Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:32
Behavioral task
behavioral1
Sample
284aefd07e87dfb016d71d9cb494fa96.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
284aefd07e87dfb016d71d9cb494fa96.exe
Resource
win10v2004-20231215-en
General
-
Target
284aefd07e87dfb016d71d9cb494fa96.exe
-
Size
13KB
-
MD5
284aefd07e87dfb016d71d9cb494fa96
-
SHA1
c627e058da2a4486abd9179dedafd4cb8dbdb5ad
-
SHA256
2212fdf2e7374dc0fd48be78b4b1aae202249353332894bd6f0258781aee34aa
-
SHA512
6164a4193a3146aafa48174675a1259407910162feb20eec5a7f5f8cb965c52172884c28aaa6bd1782b938ded931d20c8b537829ae809a97b4cb5f45eac36808
-
SSDEEP
192:+S4gbgkAN4SJj+bfrJsUwv7E6sGWaUFu7Br9ZCspE+TMIr3/bjOg+vtwJrJN:+S4uI44aJ+7NsAELeME/bjl
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2776-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2776-1-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c0000000002000000000010660000000100002000000084d92b63e48e73d4773bbfae010b6e5e792ede47c1493984b6f6cf1e3b2d875f000000000e80000000020000200000008c0466da7747ae350dad6c6de5096516a21d9dfa15344e4b94fc926070840d8f20000000e1ca985088017041526c303bcaf6c8f0c6889a66393f72e97604e88a1b4bdf2440000000607a4b5e85206d42272bb7cb8f8fa090063924742203a7b5fcad844af15ca5f06159f49616ec55321b84278b1014189c8ff25267332878e9c5180bb1dc61f05a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410335480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605d6d473d3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71959991-A930-11EE-B8EF-46FAA8558A22} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2776 284aefd07e87dfb016d71d9cb494fa96.exe 2436 iexplore.exe 2436 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2436 2776 284aefd07e87dfb016d71d9cb494fa96.exe 23 PID 2776 wrote to memory of 2436 2776 284aefd07e87dfb016d71d9cb494fa96.exe 23 PID 2776 wrote to memory of 2436 2776 284aefd07e87dfb016d71d9cb494fa96.exe 23 PID 2776 wrote to memory of 2436 2776 284aefd07e87dfb016d71d9cb494fa96.exe 23 PID 2436 wrote to memory of 2304 2436 iexplore.exe 22 PID 2436 wrote to memory of 2304 2436 iexplore.exe 22 PID 2436 wrote to memory of 2304 2436 iexplore.exe 22 PID 2436 wrote to memory of 2304 2436 iexplore.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\284aefd07e87dfb016d71d9cb494fa96.exe"C:\Users\Admin\AppData\Local\Temp\284aefd07e87dfb016d71d9cb494fa96.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=432⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534bbd879cba9a905aa3216a2d3f5c63d
SHA16e008834bb5dfd94cff750600f6f675594f7adc8
SHA25634dd86447da4faeb2a985ec4c705438740bf0551af0b4dc8ba0b88e00ff9d2d3
SHA512c343b0c0cee4bcc08b14358dedd96de891eafcc0085c9355ab6d5aca474fa50f53e5db029004c78cb2464e1518bb9649682df6b4b4d45d51c7371001fe4ab030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd77095b52213572d0152232c8968252
SHA1c979dba1929340ade58fc54ee30aca8d63bbd0d1
SHA25693e15ede3fefacb4589eb868e9680ebac87dd7863b1e069b44f028df62773710
SHA512dec8b8025e1966c6448c6619b6d664db64a1e6deb5073f9370a17c3bf01452c7b3be52bea67353edf8ff290b999684bea5aa7436d77be4a71d2abb56cf6fa395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5235ab53282fbd6713f21385085c20067
SHA11b0c55865aa9f3f6f653fc09d7e186a11d100083
SHA256bdb3bea1dea3b4ef81972f8cd688434cc9038c6405a3521a5da6100b5882a7e5
SHA512c2b3bce0ff71dac10814f6315d25b03b9a8c8cbf874c5e9b04a2d550eecbb4d5b07b870f73211c4e6b62b5a7bc4f01c1f6b3c27b3f0813bbfd7ef829cebd44de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54af393acc8d649fc3177ada04898b55e
SHA1c7d229ec123a8e14073a107d450cce4487d2a8d4
SHA256750ed6000f5bf862495348159f34f914ca62a042652573050b07d494236e5488
SHA5125caa6d3b9e5abde8d1a3a176f6ffcf010244956ae9386d32af1250c6bf80acd6551d47835e8bffc4dd9902f5ec92e0034e58e9a80845af20f21261f88fdd0357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d64a71f1cc1cde15fb8e3eb32a46f92
SHA1a92045fb43b3eda43fa67c0440e2cc80f755b1d1
SHA256af7e55b3dbc2908145975bff3ffc63b68f2987701ef8b1550a8bbc7459bb6726
SHA512cf18f449585d7312df7530d05e9fefc6b8215edcb84a75381ccf17e7c1054ac0f4dd519e6f22d61315f136fae490fb54e24f031c052d8f8739a35e14192f1dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b2b2944b2f06f3693d8378ce62ab7a8
SHA1726c9a6090651d984fd47497cb5f2b1a24747ff9
SHA256642e3e7ee449e7bff5fdfdf1f18e3343dd1f487db68b5186c103ec79899d7838
SHA512983f8074fc440a937f4c03fe7cc067ccaa81a58c54c29359991c468616ac8ff30adb7649f53e018fcadecad686555869f9b53885d97f8580c550dcdc42b5f5e7