Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 05:59
Behavioral task
behavioral1
Sample
5c500766bcc9cb57c19ba86862fe6e4a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c500766bcc9cb57c19ba86862fe6e4a.exe
Resource
win10v2004-20231215-en
General
-
Target
5c500766bcc9cb57c19ba86862fe6e4a.exe
-
Size
75KB
-
MD5
5c500766bcc9cb57c19ba86862fe6e4a
-
SHA1
4604daa0cee7d3a2ad4342efa427f3a32e8e8389
-
SHA256
0475e65915199e7d4dbcf022dd171a27a2fe9a8432429e3d93bc41e36b01a3ad
-
SHA512
f6fa2318bb3278d459f80f11374fcc996833a0d36fd8bef062de99727efab3eee7eca64b1f5f204fcc6faab20ff8a41157e80bd3aa124ee6dee3b03e1098ba12
-
SSDEEP
1536:D6fAF7aYocj2IwW3ER/c+66adTSPA0bzZfL1kClQJZUTcJ4QKI3GuEMk:JaYocj1wJ/C6aBSI0hplQJZUTuKYGvf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\2ee4093d34.dll 5c500766bcc9cb57c19ba86862fe6e4a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4279F711-B36B-11EE-9610-464D43A133DD} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411460244" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1652 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 30 PID 2528 wrote to memory of 1652 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 30 PID 2528 wrote to memory of 1652 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 30 PID 2528 wrote to memory of 1652 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 30 PID 2528 wrote to memory of 1652 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 30 PID 2528 wrote to memory of 2760 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 31 PID 2528 wrote to memory of 2760 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 31 PID 2528 wrote to memory of 2760 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 31 PID 2528 wrote to memory of 2760 2528 5c500766bcc9cb57c19ba86862fe6e4a.exe 31 PID 1652 wrote to memory of 2620 1652 IEXPLORE.EXE 32 PID 1652 wrote to memory of 2620 1652 IEXPLORE.EXE 32 PID 1652 wrote to memory of 2620 1652 IEXPLORE.EXE 32 PID 1652 wrote to memory of 2620 1652 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c500766bcc9cb57c19ba86862fe6e4a.exe"C:\Users\Admin\AppData\Local\Temp\5c500766bcc9cb57c19ba86862fe6e4a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$30689.bat2⤵
- Deletes itself
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5012c2b3eb8a51979e90535dc83612702
SHA17236f5fe26bff5b494fb67af03355562a25006f0
SHA25602b860e1c008d08e1a6febfd8d2aeaf8d3720ebde10e02fc100ded5f8aa4a873
SHA512786aaed2da99558910b7e71f676077c8e0c15a2c3a529119bcf425c7956d7d76dc4c3d24e2ac7f83e9571f883079ac7d0926ba15a16358e02ac8ff4cbd468a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fec137642df1a8ffb36ce581273e4f6c
SHA1ccb8f7b5747f24bd911f52f8bb07900d9f128caf
SHA256b03c33156ff6344bcb4e8aebc5937dfcef4e9c279e76dbd7230ee9c7d12ac6d5
SHA512a528409dd5a6ec0e2702b679e58b84c30fbe44c2c8e650b4aca23345d594f54e630eebf1fe39c5afd71584030828c4744b310eb501cb40323cbb6f4b62469d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e4318e0fce173c5afe6d16388f815e6
SHA1875dc27dd76aba9a4fb76ce20182ea91d0a0e7fb
SHA25653f71cfb2d78d5134bd73f49f9ce90b1aa97bfb06a8b33f0e8b658cdfb06e872
SHA512f01f3932e9e7e5152e1149c6481044f06605c31c17a3abb578954386b9253ea1060db5a68b2be4447d0fab4105cc037cb84aed57e03437a2355fb7ed7bd21495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9da0e15e732671208a25a4f589e9dc3
SHA1a7af27d1fd5e15b47eeeffd094469c538bd23812
SHA256754814962395036f3239b96f6df8d135f5a93692b52137ebc9e3231f477ac812
SHA51236ca1510621d8d17907572525e16eb00be2fceb4e8a44b8cd38aef64f471464eb80633e96269685da3c0885624c316b9ed08d985ebc270b30c49d794c4f28fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dafa99b7ce85c0976f34dac86ea6834
SHA176183b2839ebb9c1ee738f37d3e001581ffca509
SHA256dda328f3f1b145b5bb984b4b487d2f0c910ad0b804dc646781f0f0edf7a65215
SHA51211e5d4f1ec1f36c3120c8ad711857863f0e3978d119be2a0d974ed5c11ebf2c68ab99f5e64dabf4390e895435bba6a2a9abf39951d4e756eb7d6c3c4a5b895a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f455349cd2998b8497a5761feeca4eb6
SHA15e64966ee7985309105dd4d7ec5d239b7ab1d3e0
SHA2563b77002aa5dab94e76fed127404196e833a0c883d0eff929bebe3805afc07be8
