Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
4195cd13ae240dd144bf627b81ee8e49.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4195cd13ae240dd144bf627b81ee8e49.exe
Resource
win10v2004-20231215-en
General
-
Target
4195cd13ae240dd144bf627b81ee8e49.exe
-
Size
151KB
-
MD5
4195cd13ae240dd144bf627b81ee8e49
-
SHA1
a38f52c59da5821c0c1e5f1c92f660abde5b444e
-
SHA256
e00ac013c19120cbbfb1c81667cf99b131641c7ce87ea085bddc618a11bf11ae
-
SHA512
d7873f4bd4697e964773006e011e1e0818a13ad3f12f696a4426bead2e764a539efd005cf5fd4a63dbb9932bcfd92958078c1745081ac424ed1ec3d2de5d89e0
-
SSDEEP
3072:IqC0ClDtQ9dWAZncM5u94tMOY3Dl4yST8io6fwc1fTwyP:IqCJDtQ9dWAmM5uMMOY3D5ST8iHjfT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2536 4195cd13ae240dd144bf627b81ee8e49.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winorf32.rom,TPTdVE" 4195cd13ae240dd144bf627b81ee8e49.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winorf32.rom 4195cd13ae240dd144bf627b81ee8e49.exe File opened for modification C:\Windows\SysWOW64\winorf32.rom 4195cd13ae240dd144bf627b81ee8e49.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2556 2536 WerFault.exe 15 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6E82A31-AB2D-11EE-ADCE-5E44E0CFDD1C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1816 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1816 iexplore.exe 1816 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2784 2536 4195cd13ae240dd144bf627b81ee8e49.exe 19 PID 2536 wrote to memory of 2784 2536 4195cd13ae240dd144bf627b81ee8e49.exe 19 PID 2536 wrote to memory of 2784 2536 4195cd13ae240dd144bf627b81ee8e49.exe 19 PID 2536 wrote to memory of 2784 2536 4195cd13ae240dd144bf627b81ee8e49.exe 19 PID 2784 wrote to memory of 1816 2784 cmd.exe 18 PID 2784 wrote to memory of 1816 2784 cmd.exe 18 PID 2784 wrote to memory of 1816 2784 cmd.exe 18 PID 2784 wrote to memory of 1816 2784 cmd.exe 18 PID 1816 wrote to memory of 2660 1816 iexplore.exe 17 PID 1816 wrote to memory of 2660 1816 iexplore.exe 17 PID 1816 wrote to memory of 2660 1816 iexplore.exe 17 PID 1816 wrote to memory of 2660 1816 iexplore.exe 17 PID 2536 wrote to memory of 1816 2536 4195cd13ae240dd144bf627b81ee8e49.exe 18 PID 2536 wrote to memory of 1816 2536 4195cd13ae240dd144bf627b81ee8e49.exe 18 PID 2536 wrote to memory of 2716 2536 4195cd13ae240dd144bf627b81ee8e49.exe 34 PID 2536 wrote to memory of 2716 2536 4195cd13ae240dd144bf627b81ee8e49.exe 34 PID 2536 wrote to memory of 2716 2536 4195cd13ae240dd144bf627b81ee8e49.exe 34 PID 2536 wrote to memory of 2716 2536 4195cd13ae240dd144bf627b81ee8e49.exe 34 PID 2536 wrote to memory of 2556 2536 4195cd13ae240dd144bf627b81ee8e49.exe 33 PID 2536 wrote to memory of 2556 2536 4195cd13ae240dd144bf627b81ee8e49.exe 33 PID 2536 wrote to memory of 2556 2536 4195cd13ae240dd144bf627b81ee8e49.exe 33 PID 2536 wrote to memory of 2556 2536 4195cd13ae240dd144bf627b81ee8e49.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4195cd13ae240dd144bf627b81ee8e49.exe"C:\Users\Admin\AppData\Local\Temp\4195cd13ae240dd144bf627b81ee8e49.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Suspicious use of WriteProcessMemory
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 1602⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\kmD638.bat"2⤵PID:2716
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c0ab978ae1652b2066e8079efa26ce63
SHA1c781c1ae289576f905ddda98c85bf232f4ff9b6a
SHA256113953604f371e00e66ab1a01b2f641a0ac8b41cef0becf293620c21579b7098
SHA512ed7b31f5ddd30207ba7f664ccc249d526d12e267655b4165aeab0e1bc88aa505f4c168993f94d091d4bedde1c2b4a43aa9997d3d04b9c133ab5509f82eca97be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5446de046dd055ff840c1dc3032682fa4
