Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
4d3a626dca7fdbe017997e25b73b013a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d3a626dca7fdbe017997e25b73b013a.exe
Resource
win10v2004-20231215-en
General
-
Target
4d3a626dca7fdbe017997e25b73b013a.exe
-
Size
39KB
-
MD5
4d3a626dca7fdbe017997e25b73b013a
-
SHA1
0429e15dd2290b846667a019577ad9a3ad0daf47
-
SHA256
c8834d89ebd16eb6b37d06ed80825ffce32dda1b51f6401acbdd6907a1bcb04e
-
SHA512
ba034f3c0dd28847d3173284ffd5a24f9c78bca92138f7ee7b0be491212e8e0dbe7d3a624f73dd19a31cb2a5cd842983647b107123d2ef60905337a587aaaecf
-
SSDEEP
768:3E48+muntVSRZPjMIvqC9ZFerykdnlIEVB/NmBq+J6wviLZqMAU:D8at4M8bFerykdlIEp2q4GLcMAU
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 4d3a626dca7fdbe017997e25b73b013a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\dlmcjjcdfc = "C:\\Windows\\system\\jjxzwzjy090115.exe" 4d3a626dca7fdbe017997e25b73b013a.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system\jjxzajcj32dl.dll 4d3a626dca7fdbe017997e25b73b013a.exe File created C:\Windows\system\jjxzajcj32dl.dll 4d3a626dca7fdbe017997e25b73b013a.exe File created C:\Windows\system\jjxzwzjy090115.exe 4d3a626dca7fdbe017997e25b73b013a.exe File opened for modification C:\Windows\system\jjxzwzjy090115.exe 4d3a626dca7fdbe017997e25b73b013a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2767779354" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411536172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2767779354" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31081132" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2831530894" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31081132" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CF7F9EE8-AE9F-11EE-B6AD-DE9D3A49EF0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" 4d3a626dca7fdbe017997e25b73b013a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31081132" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe 4420 4d3a626dca7fdbe017997e25b73b013a.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4420 4d3a626dca7fdbe017997e25b73b013a.exe Token: SeDebugPrivilege 4420 4d3a626dca7fdbe017997e25b73b013a.exe Token: SeDebugPrivilege 4420 4d3a626dca7fdbe017997e25b73b013a.exe Token: SeDebugPrivilege 4420 4d3a626dca7fdbe017997e25b73b013a.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 4572 IEXPLORE.EXE 4572 IEXPLORE.EXE 4572 IEXPLORE.EXE 4572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1660 4420 4d3a626dca7fdbe017997e25b73b013a.exe 95 PID 4420 wrote to memory of 1660 4420 4d3a626dca7fdbe017997e25b73b013a.exe 95 PID 1660 wrote to memory of 4572 1660 iexplore.exe 97 PID 1660 wrote to memory of 4572 1660 iexplore.exe 97 PID 1660 wrote to memory of 4572 1660 iexplore.exe 97 PID 4420 wrote to memory of 1660 4420 4d3a626dca7fdbe017997e25b73b013a.exe 95 PID 4420 wrote to memory of 1768 4420 4d3a626dca7fdbe017997e25b73b013a.exe 102 PID 4420 wrote to memory of 1768 4420 4d3a626dca7fdbe017997e25b73b013a.exe 102 PID 4420 wrote to memory of 1768 4420 4d3a626dca7fdbe017997e25b73b013a.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d3a626dca7fdbe017997e25b73b013a.exe"C:\Users\Admin\AppData\Local\Temp\4d3a626dca7fdbe017997e25b73b013a.exe"1⤵
- Adds policy Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\4d3a626dca7fdbe017997e25b73b013a.exe"2⤵PID:1768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88B
MD50d9a1189fadf2c65d99729c1333b02b8
SHA14b38e0bc7546b7e71d75059e3dad1c8a5fabfeee
SHA256feeaf82f5637b4c64f9fc0d550436ad0f5218987d0b973a6271ac287f55c785a
SHA5129996d8a45e8e955ba0ed71727c05dd56ddbca8d1df1e1822869e8f308fae20ccfd02090813665e441273aa202f84f68ddcf344dea217c70666ccaf988aa4a947
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee