Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 18:33
Behavioral task
behavioral1
Sample
c695eb6b2b0f242da95bd631796b34ec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c695eb6b2b0f242da95bd631796b34ec.exe
Resource
win10v2004-20240226-en
General
-
Target
c695eb6b2b0f242da95bd631796b34ec.exe
-
Size
75KB
-
MD5
c695eb6b2b0f242da95bd631796b34ec
-
SHA1
7ae7ddb534ea74cd94cfd7edb727208dece9b734
-
SHA256
68e7177ff545694660bde9569b892e349d6eacf623ad6dd9ee7cc50794de6142
-
SHA512
547d86547dfe02236dcf79ed2ed1349edcf6d95fd3c6ab6a1c92ade248b026efcfb20dd728d0978ddcee7112de1b97f4b11e3a151cfacd6699ac176f3d5cf17f
-
SSDEEP
1536:16fADFRYayDo7HxFejJRNaINHYARtDT/8uCEdztVa4k:BF6ayc7PejJbao4An//dCEdG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\b231ea761d.dll c695eb6b2b0f242da95bd631796b34ec.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416516696" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B574701-E168-11EE-86DB-FA8378BF1C4A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1584 wrote to memory of 2484 1584 c695eb6b2b0f242da95bd631796b34ec.exe 30 PID 1584 wrote to memory of 2484 1584 c695eb6b2b0f242da95bd631796b34ec.exe 30 PID 1584 wrote to memory of 2484 1584 c695eb6b2b0f242da95bd631796b34ec.exe 30 PID 1584 wrote to memory of 2484 1584 c695eb6b2b0f242da95bd631796b34ec.exe 30 PID 1584 wrote to memory of 2484 1584 c695eb6b2b0f242da95bd631796b34ec.exe 30 PID 1584 wrote to memory of 2724 1584 c695eb6b2b0f242da95bd631796b34ec.exe 31 PID 1584 wrote to memory of 2724 1584 c695eb6b2b0f242da95bd631796b34ec.exe 31 PID 1584 wrote to memory of 2724 1584 c695eb6b2b0f242da95bd631796b34ec.exe 31 PID 1584 wrote to memory of 2724 1584 c695eb6b2b0f242da95bd631796b34ec.exe 31 PID 2484 wrote to memory of 2516 2484 IEXPLORE.EXE 33 PID 2484 wrote to memory of 2516 2484 IEXPLORE.EXE 33 PID 2484 wrote to memory of 2516 2484 IEXPLORE.EXE 33 PID 2484 wrote to memory of 2516 2484 IEXPLORE.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c695eb6b2b0f242da95bd631796b34ec.exe"C:\Users\Admin\AppData\Local\Temp\c695eb6b2b0f242da95bd631796b34ec.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$30689.bat2⤵
- Deletes itself
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a02e8fdda49a98f45f33ab541bd5c451
SHA1d29f5a6e440b78ad00eb9d2f24cc8d209e80653f
SHA25690984f10993737b32c5d41c385bca16ca260deab74edcf8b88771f72852d136d
SHA5123f765301a7eb1b14ceba937701877dc0117930c3c11e4d4a2663b343f87eda35683409841a497085d2ae12620c29ef488e48199ee8c0dc071661d79e72554626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae274742daabc085fd8fe23c34613146
SHA101e8c0517979fb99712b0749339059a1a5c33d14
SHA2562e9cc36099fd16e060222ab83e5b0efc3810555597ef389cae4833dd9d887205
SHA512f2246daa221548f57262dc39f9eaa4823598577f1611855bde1b9f1bb311c3b6360d03093bec7511e581faaf1a43bf0e819ec00ae481c2a898380077d8b9f379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eefab730a8d47302c59f8fdc425b574a
SHA110624a97d10038007194ef0711d11d8506f0633c
SHA256fc65aa0401b178ce2b0c5c03300f161e6a7e4988fbcca36bde146fa8acd79c47
SHA51274c6aaeb77a6e7ae8494d77a34feedc86290f682df605124ce163bf18f1aa8d522ea5418205ede6b64f7290a2821eb623b430a22663deb06fd77a0b57d76ca38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e5ea9c2a3e2ead75a772bc518fab595
SHA152b4269de5b5a579dbab80b1ab10ebd4ef451ca3
SHA25698d35f0da4589ecbe3e4a3b4aac95dff2f0bd6bc3f5e2aeb586aed739626113d
SHA51251c3e96e31e4d2c0497fcdcfefcf3c69fe94bce6f6017813c2097ce86fa27326f103551b79b0ac243e5bfc02210e5261c381e63c8d54fe95c8e76a03ca61b52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87796fc54f24238a954e5c894f8bc06
SHA180b4c5b174865878845eecc5bdaea3530db504fe
SHA2562379e5357a87f6c25a08cdecd9f2b9dc6abd6101ff128a1ce74665e189d41b81
