Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
d75385841ba84180116304a6502b2cfb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d75385841ba84180116304a6502b2cfb.exe
Resource
win10v2004-20240226-en
General
-
Target
d75385841ba84180116304a6502b2cfb.exe
-
Size
686KB
-
MD5
d75385841ba84180116304a6502b2cfb
-
SHA1
0e161d341fce830894d6332192805c5e1ad817e7
-
SHA256
4b066e6f81bdb021faaf9e81e9b1e8123b2fc8379843013b26a2e5efed26424c
-
SHA512
54dcdea62c09bc9d19c964883eac79d3f127df97f775cef003ea8858be2a163fde65c70d6c791dddf7614cf3e20c5b430b02c84a45361fc1b7e16edd476fbb5c
-
SSDEEP
12288:fvaoCaey4G1UQlVFDQqIvsV1X1tolMeihq7fSk3kdcbCa:fvaoeG1UQa8Lp030cbp
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000d000000023149-4.dat acprotect behavioral2/files/0x000900000002320e-45.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 4344 Dzsevzezr.exe -
Loads dropped DLL 6 IoCs
pid Process 2348 d75385841ba84180116304a6502b2cfb.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 2348 d75385841ba84180116304a6502b2cfb.exe 2348 d75385841ba84180116304a6502b2cfb.exe -
resource yara_rule behavioral2/files/0x000d000000023149-4.dat upx behavioral2/memory/2348-7-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/memory/4344-21-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/memory/2348-37-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral2/files/0x000900000002320e-45.dat upx behavioral2/memory/4344-48-0x0000000010000000-0x0000000010129000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Dzsevzezr.exe d75385841ba84180116304a6502b2cfb.exe File created C:\Program Files (x86)\Dzsevzezr.dll Dzsevzezr.exe File opened for modification C:\Program Files (x86)\Dzsevzezr.dll Dzsevzezr.exe File created C:\Program Files (x86)\Dzsevzezr.exe d75385841ba84180116304a6502b2cfb.exe -
Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Dzsevzezr.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3759886940" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3760512191" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31095379" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0A5F39C9-E647-11EE-AE4D-5E2396FD2BC6} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Dzsevzezr.exe Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3759886940" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3760512191" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417655303" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31095379" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "NO" Dzsevzezr.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31095379" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31095379" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2348 d75385841ba84180116304a6502b2cfb.exe 2348 d75385841ba84180116304a6502b2cfb.exe 2348 d75385841ba84180116304a6502b2cfb.exe 2348 d75385841ba84180116304a6502b2cfb.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2348 d75385841ba84180116304a6502b2cfb.exe 2348 d75385841ba84180116304a6502b2cfb.exe 4344 Dzsevzezr.exe 4344 Dzsevzezr.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE 4456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2348 wrote to memory of 4344 2348 d75385841ba84180116304a6502b2cfb.exe 89 PID 2348 wrote to memory of 4344 2348 d75385841ba84180116304a6502b2cfb.exe 89 PID 2348 wrote to memory of 4344 2348 d75385841ba84180116304a6502b2cfb.exe 89 PID 4344 wrote to memory of 2608 4344 Dzsevzezr.exe 93 PID 4344 wrote to memory of 2608 4344 Dzsevzezr.exe 93 PID 2608 wrote to memory of 4456 2608 IEXPLORE.EXE 94 PID 2608 wrote to memory of 4456 2608 IEXPLORE.EXE 94 PID 2608 wrote to memory of 4456 2608 IEXPLORE.EXE 94 PID 2348 wrote to memory of 4072 2348 d75385841ba84180116304a6502b2cfb.exe 95 PID 2348 wrote to memory of 4072 2348 d75385841ba84180116304a6502b2cfb.exe 95 PID 2348 wrote to memory of 4072 2348 d75385841ba84180116304a6502b2cfb.exe 95 PID 4344 wrote to memory of 2608 4344 Dzsevzezr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d75385841ba84180116304a6502b2cfb.exe"C:\Users\Admin\AppData\Local\Temp\d75385841ba84180116304a6502b2cfb.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Dzsevzezr.exe"C:\Program Files (x86)\Dzsevzezr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer Automatic Crash Recovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4456
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""c:\d75385841ba84180116304a6502b2cfb.exe_And xMe.bat""2⤵PID:4072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.2MB
MD5da7712448735d8ca327feb077b1122ca
SHA1e987a01277166ad89ff00e72e4bd0c4fe7c30276
SHA256a049c2e38474b3de0cb34aa8d172dbafef4975003937e33c59757ce54e8748a5
SHA512641011851f42f0abaf0df702ab1a84c7c7dbbcfa6f96426c2909643274560088edaa272ceb74ebcf1e0891743b6e76f805a46471335a8407f6bbb35e95774703
-
Filesize
7.0MB
MD534ee369de6ad128369b9025a088d80e9
SHA18fe173d9cc523577efb5cc22695de4221b978fa4
SHA256fe7ff7906d90c02346d66e4fdc112f9dda9a7f3e6db78836ea4fe0978b88e1f4
SHA5122db4ee40fdd427a856118b2887f43163a008353616e6115bfae125de5d4170da003e9d358f5fd7c51f233cfc5e5d53ebaf91297070ca096551c990c33b509f64
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
229KB
MD54053d89a64dc6557ae0de8fa87cb0364
SHA1cf8dbec441a06b8ee53dbbc3b1ac80b80239959a
SHA256cb7705b493658b56505932e0b6543d674851f19f8141c5b1f5d38cc2388d954a
SHA512c80f1451875bb76dc11064cb303ba0548c20766171270d44c16ff91b8dfa13721a5d0f5deb3c6de12fa87a942fa526d7bf0e189eb74f20e70c1ba3d06431cc7b
-
Filesize
72KB
MD5f79ee77a4f30401507e6f54a61598f58
SHA17f3ef4945f621ed2880ff5a10a126957b2011a17
SHA256cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8
SHA51226ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
409KB
MD5c3d354bdf277263b13dca264ec2add9d
SHA1b428dfd7df0f6024e22838823cc702e2293bd314
SHA256ede1e15bb21655495ea3b3fb6710390d53839abeed944ed7ab1af7403b50aa5f
SHA51224c8e96b3c07fa4e44fbb31a4e09bea728d90d410352aa9c6b6b6165ff5c038f689b7b58b05abc6513fa4ab953b78edc0f9e8298b2d57fe1c26e80068e7ca68e
-
Filesize
182B
MD581f6bbb182df4ddb1193a3c0885f0b24
SHA12725fe220a412a68dbe7220a6002c4394c69e709
SHA2561c96d3b1acf54a5e3de429229c755f3888de85cf961e882513304cf5c6bc9355
SHA512f6bdb629163d5e28e0e2ee4b3100fc9e3dfe82e8d56ce1e77526c5aa0a8f80d3cb4d8485a22e2c3aee7a8a7fb8d60f116fc096f2d2599d026d5f99af60c8f519