b3a9c86f0ece5b2000000000e800000000200002000000003708cdfd9b7d43cc09642de1f02264a733a232ea313a0de422e468f044696e0900000004972fd3cbc8045c800dd23d7332364cea01a13b72482b19b02fe963c480c8b2e98a4ee49b242877e52c44d84c6a0d5c877dce60e970396c09de193d6ed72f1d8ccd801b677ef7a1c963287bb0c24d2610529612ebb2ea9f338f8afbb5a20ec6764ec1e82bcc7100715b0744bc5f55490da0e6d76f7e3e222b89ea11f7b4bb88f22bd76dcf84b045b00be4f083af3f1a04000000045ad009bbe82182d7224b41c606c7d521e0984c677bb953d3868b75e43e89c16cc34291dafbdd6143a4ed50b67257bda51fb92cc3daededa7f7ff4c3dd502ccf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D324A81-AA5C-11EE-B331-6A53A263E8F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2784 iexplore.exe 2784 iexplore.exe 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 2784 iexplore.exe 2784 iexplore.exe 612 IEXPLORE.EXE 612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2320 2420 19fa4877aa1c78adeeb533a3cf2baea5.exe 28 PID 2420 wrote to memory of 2320 2420 19fa4877aa1c78adeeb533a3cf2baea5.exe 28 PID 2420 wrote to memory of 2320 2420 19fa4877aa1c78adeeb533a3cf2baea5.exe 28 PID 2420 wrote to memory of 2320 2420 19fa4877aa1c78adeeb533a3cf2baea5.exe 28 PID 2784 wrote to memory of 2676 2784 iexplore.exe 31 PID 2784 wrote to memory of 2676 2784 iexplore.exe 31 PID 2784 wrote to memory of 2676 2784 iexplore.exe 31 PID 2784 wrote to memory of 2676 2784 iexplore.exe 31 PID 2784 wrote to memory of 1176 2784 iexplore.exe 35 PID 2784 wrote to memory of 1176 2784 iexplore.exe 35 PID 2784 wrote to memory of 1176 2784 iexplore.exe 35 PID 2784 wrote to memory of 1176 2784 iexplore.exe 35 PID 2784 wrote to memory of 612 2784 iexplore.exe 36 PID 2784 wrote to memory of 612 2784 iexplore.exe 36 PID 2784 wrote to memory of 612 2784 iexplore.exe 36 PID 2784 wrote to memory of 612 2784 iexplore.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\19fa4877aa1c78adeeb533a3cf2baea5.exe"C:\Users\Admin\AppData\Local\Temp\19fa4877aa1c78adeeb533a3cf2baea5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\bKfSEOabB.js" "C:\Users\Admin\AppData\Local\Temp\19fa4877aa1c78adeeb533a3cf2baea5.exe"2⤵PID:2320
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:1258512 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:1389595 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b31eef1e047332abd4fb2eed2c0c141b
SHA157ae891ea2e2f6e31d5876480e54bddbcbdf5811
SHA256d3f611adf3c759ad80b780ad2b89fcb7453643a9e24503c4ed38a058cb9f1656
SHA512d86c4b5ef48cc8e6db44a26438d8e6f4b223b50590026b99e5207d9712d7ec84f398aaf45127f6630965eb0155e4adf8c5058fb0db8e4372c45a9b58bd295c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582dcb2f438c7d1ca47cf624484c7c525
SHA129ef05cb4f813ed17d0e02faf2fed1297f64f8f9
SHA2563d2da6824455ff32c925f395c8d8e06e2781c490c9dfa37e88ffaf355d986e83
SHA512c775bf1662803f0f45e272f7f2fd960af2bbcf12667cea15a53bff8c032899c8757f3fa4988c119fdf9216b434d8c2649273f432682247022f5de0447110cdf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53509a806ab89ecb93a0d18ac5fcb8a70
SHA16b94e26ccdb3fbca6e8208d76019d600a70c195f
SHA256059ac5cdcd944a9ba3b90244d76d015b0502275972b1c3230a64786c37c4683c
SHA5121ddbeab6ce412ca50ba44643cae51e5b13f63ec479cba53110fe90c3b4f4ce3807eb261e6ee75b1596c79061a638bcb0a0ea284022e3b6b46a9e4dd4456efc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c289cce8871abd5ae82c254b8d3c41
SHA17c077ddb97dd3227bb315865fe90f00df491caf0
SHA2562099473414a5e507cf77e9c74beffdb0861d1bd7a14ef6854dea12d7c42ce21a
SHA5128d8873212a9933e22c4f1a467340f3ca930f462669dc8dca250d711ff278127515c0592bfe21bdbb6a0437e72839a80839c51e8ab3ac2f920477b4b174b6a629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124058a13b616b6844f75fbee8a25e5b
SHA19753a6eabcc0ffde8594c095a3c2c0cf9c0b240e
SHA25633cd8bd668d8e4d258355abd569c00f5d8b75d528047a3ae7d35a68c849e5eb2
SHA512d6280c9f2e6f17e9d0ca9ec75d9d5162f3e0b3e2fc8f4a826d58fb439d2af78316fc24ce7106265fc626a5b5a43024e49bec10e2fc0a5f6b2984da7589d9ca17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a20bab6feab23d0dc4c62f1cbb3e3321
SHA152db3a1223c13a592f4d8c8fb3eb3cd47130b0a4
SHA256624ddc474c89b380010515667292ad68ecd54ec38040fe6ec9e998239f29c489
SHA512555889d4f6dcbb90e36d88668c0c0abfb7b273c8f95c4066bc6a21611333058ecbf90b662bdb166cc6a07771731eb3956a581fb1c2d03f52672dc440dd608858
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\favicon[1].htm
Filesize291B
MD5b73189024a094989653a1002fb6a790b
SHA10c44f096cd1fec253c1fe2fcfcd3c58fe05c402d
SHA256014c471c07b2bc1b90cf5b46eb8eb60abe3ac278e43cd8fcc7c4e6c8950c592d
SHA5121bca726835d33847812060c968e5306535f513429de5c90d66942155fd42ff75508dba97da8ca36c6d6e6a8df5a2602fe3be047bb5612ad4e367c6c00e1e50a3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
15KB
MD50675193a4d63893ba814e941ed10e663
SHA1dfbd0e0525f99545e6920dc4ec2981a2e56ff335
SHA2561cd0b8cac74843422570e54ecd42aab967b228aee1533658d4656445b9f03acd
SHA512a925676e2e319f5575389e0e300e1f039f9ba0c5b3de16ec6a5da8925824bb84f327b8467643b25a6087217b42c1cf320d24cd78063897e1f693549422763c93