Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
51d8e91ada294fac15ec33fce0c7ca2e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51d8e91ada294fac15ec33fce0c7ca2e.exe
Resource
win10v2004-20231222-en
General
-
Target
51d8e91ada294fac15ec33fce0c7ca2e.exe
-
Size
25KB
-
MD5
51d8e91ada294fac15ec33fce0c7ca2e
-
SHA1
39e9d55ffbc4a9dad4136056d2fbab610b5f727c
-
SHA256
c5ca4fa59a38e2b5b278842c97f60ea221274d2891c59c803013587d75082f66
-
SHA512
1548e3f27153b679199793790e4c72a226437036823727b0a6d201f8622d0bff44d51bd9805758b576ea9f827ffcde62080c8da453cf0c73bc748b5cc7ce6268
-
SSDEEP
384:yW9DjdgMEO2VxIjknu5kXJcavaAS3Cgnr6CLd51vArE5sC/Iqwqa+urZSbWSQHPP:yWddFZixI4nXVvYn601Z59/5anbNHX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000eda65fed956a2ad107c672042fbf8b019c9398a872510a1ebc27cdc52f21ced7000000000e8000000002000020000000482d0d19166738f5ecafcd202bc46f96ce1ebfdeb1f33ea71fbba17ddac54360900000000ebe5375b2a1a99b99229b493a1c7fecb771fcd896cf9736ababc299fa5fd037988ba6c3d914168c1e7bd812e4407f9ecee9c9fa6bd4e8a67a1ef09bbd8946afc3fa500c862abb26b57fd08845f70704339e90766c470966d24fb6b9421308740bb339245cd8581d9137c08f73ec7fc5ac37a2cfc1dc26fc0efb37307394dd6b8864a8122533f4ca2d76f8e8b6115435400000005fc7f6d4bd61fdbc39173e32ac87c0dff486a22fc6aa1f3d59529c4167376ad0e0a3f9edeca2700a33ad419aafe4edc5994e24ffc01783273af40f8005607885 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000bd6e73852f6385ef429a061deef9fa2f9f30c49b551bc9e2d4ef1990922dfabd000000000e800000000200002000000014bb89d62a9a2869d565232eaa0f5dd3353fe3e06a757a28649e6e1ff85d4d662000000065e5fb366609ab56451f494b4d3b71678a072c5d95ceb4b8cf2f561ce5c328c1400000009fa1ff7fe962ea27273b05582ed069fa870b25709f8caf11f2c9cceb34ab19d0ca99b65e24711fa9a95e31259ad29d687994260a178a6b045b318e82556b46d4 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707a2f801844da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB07CCC1-B00B-11EE-8CF2-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411089346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2116 2880 51d8e91ada294fac15ec33fce0c7ca2e.exe 28 PID 2880 wrote to memory of 2116 2880 51d8e91ada294fac15ec33fce0c7ca2e.exe 28 PID 2880 wrote to memory of 2116 2880 51d8e91ada294fac15ec33fce0c7ca2e.exe 28 PID 2880 wrote to memory of 2116 2880 51d8e91ada294fac15ec33fce0c7ca2e.exe 28 PID 2116 wrote to memory of 2828 2116 iexplore.exe 29 PID 2116 wrote to memory of 2828 2116 iexplore.exe 29 PID 2116 wrote to memory of 2828 2116 iexplore.exe 29 PID 2116 wrote to memory of 2828 2116 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\51d8e91ada294fac15ec33fce0c7ca2e.exe"C:\Users\Admin\AppData\Local\Temp\51d8e91ada294fac15ec33fce0c7ca2e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ocarteiro.com.br/cartoes/cart_0312.swf2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52af8bf721bc3b69796a3044491f47166
SHA1fad683b123415327f73e84c2a8d8eac206958180
SHA2569588e25eeaa5c91c466431b6cdd3e55bc6d751e48bbf166e6395c6090275e447
SHA512931045260811ea168278e667cfc8df926edfbacddbc8c7034923824b966f15fb8d717d3831170617a5503a9b13854b9fb8a246fd0a46c7360bc8d6a0530ddde1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fcb8860fbda33f9ea00e0e48fbbf188
SHA1ef7a59d88d0111d1a8038b5e38c8e48c3853331b
SHA256f3e4753aee5fa63d39792649ae479b82805cd8fa6ab4c6d82c7f0b5dda7045d7
SHA512a6337e3c6fa6a1b576751465bb31ae101e89cdd273a1c2bb5e3bbef3487213d3a3ee7a67173c051f70420576664c1afbd50190e39816bd4d4df2f0574e2c9252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506e6c74e274aba333c12179f0013664d
