Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 02:24
Behavioral task
behavioral1
Sample
5767ac9151711b27bcfd30aeae1f44f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5767ac9151711b27bcfd30aeae1f44f5.exe
Resource
win10v2004-20231222-en
General
-
Target
5767ac9151711b27bcfd30aeae1f44f5.exe
-
Size
9KB
-
MD5
5767ac9151711b27bcfd30aeae1f44f5
-
SHA1
78e8f4ffe25b396145e4f49d40c4c374c3083974
-
SHA256
792d56da2c897661bc8afd5e9e543970d1a76b723155a6f90b01c44fa02a27f2
-
SHA512
cc02f104286981eacc4e7273d5c78eaf8b9da081ed4c3e8f58c4d0d94ba83931e501f6c0a824efd4f49b6a6d0362035ba015838d8567aa96f06d60d67eaee563
-
SSDEEP
192:/TlMi6dUCC1WZTqoXqVLlGTT4UDaZPLJoJuasrVKEkx:/TaIJ1UTqoaVZGXYP+2VKEkx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2096-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2096-207-0x0000000000400000-0x000000000040B000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1BA8D6DD-B284-11EE-A0B6-D6F9353EB06D} = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 4448 IEXPLORE.exe 4448 IEXPLORE.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2096 wrote to memory of 4448 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 27 PID 2096 wrote to memory of 4448 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 27 PID 4448 wrote to memory of 3720 4448 IEXPLORE.exe 32 PID 4448 wrote to memory of 3720 4448 IEXPLORE.exe 32 PID 4448 wrote to memory of 3720 4448 IEXPLORE.exe 32 PID 2096 wrote to memory of 3300 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 29 PID 2096 wrote to memory of 3300 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 29 PID 2096 wrote to memory of 2108 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 30 PID 2096 wrote to memory of 2108 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 30 PID 2096 wrote to memory of 4944 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 31 PID 2096 wrote to memory of 4944 2096 5767ac9151711b27bcfd30aeae1f44f5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5767ac9151711b27bcfd30aeae1f44f5.exe"C:\Users\Admin\AppData\Local\Temp\5767ac9151711b27bcfd30aeae1f44f5.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://www.baidu.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4448 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
PID:3720
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/Loader_jieku_977.html2⤵
- Modifies Internet Explorer settings
PID:3300
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/haozip_tiny.200629.html2⤵
- Modifies Internet Explorer settings
PID:2108
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.html2⤵
- Modifies Internet Explorer settings
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5d6f03bc3a351a65e4a9e931af53725e9
SHA194e79192151eaf5eeebc355c3777224804efc889
SHA256695ef1426f2772796e631ce380d2d17e7b0b337d184729e166fdbaed4191785b
SHA512167b364c41e39cc2a1ef9ddd89dc83fcc78d297947b2ae5d471db22b7117bcb552b197e54ece785fb39e72e3237795949b5c925cb4acd5b5450575d07f34dbcc
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
170B
MD503f312978ad9ffcf572f584c900564e9
SHA10988a3e421ea6c3ebe03f771341047a94d65a830
SHA2560c9d63def20a8a38579f20e6b2938caebf7f4730ba37405478f950985695f4cf
SHA51292ff4c4aa7277e6c4bbb5ab045e9b2cfce7c5ddcb971abc7791f46213ca674ce88cda97630a49fbdf476f2445e38327ded29dacf7d6a671d2aec26756a6f23fc
-
Filesize
16KB
MD560343d7d697bfdb9363417a7ae43aa96
SHA1397754e9b525ac1366aeda3e421dd68c37477c8a
SHA2561e350f52847b118ff3d2c425753cc449d0233ce43fa647654f33359fef9afab6
SHA512cfeb9bbadf95a40f0f8441c20f2e50178ef67f9f926d4d4137e93de98291bcb95442ee7c5fa64fa83fe93a5794f1958f5b544edb38ee2cf61056dc0e87a229fb
-
Filesize
16KB
MD5717b138033a41361b32b60fc5062ab2a
SHA1af9841b6f0923f890f41feec52c94a0cd68f01d8
SHA256c70088079fe9441a726c66ce0e73ae38315ec80051d3dd542c41b82fa0a1993a
SHA5121985bf59c3ee8289bbe55fbe572371d1f401949e6a0179b35ca89e292173780956161feb257303fe9ff5fd2898ca7fd6105eb1796841ade0e1124eeb89aa70ac
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee