Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
d75385841ba84180116304a6502b2cfb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d75385841ba84180116304a6502b2cfb.exe
Resource
win10v2004-20240226-en
General
-
Target
d75385841ba84180116304a6502b2cfb.exe
-
Size
686KB
-
MD5
d75385841ba84180116304a6502b2cfb
-
SHA1
0e161d341fce830894d6332192805c5e1ad817e7
-
SHA256
4b066e6f81bdb021faaf9e81e9b1e8123b2fc8379843013b26a2e5efed26424c
-
SHA512
54dcdea62c09bc9d19c964883eac79d3f127df97f775cef003ea8858be2a163fde65c70d6c791dddf7614cf3e20c5b430b02c84a45361fc1b7e16edd476fbb5c
-
SSDEEP
12288:fvaoCaey4G1UQlVFDQqIvsV1X1tolMeihq7fSk3kdcbCa:fvaoeG1UQa8Lp030cbp
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b00000001444f-4.dat acprotect -
Deletes itself 1 IoCs
pid Process 2620 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 Dzsevzezr.exe -
Loads dropped DLL 6 IoCs
pid Process 2080 d75385841ba84180116304a6502b2cfb.exe 2080 d75385841ba84180116304a6502b2cfb.exe 2080 d75385841ba84180116304a6502b2cfb.exe 2872 Dzsevzezr.exe 2872 Dzsevzezr.exe 2080 d75385841ba84180116304a6502b2cfb.exe -
resource yara_rule behavioral1/files/0x000b00000001444f-4.dat upx behavioral1/memory/2080-6-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/memory/2872-27-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/memory/2080-44-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/memory/2872-53-0x0000000010000000-0x0000000010129000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Dzsevzezr.exe d75385841ba84180116304a6502b2cfb.exe File opened for modification C:\Program Files (x86)\Dzsevzezr.exe d75385841ba84180116304a6502b2cfb.exe File created C:\Program Files (x86)\Dzsevzezr.dll Dzsevzezr.exe File opened for modification C:\Program Files (x86)\Dzsevzezr.dll Dzsevzezr.exe -
Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Dzsevzezr.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{095B8F71-E647-11EE-86DB-FA8378BF1C4A} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417052197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Dzsevzezr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" Dzsevzezr.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2080 d75385841ba84180116304a6502b2cfb.exe 2080 d75385841ba84180116304a6502b2cfb.exe 2872 Dzsevzezr.exe 2872 Dzsevzezr.exe 2872 Dzsevzezr.exe 2872 Dzsevzezr.exe 2872 Dzsevzezr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2080 d75385841ba84180116304a6502b2cfb.exe 2080 d75385841ba84180116304a6502b2cfb.exe 2872 Dzsevzezr.exe 2872 Dzsevzezr.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2872 2080 d75385841ba84180116304a6502b2cfb.exe 28 PID 2080 wrote to memory of 2872 2080 d75385841ba84180116304a6502b2cfb.exe 28 PID 2080 wrote to memory of 2872 2080 d75385841ba84180116304a6502b2cfb.exe 28 PID 2080 wrote to memory of 2872 2080 d75385841ba84180116304a6502b2cfb.exe 28 PID 2872 wrote to memory of 2064 2872 Dzsevzezr.exe 29 PID 2872 wrote to memory of 2064 2872 Dzsevzezr.exe 29 PID 2872 wrote to memory of 2064 2872 Dzsevzezr.exe 29 PID 2872 wrote to memory of 2064 