Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
QQ刷钻充Q币及图标点亮器.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
QQ刷钻充Q币及图标点亮器.exe
Resource
win10v2004-20231215-en
General
-
Target
QQ刷钻充Q币及图标点亮器.exe
-
Size
252KB
-
MD5
173fdc505bee076ed9ef0b991048a4a4
-
SHA1
cf02f8ae6707f0df59970d3770bc713fd7210594
-
SHA256
885702e53a7fbbea60e102bb8bcae00bdd5b2a88bd65d28e1ba0d78097b16f0b
-
SHA512
5dbfa1d3417f830d0b1f12a72ca5144f437c3109b13369885c35c71c7691afcab1e4efe0582dd934e19adedbf525c57f099ad69b78b2c3e58344b79d0a36bbf3
-
SSDEEP
3072:JyDt5sl9x0wpWF3CGEVJDt5sl9x0wpWFlZDt5sl9x0wBWF7t:JyjyTWFSXVJjyTWF7jy7WFR
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\data.dat QQ刷钻充Q币及图标点亮器.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412456985" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F96C26F1-BC7B-11EE-8AA0-CE9B5D0C5DE4} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6034edcd8850da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000044b97ae2fca547d2132e95d233ebb774737537f00adea764f0f94472d0db644f000000000e800000000200002000000058a33320b980b96041b33168a064412b959328c6036935170c378ab50650c3f0200000000694b687159b59fb048caee3dc03dc4bc825783752d86e7a8f55c21843d92dee40000000727d8a12c3d40c3cf2509eba9200d417a610e5cdf0b41b52827ebd5ea6e0d6ce439173ee01d01f952f5fceda2e00157593d6abe5f83c0ce28449aab6b022036f IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1248 QQ刷钻充Q币及图标点亮器.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2976 1248 QQ刷钻充Q币及图标点亮器.exe 28 PID 1248 wrote to memory of 2976 1248 QQ刷钻充Q币及图标点亮器.exe 28 PID 1248 wrote to memory of 2976 1248 QQ刷钻充Q币及图标点亮器.exe 28 PID 1248 wrote to memory of 2976 1248 QQ刷钻充Q币及图标点亮器.exe 28 PID 2976 wrote to memory of 2656 2976 IEXPLORE.EXE 29 PID 2976 wrote to memory of 2656 2976 IEXPLORE.EXE 29 PID 2976 wrote to memory of 2656 2976 IEXPLORE.EXE 29 PID 2976 wrote to memory of 2656 2976 IEXPLORE.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\QQ刷钻充Q币及图标点亮器.exe"C:\Users\Admin\AppData\Local\Temp\QQ刷钻充Q币及图标点亮器.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.niuniu980.cn2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d44f84ea2cfc42733501015626980a9a
SHA1516fa84a186bd43de5a6bb28b1dccbe8b19730b5
SHA256ac302de0deda351b88ae92a0108ac64a74270c30c07f305d26c136ee90fdfb7c
SHA512950f466ed379113d6b7f3572c44c3f52895dc40470e999dc66027c6045b847dca47994dc6407b346d7238fc37542781acbb1017c3dc3cfa07d4c7b5a65c8f7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c7bc80b3fb8a2ca8b802735c50b83cb
SHA126c5ea41d18cf5e50d7ab0848e1588001075f71f
SHA256b55176c09e6c4ae677b3768352c48a6b7deec96fdfa09f347fe1f8c6588bc313
SHA512d209a78808c7691ca17091e114f05864be1d988228ec20e949832c71334312410de8ff01dcc2aa862a6d6ab740204b0379389bb05af5287645f51b26bed18b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588e3c1f00b3b7d331793b4efc1de5ceb
SHA17329779d3a1400d7347dd3093cde2b86b6bc99d1
SHA2564bd1dc90a52bc8c3e8b1c25eb5f9230d033ce1c9bedb47cdfb916400143b0817
SHA51255c3c2e079db73722c2fc9cbb16c0709492ff6fc6c613b32ab43be364241a05975b80e56b7c55d560625561e25e3cfc2fc326366917c5c774c6f4cb4292de918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936b5319f608b051f3c882c45e0e8554
SHA13dde0e4c96bcec52e8648d9dcf01fa723cc97e0d
SHA2568be1b259eae695337f0146c7ae001a3545de4ecc7107152092110e35b7ddeef2
SHA512d0bb4259cdef64510544ac82dcd9243482907480ff1dd2786fc642d1ce324b051e88778ea9941bd36a9f6c200eed5f3c76db86867e30328b78fad7a08f475e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4bb5843ca58c3f4f4c6ee3eb19c6be7
SHA1fc751d52780259cc6bd3c33a1333bb90aeed3817
SHA2566872f4c82b972e9bbf02b5593848ef6b483f40769603c8d611e06f4fbec2736c
SHA512fdab9a23aa6bb883077f990bebfc86edc6750fbe88acb151ab805bec9019284ee737463c7f32db86cc2347cc018b361e127fa0e1dc4b39a15a1436e8c6da18c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8518203565ec2119537f3ee342bf86b
SHA132ca7b58c796c193f5c5d0ece5735ea0187dc867
SHA25608e6b18e49af77de9a5c2e39118ba3c0a1d1f2425ad3eb952f5db034553a7388
SHA512f368484c926f7ad2e8b6f71fe337d6a403201baba300f221e7b6f2145da81eed8279b60b67362a3ca38955c914e98bf702c0ad2174ad5ae3391fb28464bba976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5672b848af6a8830f9d06b869a13c2472
SHA1b78cd6ccc58d1dc297731d53de3a535818e420a6
SHA2566924a6bfc4193acaf632b07648f7cc0230b567fdbd17d85d1f8979c31f68b686
SHA51265edbca6933a4e7c2ad7459012eda408531290a4c927d601a1ad7e832459d98b7f8874cf6efb7157a8040f60f76d8b518140c48d465f1e6d5aa8702d87ec549c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7bf841a30677147f6b7d62202ddaeeb
SHA1631174373069fc233aadf94d641571084f451eb0
SHA2568ea4ed2eed41c3f8453e1098d5fa4554555befadf93d4d05c3991b5ae001d6cd
SHA512eb1d19d4d9749aa7bc7e94583dfc91c107bcbdf8cb5c3a92f17d967e82302f861f10a229aa45fa14844fc54d433659f8a033d6e6cbf87e8b6427a5c4fcd3406c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b318558315c3ce5ca69ed9fb28c5485
SHA1e9bc48fe0bd188af01df9c7218234a1eb2ad4810
SHA256e29dfa5bf61f433af2c01154b7504546d9fb001ed85b9695869127d2fab28818
SHA512d9d3430127e6e23cb9433a7ed1b39dd3d3041fc4141217654b6c93700a4edbf7efdfa4aa69bd06c7b14b95dc2ae2f5a192cd92769173e5ec3c0bc6899acefef6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06