SHA51257a5eac7bea70beec2d2f8afcb603be5112bd263ca927d452f18a8b00d46c094efc1cdf5054c8c67aab35a2227084fbb860c03b9b987608da89b24d41a4023e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8acffcc9e8596091366309435c76f70
SHA1adaed4e422d189d5fb2b0366804bb06dc4f13c3c
SHA256591718f5136737587b0f78d913962bfd4a2341563d975f12b03013546922dfcf
SHA5120e2aba78e5e227d6ef8375e85202d3c7669b9ff4ae8673ae801e75381b4bf0610af29f1ffc01aea36e8b7bb8e22707635d025a31bb72c00966095ca1e5f200dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561f9dfcd5f1028ca83b96a3733469f69
SHA12bcb06f89c33786ab4f97921c9bbe86d1a1ed6a0
SHA256efc57f516bf2711e54fa38bedc13fa237986fbdfeedf42a7d93be6dd789b4de6
SHA512be66326589c1eafb9611fa376f60a9d60251166f9477cdd37521d1a995833ec8d0e7196cc4e3c65dedf8244e067232685b2c6407f7646f3bc49080bce0ad7d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530e74a58715fdb9e9a25293484775947
SHA1205c62e44db34634ebb3f448bcc7f8cf0585e325
SHA25651ad9ac7d62c394419ea14957ee353bf6cfc05867af73a7827b6b825f6a7a1ce
SHA5128b43d6edd6ad1e83d11e09b69d90d555f5ca265ced942878d1585700f1406826038304b89b49bf680563659b0f396b9976c619c7906d28dff7f1786a13cb37e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da9b194ad60eca32284fa8019396597c
SHA10d772362951edad1a7f44c2ad599ab3bccace75f
SHA256e56bc6d91e3d2510f9a0df51ea4b932a9f35a087e6518f253cd59cfeec2e6846
SHA5129e9257cee256df2337916c022411b0eef998208fb9b7d4e0a308b412c13db4ea4d245ba35e6510f5cc5152f80b496345cc4f08a64d562e46f99030dd5dc7b005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf284b826ef21c23bc7b9d1a7b36c8b
SHA1d397349386e8d6370ce5e79017f6fe75e59e9ac2
SHA2569b45caf8610e41352aa578b46fb34b001c109c1bf3be445ae02f376fe6694f86
SHA5128dea373291a88ebc4b5a40589f11ad2f64d7a1cc236b3764feca86106ad8455c0be0b6e4255f97dd12feb36048ac7b902220404202b76a511ba841bb09b2153f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb32cbe5f982ab829503ab91d452ec2a
SHA103eb356355842992193d8f293b5affc8ace08105
SHA2567a711b473bd1b14e499a1ada6a7e9fb11bb686b47e893716bfb50ba61bb68209
SHA512d825c804ca7d5a25876675f739d0afacead28b1631ff2e3816bfbc60bab6773232af11a54c7b0c5464981a5db8ba113ade66786012ec9511d3cdeef191e6cd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fc2cf055b34ad4dc1066d63d906ae60
SHA19eaf24a27e32e4915ac0cea61696973830e97b09
SHA256f4d3153271ab3cd6e3d219f24ffb224a85b3bff8dcedacc8ef5a0552051673c1
SHA512073cffe551ab7850475c9207f6710855923e37a7f69d7b3cb802efd636bf4d279e50533e0dbce1fc3e0ab1ec4f1ba5a83bf7410f1f76cd6c7d1a98cc5775fec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e991f37d7b066aac31db34f9c61b2738
SHA100e8a72a8f1f8512153644e32fb137c1fb1469da
SHA2565b8c40d568f0ceeeb8e22b62eb2859296d581791cfe148faf588eb78bd14986a
SHA5125898a12d90c71e1dcdb494e7fe164c2aa267da43128cd7b1e74639655ba447cf6dfc6a0369da0d93c0afe27bdf5bfd403c92ed0db7bdc6bd56525eaa5b183551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa51f218c7f9b2957dd44da69154d577
SHA106bc27af463ff4a9df9854013e36dde94fceaa76
SHA2565da2279841aebf23e0b008dc5b6bb9ead459bc362f9dff3f63462d85663ddf0e
SHA512cbed42cb596fe315cc3efede9bc2d834e4148322fc1ed3a93ac92cdc2a9f8c8f1382d291ce184b411737c28d28388c11bfaa582612d09523ac3a181c5bc2e07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591164a500f5f9a73f867576c513f61b4
SHA1faf7c37a45f332778194727dfc3f07a93e07442e
SHA256d5b3007b1a374909908177ac346a8f5ef5170c0882022d50e40c43a0c7472c97
SHA512367bbdcd23086aee9db9b54ccefd88d9295690dff5b6a3df6242b4089009f8f78390baf0d5d739d15fb52d18c2a710cec3044d8bf3cc2f503cffde593139fe0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509545adbab64d526420d78ff81d16368
SHA162669e73fcc2da222dea7647851b688013ef3f5f
SHA2560c0768d9b2bd850d40e0f421817d430136ad9ff374f9b19a893ae18b6a45881b
SHA512c3ca605da96a2a7d09f7adc764e7ec52f63f5bc5b24d54b515ed34616d2467f595c4d06450c2ab67aef7b1f6d37c5106573cf56fdb40c8257215584eab711970
-
Filesize
181B
MD5d7c115f91a35f22899012846521eda4f
SHA1d443831f99ac8c72378af335a99e50b559e163da
SHA25614eb1c4efaf9c0a6ce663ad4b9b177499ca26c11069ab476fc835cbbdfa5cd9f
SHA5124fb3c6a3b64e77dae991a367be97bbf81dc374d2680a9c0f48942394dcb8da5daf131805653779c609b15a03d0509fa9c0c9bc2e8f38d3fc8375b1a48958a29a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06