SHA5120f4c60e937f5a6a68b72a1d5788bb5d1e7ea71e0584494ad5f6f0229a3189bbef461e21d95eeb0de113cbc9064d3307b4ad055671e571f92f1f233834566b410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5428667f20c34157f8908f04b9c7b0abc
SHA155c36451edaffb64f26aa07da0652e482755156f
SHA25674145a2398bd6040ca51d3937896967f5f4eec3aadd6749de3b609680254934e
SHA5129726cc2273a1d39af47cb6ab71517eefb4384f7d21cdc1e887a003681ae2352f200605b120a4be7b2447ffbb2c1dc9955c8f59d097fc73a3440c278821670f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef893a62f8edbfe7807d0e365f847e91
SHA12f8e7c2b6211600a2e12b7ea4dcc66134423d04d
SHA256e94906106e82aca035a905e325c179a9241951622361141908063863d5f9b600
SHA512181e8bcc6eeb01ece3772f1b1c2a9a3d1f91a153864d59ebb873011f4e12f9f45af84a0b270ec87870274c5bfcf8e54a8d182ac313596173f7dca4e7ef0e5b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a81a9f57a28f6253087a8356372c12fe
SHA1b26f4533b50228e2b1d6f50ac83ecab74620c49c
SHA2562f54d7db11cd0524d043ea4182b681801d6a77d0c2b41e0ad883464cc41eac7d
SHA5129aa081d4afb9312ec8df6dd8ecd67a7b76bc6e7cd0859d49aef36fe4cc9e02f70cfda7c75b0a8207a8c7902057ac612c2854a9a027e7a67d529efc7f7111eddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ef28d265b8ff4414d3933d5c069b12
SHA1f3bbf10b80b106ea99e3edfb517757d323e867d5
SHA256d4e58908feab00216db1d5d48cf16a059b5a8240dd5348df71bc41065265f8a8
SHA51243513068d0ed985ed1e1f7b586227132c71bbce06017d9ee7b88f0179307841b178b614bc3ef0167e15bf6faac6e51592049318b7ecfa04028e324aa41135ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b626fe9e6a683a4f9fa92f9c82f13626
SHA128474e8e189f59b9ba3e913a005b93b0c28d85b0
SHA25656ee250ee398aa32d27afc3e73562b0f256e25f440c94b92b4eddb03b728be00
SHA5123d3366e429dbea1d81e7e7a2ec3ab612acfbd1cfd80288c72a524b78f854dd1cfdc2781c0fd9ba1031a11258c198fe461d139206947b54ce670e6fdfbc1dae2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504e6f297badd6fa56af40d2a0ab6791f
SHA13b384afa817370126933c0cac7cb2d04a98be24d
SHA2560b8607687022d6b065dccb19b1f78fd4730af774cc666a1f068fb74d487d83ea
SHA512ca077ff3676d3b9020c69ff6d7ee87b64f162a17f68ee4df6301d7957207a8d31f26a20bceeaba591d460102b0af80a13fceffa92ceb7188474410f2e5763d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9bd7de1c1a6f3cdeabd53cbba8df706
SHA1842d70e969ce2d34e5257713bdba156c7c9a48ff
SHA256deff92c6bc7d7be84f995d2dcce4ca057a33475fded9e98604d2bace63b154e8
SHA51253247604ac952156f84fad22c19c8fe9e0a1f042f5e4269fdfb3c92a85bf66ed11d8be48a1fbb1d3f14aa55b4367e328e58e6427a135bddf5ecfa7278b923a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e709214cbc341b84ed7143e4a03cd2bd
SHA112bba0d9e766516ec20d4e42979e748cc2a61773
SHA2561b291a989ed43e96952e54ad90eb43dd33b7fba63e6d01842ae6f191caf5765e
SHA512d045c6778320ed549900c735e751e069208192325a5478a818efd7725498b542ec0a89215347b348ad0aedaa6dcb84eb067bdc00654176a1980d9ef835c2822f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fba82d023de1a27aa9f0a728e64b3381
SHA15a1eef8329a1f96d8368605789b16e26aba41eee
SHA2561b82278b50fd714ac882304bdd4ecb76ee8b162fb187b63399ba0978b1880b24
SHA5124bab793a623355081e9beed7c22b9259094c3dee9e6acaa5867cb54a5a86965ccc1586a1bfee851badeda1781866a77facabd301c142d4d7f3be0925f0da39fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5a081d927fd7c0b19d3506ed901c84b
SHA1c986f9acca8c560a32e4e1b4ff078d862b47c5fb
SHA2562511d1ea71584d1c199bcc4c2f783e158fa78a3bdafb648b1607ba5b30d39ed5
SHA512db7805177d292bab36fb26802f33dc8dab559dfd8525dda845f027d9d8ad33e239fc03d6ed343ac582d1c75d2c94bb1a0cc7a5186911cdb486579fed062bc481
-
Filesize
181B
MD514f9cab4b3456c3c1a418d71c69c9cd3
SHA1833f5af84fbcfb36b08027389c50847039e98e45
SHA256b77c5531fe1025805d6fe140f51182b7f182d0db0dcd660e5f84f41c00378c5b
SHA5128032ed0edf36cdc320abca0765f229af9129c07d3d07dd679f1da88334064404b1e4288e228846446ea686502302619b62f2cb62db72a12097f36d1151db9d72
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63