Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
26c4e33b79015a26405848dcd5b9d868.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26c4e33b79015a26405848dcd5b9d868.exe
Resource
win10v2004-20231222-en
General
-
Target
26c4e33b79015a26405848dcd5b9d868.exe
-
Size
219KB
-
MD5
26c4e33b79015a26405848dcd5b9d868
-
SHA1
e0e21fb1f3d10fd089e12a4d5c7d3c75d94a580e
-
SHA256
528bca764d9437dc7ed387dbe2f6e3130c08260a67a956df866b98fda78f232c
-
SHA512
7377d52583a70ffa644d56dc666d002d18101d36b20980fcd90cda4ef591ee2b597885da5e3f1b646aaa963a5a0c0002ce0bad78343906a0f12660309e789174
-
SSDEEP
3072:Plku6A1l3K/uYU5MYbONT1RpjP2Plaz/Pu3o9ON7ACfTt2u4CcpS4ggP:Plt1l3K1U5MYG/pLil3uO5X4npjgC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000a90217f023efc9dfb95908ac6f1a3157bb3c37140d21dfbc016f4c475480cd5d000000000e80000000020000200000005bba7f6bdc6eb6f106a65f383a7e718095ddf371091ea2d481143835a7ba6c82200000002d09e05c7f2b292ca850d768eec54e39b809dc09e35f84c28177130ed6d2870d40000000f703e50412da2f09ba24fc96a454c53e22d0a41a162a6ff2860d0ba25c5207bbf128cbda786079c2b7167e14d9b420d1e4f660dbaaedde76e3c83bafec1f9ade iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD3AEFA1-ABB3-11EE-9853-CA8D9A91D956} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ba0399c03fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410611768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2144 3040 26c4e33b79015a26405848dcd5b9d868.exe 28 PID 3040 wrote to memory of 2144 3040 26c4e33b79015a26405848dcd5b9d868.exe 28 PID 3040 wrote to memory of 2144 3040 26c4e33b79015a26405848dcd5b9d868.exe 28 PID 3040 wrote to memory of 2144 3040 26c4e33b79015a26405848dcd5b9d868.exe 28 PID 2144 wrote to memory of 2704 2144 iexplore.exe 29 PID 2144 wrote to memory of 2704 2144 iexplore.exe 29 PID 2144 wrote to memory of 2704 2144 iexplore.exe 29 PID 2144 wrote to memory of 2704 2144 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\26c4e33b79015a26405848dcd5b9d868.exe"C:\Users\Admin\AppData\Local\Temp\26c4e33b79015a26405848dcd5b9d868.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.microsoft.com/windows/windowsmedia/br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b4440cfdd88d08162a580eb3994efda
SHA1d57f1d1f83343a24ae527781fbf85fcf138493a5
SHA25630121739087cb2b5e2339a01ebb0449a69ec1347c4602125aa0a6c374173d26d
SHA512986044909ed093266f7a1877e5d816ed9423010561ea0c4a58caa2c1767784a70a6fb9361314b659f7a0a8a7077b62c02d5d7473d936ba9ac8c2ed5b16e6defc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c108e0fffea9580d658c60cba079018a
SHA1f94ffde3c0fc3775106ccf609ab4e1f087d5ccf3
SHA2562f3b0aad7f2f9e865d92d7c6850166336328a91b39d66183fa825b178b81d0ff
SHA5128208fa8daad6fa39714da03f7277fc4cf8f3deb78ea2100b9376dc9db31d540f0fa28c56979ee39f93d3b2d17ac95c82ccd3af2b6a194d144100851f9f9320d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef3b970ac278cd8db4e622fc9ad29b54
SHA1cecb302e427d6db4004e76f9c2358fc98af2919a
SHA256bf7cf8599441f7e9a038c53cd06ac252391103fd28800b35e667ef2a77192b4a
SHA512545cecb1f3bfd2ec441fea2ff73162375bb64089664a0e5a7683b56ce4dbbd7d97e6b6c0fe87151e089249cc6458e70285436f867ce845bb5a9560814c0f209c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51715d6fe60abff67523d738df180e892
SHA1e8b76e3d973c8824087e016df04fa628053edc3b
SHA2568b01faa3f80771de91c85d9d6f1b9d5125b39eb8c964d27abe81795312d8b9ff
SHA5129ccead7517a54d9e936c12ac249fc3589de4adb442544c0b3065e43e1e4b8deb0eb285d5e88e80f64962fb923042fb363d4bf7672f7779de2a32f09fe8f5814d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377a11ca9b43e9056c6e410c81de8535
SHA11245889005c1c571dd0b09a108c80deeebd26b9c
SHA2569bfa1606e5f125452262e66229bd8ba2e89f6a987d0487ac6ad945c9bce90410
SHA5125edf35e5c7d72b080443ce5e2cf949c502964be0bfcf1fa7b036dbbcc853aed12e038b665b2abda41540f0f8f7d69a7201f5ef43ddb9af90ede4767af74bb6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553981f4b3afc050bb7332d2456420784
SHA1c781b906cee209cd7bd86f500f34b88a150476b1
SHA256ab300b4aa35acd7434ae31133e1794e24a855ccc6d1d159e711c4fcf4b1451a3
SHA5128581c78abf059ca7a9b9ff6e018c3e631167fe3f6d6a3c80d2b526b2c13a8408017515c7dec1e502989fc38311648d24a0e447b401d335e8246848e1a106c482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5620bf83ec13ae020242b51c2bb54d9b3