SHA1e425bb9cce39ba117c2b784cc585e90ef324f682
SHA2562fdbd3ffb1076488a27d06aae77467bdc7c96761ac4031fc35f30bcb1270d3e7
SHA5123d1bb0a35a6a9ff4db33ba94d1c4f565e363b5169cec52d144b3aeb3e845cc0534978db295714e072df74d759616977cb903724a8d5c91276da78a35e4e2b22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554cd2295fef6c844fc6806f9412adc46
SHA199015aad9fdfdfa32b26547098ce5d06acf2cd25
SHA2568bddfb5010e452027383373406a6b4952f90d14ac39fd1eb76ce72ed9f9f729e
SHA512dc2f4e71e29daa31eba8788cc4f7efb2a50b57b9c4911111f89c6a3ec653859f9d371ee5ca4ca3616f7573086203ac6ecbe72df86f0e64f6cc28f4b38b3d1b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b30046b1fa85ec998085f3d947323512
SHA17c47b9fcdfcf1777e49b7066682a885a1b356577
SHA256ebb42b74481616bbd71a63d0bb9c1260e74f420f154b27ed159c912d8354e04d
SHA512e144af13a66ce232244c33219f73c9035fe82f4d99a07d61ee560713b9ef15d995e541e2e536169202c495fca16c8acab8cfad1c414132a3a37dfafee5fec556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d1c7d316938a05069c52d040b96dea
SHA1a9bb92918ea0ec021f3d99ed9089f0a19bfc4d46
SHA256968164c0f337db28d3e747e8ad061430d6809f228759f5cd7e4abca4ffea16a1
SHA51200fa07a04e969369fc68f08fc9711da38a8688bc14e391c62c8cf4ac1ee1380e505066b9efecf7c5c7bfdba12b885385d389a6f57905fa903b36f98007a1c172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546f94dc230b87c8011bac690ae5c24af
SHA1c243c88d36813dc262ddd4e87219cadfb9e23a14
SHA2566e21113eb447a1dd58b4bf6559db49e9e753f5d52dfb08f9ef8195647bb12143
SHA512f74e3a1befdaeac32cd53c1681577ecc6da8696561aac3c1f6ce830b75994defbbf3e485602d7a1b8298118f64f14b856779b949dfebd98d3940570364798df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d5632c9de25afe1b9396056305b34e5
SHA1fe57805f90cef7755eb92b5b203475552bc99bf0
SHA2568cd384a39a202828219be5375a35c1fd1b42408a70779475c02bc695c44507f9
SHA5123178dbdd907d4fbccbd11dc763649183e15c924db5ccc6700900756fdc595779bc5a299355a0dac964304f198edeecb6527ec3714f0a68a46a88c7dd29e83034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2de3eadbfe39dfbc457e92ca6ec34ff
SHA11b78b0b06e76cd1fd612934bf8d1a1325dc16ffa
SHA256180281c30385292645433cdd55982ed5d3b09d44839836dc710ba01ea7c6336f
SHA512e48c4633da32032b8172718dd5abfa8d098de4a72f938d8c4582e1a8cc8c1d9d8981e3786621a023a5fa98d80f968ec51ce9bd04ef92609adb73ff9b2e95fe2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638dbf1ebbac210eff1d8ade99863540
SHA1a1624a0f1016b258ab16365ead75edf35e5bde37
SHA2565e9efb8f4cb79ac35aab1246409a91ca4b93c1f0139f67acbdebd66f0210af8b
SHA5125fa087bc78ce1f10bca9442831fb3b5e397b970f702e72075d0d5bf7d6fbed4471ddb914f8b934728b50df9bf402c6c0aaf7411978d44be44294107cc9f253b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55408ad87e35276d4fd7ffa4d3808c913
SHA16c2bedd0ef25b1ba9ef8ae58c41f862661f36cc7
SHA256a460c64ab8cdf1240e4ab4e3a1639d49c382b2d4f7e60559f023e19e71e6fc8f
SHA512e6fc424e235e80ca1060a3168bdcd61e20affe56fc21df993a26c388334a0930c43a9a0220b6835f596c6337753a0e9db99564e6d7b719417187fb0b1546c158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a4fe5536cd0f99affab2562789c22a1
SHA103e63d88203bb1c670a180273dfd70336ca6a438
SHA256ed009e28da78a83777b3cdbd24e954519ce55398c037b66bb01216d9c40513a8
SHA512f69f745924aa1e7cf5eb69e3d0f65d985b1bb47cd591e721767fcfa14bcfc145b1f1fe549c9539c06ace91589ab95f6219b866792c7c92c64b1cb2daee24e29f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06