Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 17:13
Behavioral task
behavioral1
Sample
8067c6a11b500d18debbb0ea853d293b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8067c6a11b500d18debbb0ea853d293b.exe
Resource
win10v2004-20231215-en
General
-
Target
8067c6a11b500d18debbb0ea853d293b.exe
-
Size
40KB
-
MD5
8067c6a11b500d18debbb0ea853d293b
-
SHA1
db61531d68f5a6e12e73aae723239fb32d884332
-
SHA256
42bcc169e3b18588642c171ecee6a249cb113a3391a33e9e3ce5a1ac67218802
-
SHA512
137b68381bff9d73d6229f6064a6d16534c5f31ee137d88fa163cc6c30ca37f26dedd104ef9d06924ec5c5b97c785094787ce0eba0bd862dbf4fb47886c4644d
-
SSDEEP
768:OdAQqKkhTWqLDNh693Dyl+SLwNzp7+kvDLRiRXaA:OqAsdO6EpJ2KA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4500 winlogom.exe -
resource yara_rule behavioral2/memory/4988-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/files/0x0007000000023213-6.dat upx behavioral2/memory/4500-8-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4988-64-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4500-92-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 8067c6a11b500d18debbb0ea853d293b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winlogom.exe 8067c6a11b500d18debbb0ea853d293b.exe File opened for modification C:\Windows\winlogom.exe 8067c6a11b500d18debbb0ea853d293b.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31085270" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31085270" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2746356242" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2758386397" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413313422" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2746512332" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c4e92002c4a416439bca1d31c27b840500000000020000000000106600000001000020000000728985b7d8e35e2c919ce81afc789e4c0e72d124ce51cce9cf8c5f7453faf2a2000000000e8000000002000020000000f79aed476ef390b0f50fa7c464b0a2de0ce4d7d7c88ed62b8bcb0156c99cb38d2000000075b60bbd2bf4790597008966dc611f0932a53577e8d9dd879c71c925bf2f3561400000004348f121e509ce8cb0a3aec2975ccd171f2801ca0542c8880985554ea8d4b0e23a9b36dbe02d02d1ffa81c43cd7185c785be0ea9af44e277c4997b0974b2ff74 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04772a5d652da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CF272253-BEC9-11EE-BB4F-7E4216712C33} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c4e92002c4a416439bca1d31c27b840500000000020000000000106600000001000020000000e0f04bbd02b7575e3a785f148bbcf0296da2dad6a4f1a699e81a6ebd8177bbdb000000000e80000000020000200000008328174681b38f3f164c7e344f68241a9a9926826a17bf1e0c645e2b64aee05a200000005ffbe62b81836c83011f3ff8d6589e57f3b267ee9f5d8790e123f414adc2e3d24000000023a6dc0edf882891962e9fc9d4d56dd5152de7854000c0f727a0f705f4145ef25eefe08913c4c6568cdd621c700c1cd73f255ce0351e8d5eabfaa408e10c9f4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0525aa5d652da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31085270" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4988 8067c6a11b500d18debbb0ea853d293b.exe 4988 8067c6a11b500d18debbb0ea853d293b.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4012 iexplore.exe 4500 winlogom.exe 4500 winlogom.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4988 8067c6a11b500d18debbb0ea853d293b.exe 4500 winlogom.exe 4012 iexplore.exe 4012 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4500 4988 8067c6a11b500d18debbb0ea853d293b.exe 84 PID 4988 wrote to memory of 4500 4988 8067c6a11b500d18debbb0ea853d293b.exe 84 PID 4988 wrote to memory of 4500 4988 8067c6a11b500d18debbb0ea853d293b.exe 84 PID 4988 wrote to memory of 4012 4988 8067c6a11b500d18debbb0ea853d293b.exe 85 PID 4988 wrote to memory of 4012 4988 8067c6a11b500d18debbb0ea853d293b.exe 85 PID 4012 wrote to memory of 2824 4012 iexplore.exe 86 PID 4012 wrote to memory of 2824 4012 iexplore.exe 86 PID 4012 wrote to memory of 2824 4012 iexplore.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8067c6a11b500d18debbb0ea853d293b.exe"C:\Users\Admin\AppData\Local\Temp\8067c6a11b500d18debbb0ea853d293b.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\winlogom.exeC:\Windows\winlogom.exe auto2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4500
-
-
C:\progra~1\Intern~1\iexplore.exeC:\\progra~1\\Intern~1\\iexplore.exe http://jianqiangzhe1.com/AddSetup.asp?id=127&localID=QM00013&isqq=32⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4012 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5f707892eea2389f9570075e7e0b2ba49
SHA120c62e10bbf4210c8d4c7966785344f29c4a8024
SHA25649f24b1fd45db9778b10ec10d9c85ef0746828225855255f3617ed06c485c1ba
SHA512c7b662eab0356715eecedae5ecacc260731f131f2e2c388ed9c91c6c1a7ce23aa02965ffb2f3ccf041fb249c3f6d713a19d7292b6afa4f5091d3fd5a4c2e054e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5ca3f1d6746d104d11176242114aaa2f0
SHA1a5d4819cde6a598310694d74f6b7ca828047c6e5
SHA256d233b20b11d7aab2d17cc05bebc37fdf12e4dc20eeaa3791bb0ff6d776d20404
SHA51241e56dceee146b3b6ab79362c8a858e70e24d05cfb872a3275b42cd72bd62d44bcf8a8918791b476373af1625a1eca261caa1a3b48603cd93fe8aaea64267362
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
40KB
MD58067c6a11b500d18debbb0ea853d293b
SHA1db61531d68f5a6e12e73aae723239fb32d884332
SHA25642bcc169e3b18588642c171ecee6a249cb113a3391a33e9e3ce5a1ac67218802
SHA512137b68381bff9d73d6229f6064a6d16534c5f31ee137d88fa163cc6c30ca37f26dedd104ef9d06924ec5c5b97c785094787ce0eba0bd862dbf4fb47886c4644d