Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:14
Behavioral task
behavioral1
Sample
396b93695a362b51e3f069a65fc351b2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
396b93695a362b51e3f069a65fc351b2.exe
Resource
win10v2004-20231215-en
General
-
Target
396b93695a362b51e3f069a65fc351b2.exe
-
Size
284KB
-
MD5
396b93695a362b51e3f069a65fc351b2
-
SHA1
800ce16aaa0bb232de55d9ece842f547c34b69da
-
SHA256
ee588a9db219895e89248d78417ad33ea7c9ff7f81b25f1520bd3c29322c64cf
-
SHA512
1d248684ae2faabba69989b26d64789249fbbee8ba9cee583e3115737c91abee9435e366bffcbe727bc493c088af9c49e890afa602a881bf67f7a482d0fe148b
-
SSDEEP
6144:VNDEsVZaPTpz7pGNa1z4LwsZ+QxPdGk1N4WxxUUFZMGOduhD78LF:VND7CPTl4sFywsZ+APdF4WzLF2GOdu5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1172 www.sexy-roots.com.exe -
Loads dropped DLL 2 IoCs
pid Process 2436 396b93695a362b51e3f069a65fc351b2.exe 2436 396b93695a362b51e3f069a65fc351b2.exe -
resource yara_rule behavioral1/memory/2436-1-0x0000000000400000-0x0000000000786000-memory.dmp upx behavioral1/files/0x000a0000000133b1-4.dat upx behavioral1/memory/1172-14-0x0000000000400000-0x0000000000786000-memory.dmp upx behavioral1/memory/2436-17-0x0000000000400000-0x0000000000786000-memory.dmp upx behavioral1/memory/1172-46-0x0000000000400000-0x0000000000786000-memory.dmp upx -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79F1EC01-AFF8-11EE-A731-CA4C2FB69A12} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411081115" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000037c75d014fc618112ac4ec5167b312dc25d35edc0ead21316d98d4d912be32a7000000000e8000000002000020000000794064d7464530dbaada2eaf3628c863245995f0ee92ccb01ae66cc93f30b0dd200000003d828f37fdd7c279840a5df8377216570c63907412c657f9fa796eeac0d3e45040000000ca86ea6a81e8985138508ce5384ca91d6edd18d3105b00885a65335ca015747c7dd2b5302b4ddb9c64f744cd6b0fc418fb5af44da4742813c6caaea47e76b1ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0867c4e0544da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2436 396b93695a362b51e3f069a65fc351b2.exe 1172 www.sexy-roots.com.exe 1728 iexplore.exe 1728 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1172 2436 396b93695a362b51e3f069a65fc351b2.exe 28 PID 2436 wrote to memory of 1172 2436 396b93695a362b51e3f069a65fc351b2.exe 28 PID 2436 wrote to memory of 1172 2436 396b93695a362b51e3f069a65fc351b2.exe 28 PID 2436 wrote to memory of 1172 2436 396b93695a362b51e3f069a65fc351b2.exe 28 PID 2436 wrote to memory of 1728 2436 396b93695a362b51e3f069a65fc351b2.exe 30 PID 2436 wrote to memory of 1728 2436 396b93695a362b51e3f069a65fc351b2.exe 30 PID 2436 wrote to memory of 1728 2436 396b93695a362b51e3f069a65fc351b2.exe 30 PID 2436 wrote to memory of 1728 2436 396b93695a362b51e3f069a65fc351b2.exe 30 PID 1728 wrote to memory of 2696 1728 iexplore.exe 29 PID 1728 wrote to memory of 2696 1728 iexplore.exe 29 PID 1728 wrote to memory of 2696 1728 iexplore.exe 29 PID 1728 wrote to memory of 2696 1728 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\396b93695a362b51e3f069a65fc351b2.exe"C:\Users\Admin\AppData\Local\Temp\396b93695a362b51e3f069a65fc351b2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\Media Center Programs\www.sexy-roots.com.exe"C:\Users\Admin\AppData\Roaming\Media Center Programs\www.sexy-roots.com.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.sexy-roots.com/member/exe_contact.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5314fc5adbb41ee9e0c1e7faf0fd9c0a1
