Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 10:56
Behavioral task
behavioral1
Sample
58be5ebf499b0b4a1c805652e39ec58a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
58be5ebf499b0b4a1c805652e39ec58a.exe
Resource
win10v2004-20231215-en
General
-
Target
58be5ebf499b0b4a1c805652e39ec58a.exe
-
Size
26KB
-
MD5
58be5ebf499b0b4a1c805652e39ec58a
-
SHA1
ec298bcb2d3e1959161c0c7deb88273f618a7647
-
SHA256
6205737a9fece5482da925c598110ca9856a7cbf3e5473b915405c85a10a760e
-
SHA512
20be0e47cb9a0b6c51ec04b277fb9f7979dec16f439ef4e33dea331f0a3aaad17d646245808612e2d7d160524fdcc6f8dd8834c2882174c39a7e87fac2377f4d
-
SSDEEP
768:yGjbz+Cn/SkvAC0Nv4Bd0MuS1kNJPNytunPq:yqz+CnwewP84ni
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2848-0-0x0000000000010000-0x0000000000024000-memory.dmp upx behavioral1/memory/2848-6-0x0000000000010000-0x0000000000024000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Adulti.exe 58be5ebf499b0b4a1c805652e39ec58a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000572a1c17002ff31b9ed1a36fa72dd0d5100278804e3c8c5f1513427b23bde7b4000000000e800000000200002000000032f032a7dbf78975d12510de41a685e6553e3a28223fe5793d5c3d4637aaa81120000000b9a87a173b33eb805025a11f89fc42fb3093e0b840fd6e4abb4936152350f87340000000c78bff74de2180af57ca7ec1de089eecc8486dd0b9da0a8dcda552473b637ebcdb7a46d0942ee04f68ba98860c0227a79112100e9593585eed7e3dde1ead474a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05eb34f0f46da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AFDF331-B202-11EE-8A73-D2C28B9FE739} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411305291" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2356 2848 58be5ebf499b0b4a1c805652e39ec58a.exe 28 PID 2848 wrote to memory of 2356 2848 58be5ebf499b0b4a1c805652e39ec58a.exe 28 PID 2848 wrote to memory of 2356 2848 58be5ebf499b0b4a1c805652e39ec58a.exe 28 PID 2848 wrote to memory of 2356 2848 58be5ebf499b0b4a1c805652e39ec58a.exe 28 PID 2616 wrote to memory of 2688 2616 explorer.exe 30 PID 2616 wrote to memory of 2688 2616 explorer.exe 30 PID 2616 wrote to memory of 2688 2616 explorer.exe 30 PID 2688 wrote to memory of 2760 2688 iexplore.exe 32 PID 2688 wrote to memory of 2760 2688 iexplore.exe 32 PID 2688 wrote to memory of 2760 2688 iexplore.exe 32 PID 2688 wrote to memory of 2760 2688 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\58be5ebf499b0b4a1c805652e39ec58a.exe"C:\Users\Admin\AppData\Local\Temp\58be5ebf499b0b4a1c805652e39ec58a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" "http://flat.trafficadvance.net/AccessMySQL.IVRMobileEntra?D=11184&C=1&MP=412⤵PID:2356
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://flat.trafficadvance.net/AccessMySQL.IVRMobileEntra?D=11184&C=1&MP=412⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a3b5ae23ee56bc7c835eb9d316c8f477
SHA18ac7e11b808afbfd11394c48ea5f919fdfa46bfb
SHA256a4608096462f0012f0d6ad123b659a2ee6ac1989643dae73a59597dc2459a0bf
SHA512f7ee3b4a5f8189d12c720f38145a8321f6ced0b438e6a8630ebeeb25e9c64532ceb4d985c49f2c05417252272abc2efe7715dedacbc64e910c07c69cd3d812fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c606938a2b97996f83d5033f34cfd053
SHA1e296cea104eb72b6da93cf2fdfdef7fdbb357203
SHA25623af2e5e413cfbe9e41b066ca953606acdbeacfce0ca93b5665f5428a922492b
SHA512770c013e9ca80a5e8e601120be0334dfb61a4710353114f1cc441f05bcaec364f19535242364896a8ce5394566f5b71a477e42fd55bdd4f74b0b8019153ffcb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6625884e62935d997826694530169d1
SHA191f76349e71fb3574292ed1276183d20a25c1f0b
SHA25658bdafb420ecfa766e4e711dd45f9662a996004e38ee54db07e9a02a0234ec2d