2872 Dzsevzezr.exe 29 PID 2064 wrote to memory of 2484 2064 IEXPLORE.EXE 30 PID 2064 wrote to memory of 2484 2064 IEXPLORE.EXE 30 PID 2064 wrote to memory of 2484 2064 IEXPLORE.EXE 30 PID 2064 wrote to memory of 2484 2064 IEXPLORE.EXE 30 PID 2080 wrote to memory of 2620 2080 d75385841ba84180116304a6502b2cfb.exe 31 PID 2080 wrote to memory of 2620 2080 d75385841ba84180116304a6502b2cfb.exe 31 PID 2080 wrote to memory of 2620 2080 d75385841ba84180116304a6502b2cfb.exe 31 PID 2080 wrote to memory of 2620 2080 d75385841ba84180116304a6502b2cfb.exe 31 PID 2872 wrote to memory of 2064 2872 Dzsevzezr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d75385841ba84180116304a6502b2cfb.exe"C:\Users\Admin\AppData\Local\Temp\d75385841ba84180116304a6502b2cfb.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Dzsevzezr.exe"C:\Program Files (x86)\Dzsevzezr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer Automatic Crash Recovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""c:\d75385841ba84180116304a6502b2cfb.exe_And xMe.bat""2⤵
- Deletes itself
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.5MB
MD5f61b3a3bd7b0093cb2eba757865023ad
SHA14f80d5251450abc25061d76ef2d425ce24d85eca
SHA25640836955524a644e53046f4ff66d889e8eeebb7d37791cfd38cd1a5c9cf75f7e
SHA512aa773323b5ec0e522a5e7906caaea6cb169727c84c38fc79a235bc7e688a15b18dd82b646145b8cedda11d01354350107c738ee488ce64b54d848126b093d9d5
-
Filesize
11.7MB
MD5fed911c89a95c358dc246ba29029521d
SHA12e5b4c4e9a5bbc1ec1752b6db01026dd58f89707
SHA2567acca753976a2df8a4c00b5d4acdc01c6918f66b5d42799f037b48a0b9cc6808
SHA5129f1fa641ab23c2677c4663384180149cf051934f6688fac98fae7804652d1cc37fc44ad463961b4cb7c1d1eae6d7ee18d595f0b104ac5f38515c145651bad4bd
-
Filesize
13.6MB
MD5c400e9f580d97fccdba3921448f158cb
SHA11ff0118f7ff91437ae64e388f33e3bbb4add9a4b
SHA256f9c2b041bf08a9e3e4263d80f8ebf369c4cb9db0f2075caa711e0e503258d3f1
SHA5128f5731ce1f01811e7394659d45ecd5afb427b70a5854d87b7d380b459428e869bae84e4688b245cc7ada1a58a6b6f9488cb80932cd6fa078075b14294b85fe25
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f263e12468bea18b27cae74657824c0
SHA1c2e4323916b816044d963dfb3d3e604373f212e7
SHA256312effbd632887f58ec66d9d045505ec6d3c6748397ff1e795359401f90abded
SHA512539fe31e47a301327a435a37cbd7ecb66a49a1ffa948f670b4cb09b0782cee6fb1f6be4e79fda442692db48ab6c57768b3ebd2a541e50b97a37434421ec00cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5546688bf2116f7fb0e90b8c0d7ed8165
SHA1651e2eed28c5c9022859da6b71bc4b2ae6c3df6c
SHA256d2397a88e0a7946028fdc44915b8b6c347ec9d2eb363242ef627e36f00fe92ed
SHA51290d01e406d73f072a9af8944629562b17298b9ad623c207579e18dfb9926ac53994ab11115f8a750c6bf285760228f87ca5ad93304fa46df3a9210863988e3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956fad729d16a5d7ecf480a6b38feeeb
SHA1418df7a1bc9e88a047fd843d443919baaad36727
SHA256c14c7214212ad654ce0a018b532b246562d5583416bcb11417d001a36f19de25
SHA5126f6508614dfbb119331baf929395698a909df3bcf5d0f0eec2e9a6d9b7fa24960cfe95414f6c2c5817042ee22ce9052bbb6b0f50711d2a436ee459d62ed65d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e252788221ea4782451f37cba9cc6b3
