Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/02/2024, 12:27
240228-pmwrdabe3s 328/02/2024, 12:19
240228-phfjlabc89 328/02/2024, 12:18
240228-pgpqwabc78 328/02/2024, 12:15
240228-pfbsmabc7s 328/02/2024, 12:14
240228-pepcbsbc42 3Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
executable.2772.exe
Resource
win7-20240221-en
General
-
Target
executable.2772.exe
-
Size
5KB
-
MD5
05a065421caa9215958deca72a5b15f3
-
SHA1
e7be3fd7f0e5f71ec6e55b014cd79c1e93cb2fd8
-
SHA256
13170ec31cf0920ad871b0d0603b6f575f847e523ac977e5177adaf62d569853
-
SHA512
d46813f0c4c626674c8cd69bc934ffead1139518d715f664a971d4cece87f7971bacbbcaabc1d74e406e3d1a278fa0e9f8713ace4b0071d034c9a091a8e6a2ab
-
SSDEEP
96:S0FKCiwCRG4jynYJfcUdBOEH9LmdhPoJ4IF54:r1SRG4jynKx5yfPoJ4IFi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{405C96F1-D633-11EE-9052-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2500 1656 iexplore.exe 30 PID 1656 wrote to memory of 2500 1656 iexplore.exe 30 PID 1656 wrote to memory of 2500 1656 iexplore.exe 30 PID 1656 wrote to memory of 2500 1656 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\executable.2772.exe"C:\Users\Admin\AppData\Local\Temp\executable.2772.exe"1⤵PID:1244
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540b5449314d939e59f825d283fab4cd5
SHA125016b47d0dfb45dad616c58f69694e3cce3d639
SHA25666d9a2f69ff6edc534266ba04bb928f2465a55181dee31a03a9bd5bf4a186e96
SHA5127d04ad6ef1390cc0901d8f08a8e7283607fd139690625a4fc2b2ad098d049a58edc63472e58ab02a4e02e5307aa25fa9fdea6fa2c40e5b37c62815ff34d0a06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e914adc98c10288ffc2494aac512ae8
SHA1c7fd1898730911d118ac1503ee7a1e04b503ce97
SHA256f899056fb56f40c62d10a174ebd3e31442354e2b0a6db43e3375ad188d153bb6
SHA512c82bde4deac1c41803189387bcda6d56e3134dac259298cff1a46df6c4554e1cab3159e4b2846b6942bdaf3309c02909c567b0e3da3c22be2a408cd1ceaaa991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ad82b5a3f0df0419212b21b5687c305
SHA1ee9128948f6848ea9daef3a26a699645fa8941ce
SHA256a9d1c167cf0ec73d6efac432c9506e0c9305f0e731648036b69b36073d546230
SHA5127fdddf3e23871641d701210760e0f944e8379ed5bd73ea37cf5e3b267fc7ebfc48a7063f4d568ad2f29fce1e5bafeca4163ff3acbc0edacdf1175c5f3b9af7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b85f2a5892410d721dff28cb5338388
SHA1636a5bd5c179e2380e7db418372a7e606a1ceeb6
SHA25658821ff61a092dbed4adc1e3e0b2b1e36d5cbb0b75e88ff369a071a93cd5ede5
SHA512a4428f1eab07ca5f2aa18f2d363f1767daa2e3fe62b9aab92805a86031e33c060751c66f99a3ec20deca6b096c35b05427718d1b3c5ce453a51aa7a5c2709474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51890701e93ba9086f9f44ba868749319
SHA1cafdd1be225f47dfdd432ffbd6a31e1661b8ce3a
SHA256396fba283c2838d52333b7bd77e904be8b55117c592cd1cff23ae64b27c94e64
SHA512379df55fffc54aac7b5187cbbd91ba6c6cf781fa34d7f16dfcea9d0a7a60ddb28121920bed4aa922b6cb9321c7362bfdcc7c39da2903c8162d7c7bca57d21cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5527dc5550134e18d3d90650748f3a242
SHA17afd5be860cd38019a64f48597b71d57d010cff9
SHA2562e53a16c0d9d76210f391f8aff2487b944a6003d230c59c31ac96ee9b4bd5d52
SHA5121e8fe87d22d9035e555efeeede2e7c244f956094250488a5ead087e5b264e1df6c24e95ec69b4cc9c16891894d4936990439d85426b264d929a99d933ad13615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513fd46cb30d31d49f1df72eddfc1cf67
SHA1f7baa42516eacbaa7126409870b2b8690fb8607c
SHA25676bd6b082eebd85bfe60fea1aa15012de04a3c073289dbbe64c243e7cdcea194
SHA5129231e951691c85c86a621a66f910e8a0a27586b98740face3d18a74e6be8f65becdab849db241c9c867c8871b511d380696ffd6d99a027a8967c07780f931b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589653a495cdee37f8c20d9eef538aa3d
SHA1a842c84406bc941b1a0d1e6ae406db67f44e97f9
SHA256da10bec6c29c1caa44fead01b82fcdb3210f7e21be1d580d8265b8115d01dbb8
SHA512d3d8ee3b9e34374b90701486d8fc0618c5ae2caf4379aba8481f52a5f702c3a4806e62ddbe888ddff38c24dffffc286954fe6469afe1e9496d664a0a1c4da69b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63