Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 22:08
Behavioral task
behavioral1
Sample
c57e713d11a445b717c51a096854135c.exe
Resource
win7-20240221-en
General
-
Target
c57e713d11a445b717c51a096854135c.exe
-
Size
213KB
-
MD5
c57e713d11a445b717c51a096854135c
-
SHA1
30ed7208567b37f6ea62b9af5eafa2f6c6cb2982
-
SHA256
ec65d514fa8fb1e3b2992c67d5fa07b113072737ecde8ab90866d1d31d92c86c
-
SHA512
871964bed911fe8663b5ae55845da8149d6d5393d446c25d5636d1f6d96445e01ede26c3fb9d6ee520ec8104ffdfb3135c00f09437fb0bc682ca7e92385928f9
-
SSDEEP
3072:y62MonpU9tw04VQJM6216XzD8areAEP/lQgWu6OWVcoGgsmOKh/v6nv6DNe:T2MAU9yfoFn7qJ3lm8ct1RD4
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2264-0-0x0000000000400000-0x000000000057A000-memory.dmp upx behavioral1/memory/2264-24-0x0000000000400000-0x000000000057A000-memory.dmp upx behavioral1/memory/2264-26-0x0000000000400000-0x000000000057A000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c57e713d11a445b717c51a096854135c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416702422" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000b53bf0c9201b553b75d734953214c8c3fb9f7ac4f22f0bab85b1145696f4e137000000000e80000000020000200000002415629e3a12589dd1b32de22579e5cfa8fce124853db2a1cb20ac4363fe51de200000002c0e61008796fcacea5e38317324cfecdaf5808517321ffd793697700948e3c740000000b8af32ea6dc6ce869b141182455260502952c2c6c71b93e30ef91cb0e31c01e02d024ae7818131be5ef55ebad7648283228e0e9a785dd8c22226785a3d3b811d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A734AEC1-E318-11EE-B0EF-E25BC60B6402} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main c57e713d11a445b717c51a096854135c.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0355d952577da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1360 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2264 c57e713d11a445b717c51a096854135c.exe 2264 c57e713d11a445b717c51a096854135c.exe 2264 c57e713d11a445b717c51a096854135c.exe 1360 iexplore.exe 1360 iexplore.exe 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1360 2264 c57e713d11a445b717c51a096854135c.exe 32 PID 2264 wrote to memory of 1360 2264 c57e713d11a445b717c51a096854135c.exe 32 PID 2264 wrote to memory of 1360 2264 c57e713d11a445b717c51a096854135c.exe 32 PID 2264 wrote to memory of 1360 2264 c57e713d11a445b717c51a096854135c.exe 32 PID 1360 wrote to memory of 1152 1360 iexplore.exe 33 PID 1360 wrote to memory of 1152 1360 iexplore.exe 33 PID 1360 wrote to memory of 1152 1360 iexplore.exe 33 PID 1360 wrote to memory of 1152 1360 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c57e713d11a445b717c51a096854135c.exe"C:\Users\Admin\AppData\Local\Temp\c57e713d11a445b717c51a096854135c.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=6432⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e818f67567ee7350edaa94d7d9b4738
SHA186f5432c5e5db05cdce29636fbb2eed09e82e168
SHA256db7304479e28cb9ed3c1590aa58a2efb0535df3e2205910188e7030bcc57ea4a
SHA512974e9aa43007016f12d24647cab859de135d3b93a0e1eec2e4e9e5b2d5e1f1c9269a9e8775ababa9c31de65b204ff27f21ce3bf7af6cd1a3a8ff2471093f428b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca3ac66dd949310b45af64cf8da58990
SHA1cc112cebeba37e4e0c9832e77b8b007082c416f3
SHA2562ed0b939495de8d4116cd712e3782809393bfdc5d4f2db9ffa3e328365ea3e7a
SHA512fd0e43f60b722b83e9cd9b16f196116258be231a32882eedf1ee4374f44a0e7d9fe802fcaed65297d064cdb394de75c2168f4c85669d55a697bf4c82192baa9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58259d452cacc2b62a9b1720729c27415
SHA14888353e7e9bee90be7e7eb159b940a38fe0e017
SHA256bdb6b9566f5149087409020837c1501ccf66ef312bd961bc34168d75383e5c60
SHA512a68b1004983fdf79be6fc5fccd8267b453b39b5c86d78fc8558277a7efdb04ae451b9282b5b9063146f9a169eac2867bbef1a53fa2a3926c4c1bb9beec7c2638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56539f4a07bc35a1fda7124d60b16038e
SHA1dc05b8431d0729e770c36ccca08df2e76d1ca0b6
SHA2561e45169d03f2e1174b0530dec02857055bcac9b7aee5897292ef219007fc20df