SHA11e503d0e2cd370713d76d15532e22535d449e870
SHA256b38d0c97e94aacca1816f70c046c8572f7bfc7480ade1667ef09457701963fd9
SHA512ac1bb04a1ecb090b2272931867abd20e6e654d37783314fb2b7fcaae111a2065e4235e264bc074bb3e673abcd5954b2cf217d846c13d184dffcac268e9018a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a920936e787bbe70292b3d3fea2317
SHA1f13fdc2345e476bb55bcbda0f7e78eeb0babb851
SHA2566143fc87e576d1075a6f29dd24b44d6f7832245ad788f23654071d9b88a41d1b
SHA5128de1b08b1ece9dacb7976a1e0506bbf27012510ea3a5985399404574a630ed2ad2dbe8e447526853ae2eb6ff3cec67cf765a3c0af990113494cfca7c3dc358ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0cea99c124a2f9f5db865d6110001a5
SHA16fe2193594d088bff0c8c5807aa2599d04fc0f02
SHA256e5cc7a7e9bbacad653f16169acd7058305cde0811b31f9694c45588524ede550
SHA5126343b160aebb8c37bbaedd5c9b8378340990d0bcf1b67fa805b107e20edb4344cff1128853eedf48d8692c31e9a180980fc64ddf05edcf82b420552efdc80fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec991cd0862dd7a277df00be8e4c908
SHA162ff337a38dc3d6a240603601240c2a6400acacd
SHA256aed1181368d2d0dda53d4dfe50750d675a089448543319f9422c36f41f5d2e9e
SHA512aa5d68258c49fa4d1ac656db331a4b267e775c3b44f498a9e8104e37a211b4cdc1a00ea70bf47b6dd6758bb79db27a17cf628a90b7ad041d8128775ca4f28cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f145d537379f94ee26cb8394b12e0d8
SHA14e49aaeeadb0655d5f652342ce70d7c66f646832
SHA25603d0f7a40c8dd0ec3bd47b71dd0f1b870488d23f7bc1626edd42000c48718a2e
SHA512cb068600c66789742bb64d2f9b2afb8f2dbc09371e0175d57307b511727e16b6a820cf520abb4639cef451394d8d34a3c1064389753e01152bb176edb9a2fc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a71caf3256e4b1131231d42ea5ea9f9
SHA1eabefc189fa556bd3e154957b11537c0f0d90506
SHA256d6305eb40c897eb99ffbf95f5fc029fa9ed3434e05b8a2ab67cb8b55931f14ed
SHA51275bd07a45824db84937fe2c5a724edc79fbda76ea244e4dcca175d6205728f4fe453c8d3dde724a9071aaacb11ea718a6883e6d52f74adf8e1cec4a05fb71e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55814574d4358ffa47bda0fb1acce17c8
SHA11bd766f4d72f35d09170d1b271b68107525de0e6
SHA256429069b78c11b0a5ab03ed5359add992623ebc0574cf684cc3ea6cd0ebce2afe
SHA5121b6c99b24b6bc12c4f37173f8d5c02545ea321f2fc8a2d6959f5101140b98c9e916329b1c7fcb168c49c6e696356dcdc884a0dea4a1e5aacf0b4283065a483bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54f09c8c8e0bc9359e8973455cb83b704
SHA15f449cfe4ac2e00ec0300523774dc09f71bf932d
SHA2569b4cb3903094ed60f6b84903f16aa597ae418b95f8e5ee6e80382296736c62eb
SHA512f4572c36996f543e32ed7ebb7b4ec620c8b2b12238d4df8f8e1f8e34d1c25ee611ea836eb734e684f39936a66379c10cfd1634d347f9e8f6743da9d52dd9ad70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
284KB
MD5396b93695a362b51e3f069a65fc351b2
SHA1800ce16aaa0bb232de55d9ece842f547c34b69da
SHA256ee588a9db219895e89248d78417ad33ea7c9ff7f81b25f1520bd3c29322c64cf
SHA5121d248684ae2faabba69989b26d64789249fbbee8ba9cee583e3115737c91abee9435e366bffcbe727bc493c088af9c49e890afa602a881bf67f7a482d0fe148b