Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
516ec1055ffe241f7066d4fa570bd162.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
516ec1055ffe241f7066d4fa570bd162.exe
Resource
win10v2004-20231215-en
General
-
Target
516ec1055ffe241f7066d4fa570bd162.exe
-
Size
37KB
-
MD5
516ec1055ffe241f7066d4fa570bd162
-
SHA1
9b7e480e1178b9a7ccd73919597c2fb2cc7e2655
-
SHA256
52d569e93417117d4fe8c2e5013c9700cf31ef184901f6f3702703dc4645704e
-
SHA512
67e8c6ab154a00a0dd27fe4713ff2622c7ace95de1661111d578221c356756d6c56080e56b7781e5c025379347340431d9b8facf294dd259b85042eeb74311fd
-
SSDEEP
768:q7iQmoFDbpeGF0bhMyE56ZBGoeH+ZvZ+mOG:+iQxeGFOBGoeSv3P
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\Geo\Nation 516ec1055ffe241f7066d4fa570bd162.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\Geo 516ec1055ffe241f7066d4fa570bd162.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International 516ec1055ffe241f7066d4fa570bd162.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411077518" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DDA84C1-AFF0-11EE-919D-C273E1627A77} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command 516ec1055ffe241f7066d4fa570bd162.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeSecurityPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeTakeOwnershipPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeLoadDriverPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeSystemProfilePrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeSystemtimePrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeProfSingleProcessPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeIncBasePriorityPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeCreatePagefilePrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeBackupPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeRestorePrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeShutdownPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeDebugPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeSystemEnvironmentPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeChangeNotifyPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeRemoteShutdownPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeUndockPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeManageVolumePrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeImpersonatePrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: SeCreateGlobalPrivilege 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: 33 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: 34 1044 516ec1055ffe241f7066d4fa570bd162.exe Token: 35 1044 516ec1055ffe241f7066d4fa570bd162.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1884 1044 516ec1055ffe241f7066d4fa570bd162.exe 7 PID 1044 wrote to memory of 1884 1044 516ec1055ffe241f7066d4fa570bd162.exe 7 PID 1044 wrote to memory of 1884 1044 516ec1055ffe241f7066d4fa570bd162.exe 7 PID 1044 wrote to memory of 1884 1044 516ec1055ffe241f7066d4fa570bd162.exe 7 PID 1884 wrote to memory of 2064 1884 iexplore.exe 29 PID 1884 wrote to memory of 2064 1884 iexplore.exe 29 PID 1884 wrote to memory of 2064 1884 iexplore.exe 29 PID 1884 wrote to memory of 2064 1884 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\516ec1055ffe241f7066d4fa570bd162.exe"C:\Users\Admin\AppData\Local\Temp\516ec1055ffe241f7066d4fa570bd162.exe"1⤵
- Checks computer location settings
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5cb8f787824cf8f1043501160bfbccfd2
SHA1768d9e3b9371540b8a88c2bd0691a1e27ab0e6eb
SHA256eff2425a7423087fe55cba6b4e6f9e8a1413dfbc0867f9242c62a9055fb74b33
SHA5123745624625c09526ad68e9ef2d080a8536b1421d7a85129304ca35d42b09f0ec89a5e7c6255cf4f903918003843d25f65706f90adbf441db6a863e1537d36a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2d9b68a5ee01b6cf82c296f202ac4cc
SHA19b76aa5f9eb79a7902075d7865e4c5bd100247b7
SHA256f339dd557974236d3f151ff2c9e296d4adb200a0f14e40deb2909051270fe9cd
SHA512baad1b830f6e7969557c719e90aff89b16c692b1b22e910aa83094b0b7eafed03303cef9bb62de52fc6ee280aef19b1f838f84fdde6a94749122d8c65ef0bce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5943def00ffd3463d362eaa0cd0c565b1
SHA1326c9ddba87828f6700a450ff4e3ccbad83d5b05
SHA256c788c2c9694da5702a2d16ab61926725ae1555f756ea477ad918b337fed9445c
SHA51264e8b4fd0d7a4e2aa14dab14a896765835af9617ff8a900706ef1e3c6b520d53cf7c44780ad463e503bd095c9181babe2071a64ce6f98928b5659b265f49ad3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fae7b87d3b5fc40b5c0b5e4527cb83f4
SHA1f8ebe763e2fb44be9f8a7e852b33b1b5fdecd9cc
SHA256286e3dc9abc89488cc4cd535cfa80a364e3f757a7d0037fa9ab8c3b4cdb11a66
SHA512908d3ccb80642e995d3e020d6efa21a8801d9ad32e52c4d5283a52343e6cab3d2cb2fb021888d6de8e5a7821abad486c9cd2d1ff5b56cefbbadd51f7d61696eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51b9a6ec31324ee76487e496ce834653d
SHA1417503dd98a2f140b2ee7729ad62252687a771c2
SHA2565d74449c16a0bc25a497936c8c93907bd2567207c81fe83e0be52cf41dd29d88
SHA512cf60c84e99fe4f59bc86bfb11b22d7e6e9066b36424861a35f55f944ac1861b3ab8cecbffff9139bc965313d2b5121cb47339b838e669337298cf5aeb3dcae0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ceb63da690ce3a2154947999b81d1b80
SHA18f435032b9fee3706aeae0d430b91c20fe6dd652
SHA256033f1618832d52f936c89db1036b11dc3e2a622be60629a3245fe20bfd310cfd
SHA512f76bc1a9b9d9c2a103aff21f54a9ac3a9621329f053d6a349c9846f6bcaa6bf632de79d955433045fa05f3cc936c4875b086b5b446528f5a54e522b0ff17d5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06