SHA115b69e886bca7751e887dc17ee614bed4425b4c3
SHA2562156bcc672fd3db1abbad0796d1f366efb9fede195430db93614445ea083fabe
SHA512a2b7208a10e4af4f3fea82ff2077d2c676452545e58366beab91800d83ffe420b9d1ffd48c30fbd8fa29a7dabd440fd59cac1fbe78a4b1ceb652d69a5b814ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593ea8e9cfda806c3c0e06998c6886f98
SHA1e4b26798c6fa9b67032e36c917efbb1b2e7bb106
SHA256dd0bae7d21d8c5a4f250f25836f70d35c59099bde2d2bbc340f5c5cd08982f9d
SHA5122a2805334542ee2e4c04d0b13bf4b605cabe08171c8df98bb74b8b026acb60c9222438829e96b8ebdd2e08b07f9f69d780b6e50abcf156dad25f7d2d4379d7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e70cba55d863a7701936d120d2e3fd
SHA16ee9dfc5cf47a091ff40528b84bc69e0ecf4a28c
SHA2564933a524da9d67f0ac709a5b81520a451de05ef838c68cc71550d49e23889f8f
SHA512f32d4c25b8cbd162802e4918cf2c29a6f3bc1e5105e8a3ce05b4dce85affbeb8ee760232c764afdaec84cdc140aef3147ccce6a677e5fec015825a8f485d1b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4b9f27cfcec01b335fd311d488f61b4
SHA13ff98fa7f7fd1011709749a6d9f6cd06055350e2
SHA2569f85dc0b6bb4ebc9994168e87b7934e420df3bf5c3ab5b4443070c9cd859bda8
SHA512097935079172cdaecda8495c7d11c5b1987d0a19ee196b4fe676919edc64d0f3f3f7cef99b9ec4f4eaa53f68b95a11905d4443adfcb6f9ebf7f96aab966e6646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56152c1d09696633f49f822c3cceba33f
SHA1c265d508831e2407454bb245a35d242afdae51e7
SHA2567d8531b01e74e62649e44d2ad9269f57ce58f112b9d365cead4c719a75fd9c85
SHA51295ac0af290f159f0f4f779b3721cdb35557f89ff07514016456ef06e066b263185422d6b81153f7118c320f465fe8b5582149449b3faa2ff1c513ddfb8512ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b6fdb6ed7bac0aa35580df6aa52521e
SHA11316349aba1a041c57bd9fd0107d8369dadaa201
SHA25650f706b76c95d384144c6f277b2e6cec663ce1e88804430740d91988cb44df8f
SHA512937a05645cacf89123b1e050bb81459c8adbcc96ec6716642b1d872da8f42c5ba7ce7f474c32a0acf40a6203bde739b3dda58bc92bb64dfbbc5dac6ad2e5fc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a89068cc7add25266c5ec042a4536e56
SHA150829fc7740744593513543341774f09e7048427
SHA25609fa1410c1b5584c9a32e03eab5e78e377d911d03c8eea72b199ffe06ec434ad
SHA5125d663d3bf6a9953da8c146f5f95b05e8eb0b63b1eb941f2299f9024c0a26cf04e0ded42de15dfe0b10b7cb8e597457b6705435bd7f81faed2216383e3fc3aa4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a91e580eacf29e10a2b95e2d4992ce5c
SHA190833d2133334f798ee83539c40cf52340c65d7d
SHA2563366efff8226c8c25832dd51505d939134a808f0478137dd787dc80b8e5bbbd2
SHA5121ca30482b4886e2b5f6a1b00fe34ece38cb0e22cfd40a962f6c795e793b35827b75ae5a55374471a4c469be2eddad4eedbcf444ee0ce684fbb74a82b5c79276a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD508755c5a120df9fb03d1a20ff72a4e17
SHA1e063fa7242a5bf141212703d4f08c224a9b28016
SHA2569303e574805389bbffce4ec39b8b5fc802607655814ecd12a898c340e7b46486
SHA5129b03b9606af384d668858787e62ac2135ce19a2c5c9751119e6e75d39634078c2e5e6814c3cb7119cf58b0950d80d0f84a8ca36d65a282471ecd0b1ebdc12ede
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
185B
MD5e36044dadcd7c2f1384d049a90a48d03
SHA1b3ddd86c51ea2a327df0ebae3873f255eee959bf
SHA25658a326cfde83cc3a7a0915c4b15d860a6dc2d64640906414e169a78b91ab2a0d
SHA5126fff08f0094eb9a6eab80ee71c11cccc369751cddfb30a5c0f18b79e39bc42e6b6769b5aa93be500fcc804e06e9e7976e2968a9e8f59655cebf356b2082f4041
-
Filesize
80KB
MD5c702ee2a71bf754298e27f472619febe
SHA17ebcd72777574248276150f6f626da8c5787104d
SHA256e704d398d8877859c21bad0b743c8070f368a0942c4481814b4e59f286815b1e
SHA512cda88cf82008d7f297023f1447b95e89ae144d4474fef4ad8287f2cb7fea35f563ac010aa0757758436554fd14a2cf6cd7189ef3445ba19790423964c1a197f8