SHA512f2bb9273997974e58053c457a434a762b9da755db724836807328bf54addb6893c67b4f5fe228907cb1d1b851798fc53612b4b3c77e8d580b7a9333c15a1b17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b585ca9693b5f646945f4eba53fd89
SHA1a83b24f2dd8fda6eaad2be2f36fd22888cd4afb5
SHA2568054b4ca4106640a8ff261ab3fdc489ffc4ce37bdbaf2b1750d7a93bb9aa0aab
SHA512f8486ad016e53fd7f540113468d48da51c9c6f38f5b48a1eabf9871621583c1d3756fe1730fe14eb9d8005b777d613bd42cda8665901482a9a2ae639ac8725e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be1d0b83e8c508e8515334584a395eb0
SHA1499467bfaf9fa70103792080dee2ed75dadc67d2
SHA25671449298d49a6ce3f9b1ab0fa224172fe2ab66828be8fe25994cc1935f2aa562
SHA512221e47c7622df9e5efe62521106468b547017c65eb37486c23496f05a6db49d2bb47ac7a9dba3d779bc72c3ebe551bdd71130adf71e15e04c78982563fb5d643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cad2054f883efad5186ab94f7cee87fb
SHA1c5cb04b7283d41f97a93eb390c4d95097774bc51
SHA2560c45f315ec972a4970a5a8663f611c14106aacf0c6cb925f3ee4214bf1fe4cf9
SHA5120241996a703fc1be7e3914ca5be9743678e57395f81ad4438f7ddd06b5fc302f4ba3bbaa9c2cb61b76d013169016eb81bc4de5b461b943117b3190fd31c3ac4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0b5dd2ef5969c128573ed1d97c46d18
SHA1ed53fea08044da2aa5820dff1392a68255581dde
SHA256121d73ab77360a7781a99c2a1d9a53238826e5f7aa8f280d64e3cd202e0e6cf2
SHA5121e72d92c79dca7911d39a00d43f1846537fd525c60ce4009b9ec6814f760f6c73d95a39adcb1920865405f545a89b87d6cd2d8d1747ad992d625677869a09f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5214abc7472fd307b89c218b25dd8ad25
SHA1867ce086ce3dcb03147bd2144774a399138ab296
SHA256beb00374aa18e7c431f02ce2525b6f8c87b632d3e6cbbc4be69847ef8e452e16
SHA512bc6842ca2c44c7eccd8dc5c66204cc9ce7c4b65273f8d6cb7a0e37b96a0a198d2219cf1a430b5ffe6ff539a5a2b3195cf99f251f529993980614162c4d52b1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db0a2087f522328161bae37da5c88716
SHA150edc99658b94b2077d55ccb1173314141cae45b
SHA2568d1367383f413b9db330af3f419d4414a65e6226679d13c9119cd1286cd531d6
SHA512125c11a6d3568344f15c93c9d13e4de50963a1bb7fd2a2e8725fc7d6e1e465d76589891d80639ed36edbace56a50fb2379f035eaafd957eed73d1552d9241c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069e596bebb358a72a71a2656f88e34e
SHA176affd39430d25e17bedf605c3c5a483a86ead0c
SHA2564b4d1f46c6fd5748d50beaf88ac7ed22f54fdf496cbd142f367a04b2cfc63636
SHA512050d493c1435ab1074a738a58af58060b6ee00968b96bd76222aa7d7a0904a333d660ce75c8cec842213eaa406026119f1293ddcf564d6139f0fe7298f9a5bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ba08a973238bd82877ed45b99ee790a
SHA160e3eebe8ea6aab3b32c3ed5ea8a6d432422d4ac
SHA256eb535b2957ef7a58a66246acb3305dd7271270c308fe8643990f0610649d0c64
SHA5126558e135a5c580ac4ed6b302bea074db9ba448abd0e4244ccb0b9db70f84733984f40b7d5c2e3df4e2a6bc1fff2e2eb72f0476ffd519ba57db8a85e18c35789a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc5028542b48fd2fa09609ffb137eba
SHA15e0f0af2aab42fa976e273cae1af3cf87414d067
SHA256adf371bedfe283fc425ece9dde79ec231adcfd64a162ecd999cb066a10b76b60
SHA512bb29b2787f647a74440a5ef6cbe576e590575cacf6afcffc4cb656401080941fb9f36b518a2d53c4f2f19ac5fc845db0c4c9dfd73bd1cca48e7628a3dc2678fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56cf2fec6a394be377c0da83f525c82c2
SHA167bb102fa225e6088498c147e8a14fa93690e68a
SHA256df11b0a28eaf4e468d2786a1dea69112aad91d90ab46769aea1558e8959ba00e
SHA5120a1a17c2a74577ce6613590eb18f518d5336e360e1884994d19af5b3f443aacbc8de2fc39bc0e798ea48dd76197e87a735673789dee6ecb745bdadb5e0b65152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06