SHA16e451f8682318d2aef6b94ac59a016c348eadde3
SHA2565dd1b643dacf343ba6c659273a3451c5973587c8b72c3962378d16afe939dc44
SHA512e0d0c84b7ec29021492f788f916fe7192d11f5a4643ff76ec3636f0c745cc20f5e00a284f2ea419d4015bae0e630f0ffd8925a0e870d75ab1f3d403ed7728bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af386ada1e4b810180503bd97c654a37
SHA1b4ca77eade124f1943d8e260f630d5e2c33daf8e
SHA256a3d1cdfc19fc806f0954811e0d38884794431942211ce4710afe6ff9103ecd1e
SHA51245c34e8c636cba5846031c7ccb531be707002357685aed399457bd84a004c7334bcab57406c5c2e90fa642a2868dcaee7e75ea63f838f37876b558f28a3b037d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531dba9c33dc1fc5b05e446a7bdc8c7fc
SHA1a2d9c07a34f6cbd6c562d052d6ac78e6d91b854b
SHA25657e2f601fa12c35800a3c41899a4d17fc1e6342dfb4f755b21cc220eb121afd2
SHA512b726b8b7956d23caf9aa3ad79c85489f2a93ac4d5eaf49615fc48cac5c48098bc883e76062159b4266004db4d8028eff1799f481dac4c6c43f5303c424cca031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df22f95e5229c11aec132f092016856b
SHA1c2bf9be7d1e0b432be4f098a6b84b44cb683f8bd
SHA256c8fb0621c9f887443a3a7d1b9fb53347f4aeb7a2877e49980c27641b5ba325dc
SHA512d4a6564b1a7161b34390be441b6347c508ae4f802bf9f8b52623e6e0e2dbfb22e4b73dd36cd1d045ce9c36d7eae1d6fae6541b1b9a0e9123f432049cf8235f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541aa79c18e6d7ecf08a236145d4766c6
SHA15627604fdabbfd9c39744125c89ac89a567a07b7
SHA25649aae0514fefa8a7cf6e8218cb357afeba3ae5f55c364e6ef37bc8769dfb0ff3
SHA512891f1d9146c04c0470aa4ad0a06dc5b9ace97aea1821846d31fc39eabfb0b0dfe60f94dae74616cbfb2215ebc44813906e0e571aadc9b3fc4863ff3c2fc03d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c58a6d6ec727d4e6390d7f1d38386331
SHA1798559ccabdc6b9291c6573011418aa6df464e47
SHA2561cc72d5295c37819443474a74748eabcab2f7beb0d233c40c93e4a4edc91fbec
SHA5120a7f1466fe94a7dcfde01c482a8886a683d8f66756b91f861e6eef8351e2aea2f408322d112f4bc7d2028e3511b79bb22786a045cfa2101bd6f4ffb26aaa11e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d26d17b88b7f558336615cae2377d628
SHA14729fe530adb7e1eebb2ec3c4ccad40dbfb5bfb9
SHA256f8778c94ab63d3577d57dfb821420fe65666b445c9aca1ce846f8722aa2b0726
SHA51272d0c4bbe1f8fbc0a571175f84ca0d1e2e734de009ea3ee1e9cf3f6caccbcef117327b36d83777d9deaa36b2d4a511c291071988ed737751f6959d65280088b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed81c2ca10a007b31f19661b893561c0
SHA16476a6d720812fc929d7d01c326c058487cd3c22
SHA25678196636df9d336321929acf14e174b2824b51b4fb01be6a659497d053f8728c
SHA51232a67b57279ce71c6b2614c8e7c7b28cf960ec0ad4536c49976c26f77d8a438dae02c4a5c2b32d6c44fdbbc4b039e6366864df94bf84cd1abae77ff8e62e4eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594d3a329fac12a8725e3ba0408d33470
SHA11653fd8fd19c3277d0a33d05443aec8efbeef315
SHA25612c44117cc5736c684ecc832bbb0584563811d4432e45290c154d6d8456aafc8
SHA512220bb05d09e93f97bb86d6051aeef73bc5a756ac3666f231b5bab921e40f967e65d68b6504b18e7ee1f19fccd388301540eb68aa59458bda1727abc3e3c1b3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506955a28e7da10b18750a9e082a36a73
SHA11a6e2e4cb94d86bf92b2574cf3365fbce673d2dc
SHA2561a8536790fe6f3de00d5a3645cb179c4c6d059fc6c3ae004913fc6991db8ffd9
SHA512d5e952959741604364d6abd8894b0328692b3d6d910bbf6b1c9534a9a761d64995248896e232e6126e3dadfb49f6f7acd7acfdcbd4cb6fad67826aa3a0e9cbd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558a609be61a5fd48c587e5eeb142b84c
SHA1e64d75b7804e7630137e05a861b506cddd13d6d9
SHA2565fbefd1a7bd4b98be976353876d31e0ffbd50d27b67b61105b1f72d5c8cfaa83
SHA5125260b9b181cff4d63ec836c57a7aca1f07ccc7c3da200ba4b5a579ffe0dba27fb7a425e3e271dd24fd8b1e46d6ffdd8f17924b1d4f95d4df27d77601c5d0e401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55240358f4e997a4820feacb6e2e8a2ba
SHA1f3dda164c7e1db0b465a33cced2a452651e8d11b
SHA2560f84429b9fc4dafa9be52351abc3369b695ffea4f8d9d370a7befce1954de8c7
SHA512d93d765ea7335c8c2e0afcacab358a666b0d100ffae765f9c2bd8f4b5c8494c08d31b43bd20b5e7fd162898fe65dffe0f404c72c5a9a05734c9b29f834bbf492
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06