Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe
Resource
win7-20240611-en
General
-
Target
977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe
-
Size
1.8MB
-
MD5
0eab07398b3fc838778e4469cfecb625
-
SHA1
8842ee46c3ff30b8d4a373fd91d326382e4b2b82
-
SHA256
977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae
-
SHA512
2c9d052e7111707d29a5f000b4ef0e920a7a457a1ad15077c79a2833ecb8952d5660e3094ad01e0142e9c81174c1e12a84cf415e73b6d0edc095c3f76603c1c5
-
SSDEEP
24576:j3vLR2VhZBJ905EmMyPnQxhe42LwvHYgUBoHDC/hR:j3dUZTHqLAl
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\K: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\P: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\Q: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\R: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\Y: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\B: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\I: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\O: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\T: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\V: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\A: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\N: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\S: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\X: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\U: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\W: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\Z: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\E: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\H: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\J: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\L: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe File opened (read-only) \??\M: 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06cebc22fbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424513324" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D54D0541-2A22-11EF-9028-46C1B5BE3FA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000f1c5f69e80f77d428aebc57d470be5a5eadecc3d9b5a6c0f52fe4fb39d0124df000000000e80000000020000200000004bfd74fe17f851bbcc4e6596768f1a21acd4b2d573fee6bad8aa6631ab56e8ad200000001008639f038859b79349f37151f040e56abfc579be69ba019b6d3c753f47803a40000000dece7521da769f06a854954997744843dbd95a1f3a96bf659219e6b2edfb7106b90836dded1fbb66146e84ceedb91ba85b9ea0e79dda437e1430d84f9680d2ea iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1936 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe Token: SeDebugPrivilege 1936 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe Token: SeDebugPrivilege 2316 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe Token: SeDebugPrivilege 2316 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2316 1936 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe 28 PID 1936 wrote to memory of 2316 1936 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe 28 PID 1936 wrote to memory of 2316 1936 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe 28 PID 1936 wrote to memory of 2316 1936 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe 28 PID 2316 wrote to memory of 2520 2316 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe 30 PID 2316 wrote to memory of 2520 2316 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe 30 PID 2316 wrote to memory of 2520 2316 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe 30 PID 2316 wrote to memory of 2520 2316 977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe 30 PID 2520 wrote to memory of 2656 2520 iexplore.exe 31 PID 2520 wrote to memory of 2656 2520 iexplore.exe 31 PID 2520 wrote to memory of 2656 2520 iexplore.exe 31 PID 2520 wrote to memory of 2656 2520 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe"C:\Users\Admin\AppData\Local\Temp\977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe"C:\Users\Admin\AppData\Local\Temp\977ec324d1fdc2c9c930d8eab34ff2161a305a0bc450c3a8421373c2ed4178ae.exe" Admin2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa652304dfcc8a7da949e8743ccc0887
SHA1c2802a70735941f3b05d7f138b486ab7925e47c6
SHA256735afda4dbaad147f90e89e5c584ea90b6159f83297608a5b6d021eff4cefbf4
SHA512ddb8325fdadc3ae5e31bfcca1f939de0098cae9a9f0eb72487a38ddfe3427ee2cf3a9c53e377ce9459161ea154858f7cc87125baac4c84e23df0439f12df2d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e92e0ef2f9c892b4402deee77fd7add7
SHA1f8101efdc3ef648f5e147a2acc4e527016368267
SHA256036ca1396ed4469caba762397a276beefc8617733fb4fa1fd5b0a1ff844aef9d
SHA512c3fc4cf3fdb0a8ce05c135fec6a63704296f98af1998cb1b7eb1ecfafd65e69fc73c7fcbdc79a87e14246e2cd0926664203f972bf69759f1f8dbad99cfa7341b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d2fec95b1074a3f86c46da926a92acd
SHA1598968f89aa1d42d4cb19ea2a5707ec466b6f08f
SHA256e0b16040ad131dcde1c0d4e5fbaf13620e4f96cd07068cf6a3e8a75fe8850322
SHA5124a060be070ec62a9fda44a6c6b61db1b143eaf5de3054ec7f5fc2c138a2c13c9f554cb51ef5552f01bf1240c70c348271408a05e23874c288852fc9e74a7df44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6d7294c58fdcae3ee31f779e6314c0
SHA150c75c93d028ab37017e0ebcf333e023251aa3b7
SHA256c2dd576171fc1bd35f84f3e3d25da3f3c47b48da31f13bfd18d18ad965e29bc0
SHA5121408aab887f10dbd0f3ef0008b89208656a7ca8d75a0a2c28f791ccf47000e12c59f8a4f2e8748c78ab3e7cf6c3288aa500d6e70beea128633cb509f47510043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc1d25d1708daf85fb26d9c348904b8
SHA198ea7c8ada355b7e27ecd26607bd2f8f5a3fa2e6
SHA256d8c96398a980aa8936438d3c02cd4ce193f3a92dc554b2a64cf9482c248e3b3d
SHA5121e4a720e8b09f755ccd29a8de4433a01c86adcf562710bc4091d392d3b4a61cb047b3f8ed6cf0b67746432b97bf7ce6945241b6907ccf734855e1aa07f2e73be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553ddc1070e00d84357d72f9c99475c59
SHA10d9fecb87d55a5d86a24202e65a6db2ea2d2f00f
SHA256e1a87d9136654c47f4c2c0163b4bcc2939f2329e7e731317a4b9ab3d1eddc53f
SHA512df4817f86d1fa740cadac56955e901028d65d92fa7a8dfa9e130ad4b71c34d73f3e85608bf424cd1ad3e8cb93e0f8152016a9af4e3211c39a66740a76a0f60c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558031fc74a5437f39fb4c84a8bc6d460
SHA104145c6aa8d6fa79db96f6d56f611d2975446925
SHA2560609cad846dc3577371e18e32ea4c77db314abf94abe527253bddabf8bc59434
SHA5123c5e4e808341b009fe82390936ac70472f5c1e80c237bb5c2429a7fcb691c9a40daf95475b91e560f6606b20775bb6b152101bf8e880b9819cfddcea94fbd89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85d50afb7e9c040b5eb8c9cacf2c3f1
SHA1e18e216f3f5aceef9e81ab74148b826514ae197c
SHA256bf0834fb07593aca61d355926ce6bb4ff9c257d581d227bbffe85d3ee7f54e16
SHA512744994d2e7dc42f2c0fd21986a4b63d3dd6cc81a579ed81a777b191b5456bd2535916861a40524ee6d4fb8630fd8602bcf50e670d610edde6893916e026e4eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2013c28bb5aede4da786aaeee126cf2
SHA1725549d94148ef8dcb4a55f58eae6a5156cf9b81
SHA25619529081a86e66f51fba97ae6e37cb23520e4fd0c327ff5e77e090eae7619aa9
SHA512950a4ca5bd5807e57873222e27d39bfb1aa0297137e3b29268dbfaeb541eb481ca0c7015742187ef759603eaf33c46dcfd02b892c070a5c8d6245a8c2ba81be7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b