SHA512db7599ad1f53b7616b80e7f008fb77891575c96b1938b97824177823c8eb2264178da4b0b2e5d6142ef9372630c3ee8abf3367e9129de6d526def0eaf4e8bb99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5507b56d2e4630f1589cdfda3f82b6fa0
SHA1adb738b9fad79b80c1d28c38642696a877a87ee2
SHA2566de17f88b567e38030961f66769a2a11af69a98504beaa2200edd04dcb97b323
SHA5124cfd2ef5623848c49e2dfbec543413201e117abc722c819958d027c744f858085deb6f46cf5b8158da7394f4af711f458444ac425f635290522d9afd0ea29043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a61f045cdfa7a6879263768ac25c2ec
SHA1dd2257fb438fc6e1c7098a4cae0a8c09cf08bedd
SHA25655b6dc6413058a25a3bc4ea5155c0cd7d154af800820d206148024190264cde4
SHA512720a676108e0ecf75d91c2cf882645984ac227429f080ef070f0b4a036c94966bd7d3fcd7cf4e3eb5cd8e85eff97886869cb72d251837865505d91e15db59ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc9f1f02db6c3364dc9c3f24aab007eb
SHA10ad8ac04119bac501dd2c7fe0a91b63ef7dfadb0
SHA256a1205d0e3019ece22adf73a34a3fa313a65f4c177948bd64b5bc327cf700ca49
SHA512bd47cc2ca80d05455b50e6342577b9b11b60e9ea02dd260e3b90b85564f3934e20ec2698ca3bc291d2fd1853c9b3b787486b74908caa4a0a3d15912918810c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ece3977485e4d7614344ff5b3941f861
SHA1e8966662b5e065f845d1db8c537c6a211656d325
SHA256517f133c9c8306bddcb77de7b3eb25b59e4efd599f561f94187017822ea6c471
SHA51275e3508050b1da0ecdb4fa08c235a0a5a2e0cd90671236776f5e8fb2491a2441035855a25bd08f827a1d8b5e985fcbcfba04f225c5f9735d6f950181928e99d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57af89a391531d1b7fae9dacd25d76317
SHA15404119eaee259d91646a032e64332dcb34b1793
SHA256c2d27956cdabb9ca78fe817388b1e9812e80553339e70ac1a33f28a95d26abdb
SHA512fa1c19e38321b8256e286b28fbe66fcd0565f31aba0cf37d4f00845e4169c0f9f8327f5894ce821899e877badef2bb49aa71c12693c15f508a13e756481f24f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b7b89bc55ac6418128dd7c3ca19172b
SHA149034d79122318a21bbfe092c373d2a623ff4c6c
SHA2565c3eb3dc329efe23d85ea8691ea022d5e6fa73ce2be40c7fe9671ff774cec8e5
SHA512ca103eebbb3ca13396d855d96a4a15205c5bc76eaf1a43bd65b3e2613874546b0033851ab5ea59a71be58a333ba0fec9a1b9f7e2cc073bdbd476fa62125f0797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56947cdf95f801b491469fe9f7eac67c5
SHA1b30140b7ff56abdaad01f44901b3ae4a0e7bd518
SHA2566fe48a4235be1472ddff90c1f1e28e7a9a06626cb35b4c7f0df36219489b4c37
SHA5128e8bb4d07b6abee63b29d6ea48d3d8c0e19fd3337cb592ab3b44d9b6a8fdde7833769233d78b8b27dd94e8bace6b3bb2a9d55a879da18d6a08052c598b663769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e37bc43e001ac92df14b7ff881e56f3
SHA1b8a870682c61d5622fbf3cca69c4cc28df0ff069
SHA2568ca2ea840eb411a7e2968687c3c15f411989dac5975ee17e83a15bce0000bf6c
SHA5124850deb4b73346d13699bd78eff2ba38ee6dbd308c41a8782b2ba86740fc0d16a1d3a78817613ef02ce2de3d479f677571f1ec74bc8c721eb1d8d77cf8d92c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5841438137bda29ca0947b1c6934f2
SHA190ca03fa951ee6f2026d8c9a41d68c23a5853be1
SHA2561cfb47fcbabb67ae53b4de115e383cf2817b8a9967ebe8c29efd13118621c7fb
SHA5126f63693f6964f1b394af0f21a204952ab75c9491eaf67f5ab5734114e701a62ed576a9cb5a500d197c318083c3e85e6526493a7b4f1cad158ce36164535485a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dabefb0a70d0992f51692bcd56313b44
SHA1e8597eef8d0ce706dd6071d17c4ddb8572c9d6c5
SHA256b4eccc97e3aa229e62cabc712ed0c660a2d03f6cc2c79e1512f4bbf3c585f11f
SHA512247623d8bec22ea2626385fd82b9429645a80cedce3e8ababb8139ccfd77af93dfafacc31b0d3f6f36f31c6650d3df9b86aec3aa58dbe2f0175d1dc37e30374e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522467006e15392d04e771b8fc99186f0
SHA15609ca419fead815066eb505ef30165f95a77526
SHA256531bf384d6c4cd2ca949f288da9d2153ddefc0dba8b9729347b33edf57c64607
SHA5122ac99a10afc8831a7e4a2f06299f423a5f795edee025677a16ac91ba909172eed2ec2781cb7bd3f214ff22705f8ae6392fca88387d166fcadf013667f53d7123
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
192B
MD50fcf82b5a915470e8a79d3516f582a36
SHA175f81b41607905b231521243129aff3554a58db0
SHA256076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4
SHA512adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63