Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
3dc1a166d6423dc61693c32825748ae3.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3dc1a166d6423dc61693c32825748ae3.dll
Resource
win10v2004-20231215-en
General
-
Target
3dc1a166d6423dc61693c32825748ae3.dll
-
Size
67KB
-
MD5
3dc1a166d6423dc61693c32825748ae3
-
SHA1
79cdd79036dae370c0e98aee7abe951440b1b4c9
-
SHA256
3f5e97e6da8940ebb76abd9d9badc2d0b7e1c6f291a91a2ce2ed5b359bd0b606
-
SHA512
3ba08d98f7cf1cbb738a01b9d045211209bca7056d9e77f914da083e4219cb1ad3cbc6721eb71e48021b72a3e627a9098fcb6dad1c547d805b0b852a8de3d2aa
-
SSDEEP
1536:eKaouK0rof8925RMehGW4t6cHWP3BqshuqRIf/:eKaouK99MqB4tk3Tn2/
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3044 set thread context of 2680 3044 rundll32.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410301290" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D74EA421-A8E0-11EE-976F-DECE4B73D784} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3044 2856 rundll32.exe 28 PID 2856 wrote to memory of 3044 2856 rundll32.exe 28 PID 2856 wrote to memory of 3044 2856 rundll32.exe 28 PID 2856 wrote to memory of 3044 2856 rundll32.exe 28 PID 2856 wrote to memory of 3044 2856 rundll32.exe 28 PID 2856 wrote to memory of 3044 2856 rundll32.exe 28 PID 2856 wrote to memory of 3044 2856 rundll32.exe 28 PID 3044 wrote to memory of 2680 3044 rundll32.exe 29 PID 3044 wrote to memory of 2680 3044 rundll32.exe 29 PID 3044 wrote to memory of 2680 3044 rundll32.exe 29 PID 3044 wrote to memory of 2680 3044 rundll32.exe 29 PID 3044 wrote to memory of 2680 3044 rundll32.exe 29 PID 2680 wrote to memory of 2828 2680 IEXPLORE.EXE 30 PID 2680 wrote to memory of 2828 2680 IEXPLORE.EXE 30 PID 2680 wrote to memory of 2828 2680 IEXPLORE.EXE 30 PID 2680 wrote to memory of 2828 2680 IEXPLORE.EXE 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc1a166d6423dc61693c32825748ae3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc1a166d6423dc61693c32825748ae3.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf742cdc211ecc9356262105885fb5ed
SHA1dcaae67ab3b533810d5d0d94e381de4e8591adf0
SHA256d3eae6c9d7ed39567ad399737ae9f4dca40fd5b9ceda1a039a67935d9e751921
SHA51208705e0efe201f2cc17d2cecbec1f7957ef962156b16ef5b53eb6a59fbb8f3e8b0fbb608fa45c006f59db87462f96fd3b468bb8169068e531ef40557e136eb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54390a97ed5bde5f956df1868c00ca911
SHA1d2995c1ff691cc5037904dc829779111a9586bb6
SHA256dbe93c5bf33ffdd489d3ae2b42198e6a1a1297708054ba9650780518717c77df
SHA5124b466bd389482a1c531e0a231a2a86a23fdc582cd66734e8cb765ba258498e7ef2941631a56fbf552202dd979209a313587683d389ed61b9f0439c2aa71994a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f693682bc975bdb98a897eb864649ba
SHA156e2c60c41eb4fc4a8dec11f4e02b26a2fc267e2
SHA256bb17369a077922d0052b89fb59268f235daad223de9a5f4f7930e5cee0168086
SHA51296a20f83c2569df09b6e0841389274d176ca5394bd4ebd08e68730d238d18d814efbd52c0a1476a393cf31dba883b59c0d07bdc689c1e74e492697b766089aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8ed3fc923a22cda71f88bfa4172332
SHA1daebc48e8d0ff62ea7466136533da632743b022a
SHA256315b818bd917c122c8a02b3d63a630426a59e7d5856d535d592b38fbb11107ee
SHA5124a741f7d86a1f56e4f79983c1e9eb74d7154437ba8e901b15b969cb1c57dbb36bbc717103014294c6278c999f0f2d6970bf1b48bf8a061b62d821bda7dae91f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9748b384111a7238b0b462d383409c2
SHA1327769998472a9f63eab85553417477702cfcf8d
SHA2561f8ec98fa594acc5edfbb4d094eb787b94daf647cf9359b49bd88a663a22515a
SHA512314df98d21be8d16ec232a00e7e6cdee1bcc7ff53a5848d711fcbc774dffacd1634376d7a80d11714b4617823bd5100129976ac7255b72ff31343a28bb006e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5694e2ff33239e95345a6fadea7a6eae5
SHA1484fe86ed76471b550c4d3aa61439988b2903e55
SHA256534bec1c503ac2966b1d253bfee7f131fded6bee2ef7610f085920798612914e
SHA512128eb450d08fb187527ffea87967843f038e49e7c8656fde21f3d6e3cbe01d4efd83194cb83456a1ba0b938789bb3b8abc59b497afbc1b680e14e3b49a896db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfac7b1394c2cdd24723e5a024bf5179
SHA18abd8c5ad1691805a4cb0a8b5cec8405887e9823
SHA25677d177fc9e3a668fe59936c3451c93ea7375a2eb13084403d8c6eb15224d9f37
SHA51287661acabb26b3b0d3c66c2fb453580cf6b461542bb6ea20fc1ca6ef37e4a3e7578fac643cfc8e2fd771dc4ccbd0177646eb03348ba9947ca2da619997ead6ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c8cf96ff1a38d1b4354b02e6edbe963
SHA1daa4b088291ce9b86156b656e4811156a1aa8aa4
SHA25613e1ce5fa1179ee9d228a7844f1174f6a621d74e284603e2df478faadd087433
SHA51272007387c3dc4eb91aab9f47285392ba242a8d7cf6b539909c9d525a9dfe338f2f315b4b762f7a3cc94e1a3a7b8d1c650b9a8e0023340bb77c6ee46c1eaac536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b4d745210cbc7d18a7cb34144f2bdd1
SHA17f355909c53b1a3c631a9a7d15264d8ec97458fe
SHA2562190d378a150dd583a6c75ca8bf42e4b9663bf14fe7830cde15f8489a8133f5e
SHA5125d1f231040eb2a3fc5e0a0c566fbfb84dce85d0a269b00e167b68c13bd376adb1ba6b008aaf85407b00e8bbea36ffa4872c1cf718ebc05d0beb873caf72dca7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57589a818cd36a830d97de85227b15b95
SHA18f6ff251138d2d24e051bb231678f1faa9fe662c
SHA2569f1b009d3a11019d0c6ca017477e104cf1564a61f44720ad9e24b17703e026a6
SHA51284f9cb64c1a40eb2f69cde59248a53c7d60fc3b76de5d6fabf3eea1a794f2c4e916c5afcdf6152ca12b99385bc8189f4a8c0e39aee408e621d173a9d7b9aadb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceae6825b7f620ff8d59933563c847da
SHA10f85c6397dec47394fb0d0fd868d42d870b6a6a2
SHA2562bccb32b97bf108781032d57cfe9af14604e2112cc4bc5d54f365bf1e105d88d
SHA51263d7a9fc38931a245bb71a60f58db75bfb2c0f512fcfb8af3aa19be451f4c2de62d99f258fb94ee1a3fefbef2986549198d3318f788e862f4b9583437034077d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06