SHA1d0e962e5fc9e4be8a8c98d61541c01b006347c50
SHA25646754bd02595409beb205d39f239389ff7686e3c4cc5277d26997ac3c3f94acd
SHA5120d968f158829490206328fd67d201dbd581d957aa6d729ff0cea9602e55ba7fee355dc8aba9ffe3c6a6d17c8045b879ee8c2f109c9c48c1664b1d73cdc20bac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c9234f749f0b2c34deea029938787e4
SHA12cd1176f95cc5cf2c8ddc813967cfb86484b9511
SHA2564bfe3fc39362cc478fb35c2e2fc03f08227d911cf4653ba8b5c0920c0fac017f
SHA512a63eddc2f35642b93ea4d8ad57d460eab620cb415ef75ede016cbad91c52f4c71e31110c86a0867b423e97349ae890ee98496d7519f8d29531a9ea304ce709b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda3046fbae91f3a83b7b0952f7aa29b
SHA1e0f9cbba9a81df45c161fce6bb0cb37c5ebbc53f
SHA2563e802a13c207772b4ca8f9d5723262b47de9dc84f1d85c1a90700eb33e63acbb
SHA5123571aa3636313f8451626063e7e0044db25dc91a6f7ee60fdd31c7ef2adb45627c6f4f6e53b54bebc284785ac6e380f301b7fe1146c35ebced0b93e48bd053f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5012c59ca39ddea711dab9a33e92cb46c
SHA1e2344102a87ff2dbce435561c6c565b3c2f5f232
SHA25672e81af2dc09a6829f3fc9f582496a207153a938c189f1e178de8dc58c63e21b
SHA5127b5597985f3630dd93fe8968bfafb30136f23acab3b9d9151c0e4bacc2a071643f2ca9dbe1f08e7fbc3ca951e97da2f13d9f439118ecd535210e1695087a699f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
72KB
MD5f79ee77a4f30401507e6f54a61598f58
SHA17f3ef4945f621ed2880ff5a10a126957b2011a17
SHA256cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8
SHA51226ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
89KB
MD5df91efb08e7ef413f4e4591a785acef7
SHA1aeb94c0f3714901c5a0a69a08ffb91c11a0c7ea9
SHA2560df0bfe7f379777a709f12ef1409662c56b9682daa2cd70434e8483d170ab497
SHA512a3b18e3c4e892cbe04221b2a772ecb1c5f9df6677ef2744340f1425da395211351e9464a1943172651e5fcb4e04e58c6cffc8485195ec2c6203fc00da6ed61ee
-
Filesize
182B
MD581f6bbb182df4ddb1193a3c0885f0b24
SHA12725fe220a412a68dbe7220a6002c4394c69e709
SHA2561c96d3b1acf54a5e3de429229c755f3888de85cf961e882513304cf5c6bc9355
SHA512f6bdb629163d5e28e0e2ee4b3100fc9e3dfe82e8d56ce1e77526c5aa0a8f80d3cb4d8485a22e2c3aee7a8a7fb8d60f116fc096f2d2599d026d5f99af60c8f519
-
Filesize
8.6MB
MD55998c68bde146b90d36efb74864bebfb
SHA1609cd832111262c634e0ad14751f44e8aaade130
SHA25657feee1d7dbd7877689e67d85e123588e4111771eaca4d35f25a894867e7e2f6
SHA51296afeb6d949a053b9c58ec10b9e63a6d1b87787183534cead0fd183c4fb7879181b8a6ed47dcf34aa02b29e9bcaa4c9bd5bda9edf746bb88b7850a78bb2e6de6
-
Filesize
13.3MB
MD5fc4c5776ad523973f7b2f721cf5a1ee2
SHA1739b8be56330b92f5061665ac2dde6d1296d90e4
SHA2564cbca24f24e3fe58cb5460abe93788efee53d8db8d0ff3d7c2d3112aac5e6fbc
SHA512acb9fee218eca8ab75a88645a8cc29c59e21251981f5f305f8778e7aaa07d3a828970fb2e655ef31db1dfe51adaf8c37aaeac603cb0e4d2dee90e4f902dcb88a
-
Filesize
409KB
MD5c3d354bdf277263b13dca264ec2add9d
SHA1b428dfd7df0f6024e22838823cc702e2293bd314
SHA256ede1e15bb21655495ea3b3fb6710390d53839abeed944ed7ab1af7403b50aa5f
SHA51224c8e96b3c07fa4e44fbb31a4e09bea728d90d410352aa9c6b6b6165ff5c038f689b7b58b05abc6513fa4ab953b78edc0f9e8298b2d57fe1c26e80068e7ca68e