Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
uaa.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uaa.exe
Resource
win10v2004-20240611-en
General
-
Target
uaa.exe
-
Size
144KB
-
MD5
120cb6528cd6cd5d87c8091b549141e0
-
SHA1
1274d57af7e11f22361df7807ff5c213585b2aee
-
SHA256
4107ca25f7228c0aa5407b528fa6d48d10734c4ae72088a78857f77c8e289910
-
SHA512
58cbbeada86393d285b3a9501c226f98d761bd7ac0de67228af1b2a8586a1b81222f3fe8043f0a7ec5a9431b764634d2e1de98b0dce9bef682287cff76716963
-
SSDEEP
3072:8ozK+rVoJoikcb81aWZveimww4uc72ZIVu/JMLqllXw5Eec/Gv:8AKAQArZvdJw5JZ6LeA
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2508 Zsvzvy.exe 2136 Zsvzvy.exe 2576 Zsvzvy.exe -
Loads dropped DLL 4 IoCs
pid Process 1960 uaa.exe 2628 uaa.exe 2628 uaa.exe 2508 Zsvzvy.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zsvzvy = "C:\\Users\\Admin\\AppData\\Roaming\\Zsvzvy.exe" uaa.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1960 set thread context of 2384 1960 uaa.exe 28 PID 2384 set thread context of 2628 2384 uaa.exe 29 PID 2508 set thread context of 2136 2508 Zsvzvy.exe 31 PID 2136 set thread context of 2576 2136 Zsvzvy.exe 32 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11330621-324A-11EF-8C92-6A2211F10352} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425409807" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2628 uaa.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2576 Zsvzvy.exe Token: SeDebugPrivilege 1428 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 292 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 292 IEXPLORE.EXE 292 IEXPLORE.EXE 1428 IEXPLORE.EXE 1428 IEXPLORE.EXE 1428 IEXPLORE.EXE 1428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 1960 wrote to memory of 2384 1960 uaa.exe 28 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2384 wrote to memory of 2628 2384 uaa.exe 29 PID 2628 wrote to memory of 2508 2628 uaa.exe 30 PID 2628 wrote to memory of 2508 2628 uaa.exe 30 PID 2628 wrote to memory of 2508 2628 uaa.exe 30 PID 2628 wrote to memory of 2508 2628 uaa.exe 30 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2508 wrote to memory of 2136 2508 Zsvzvy.exe 31 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2136 wrote to memory of 2576 2136 Zsvzvy.exe 32 PID 2576 wrote to memory of 2024 2576 Zsvzvy.exe 33 PID 2576 wrote to memory of 2024 2576 Zsvzvy.exe 33 PID 2576 wrote to memory of 2024 2576 Zsvzvy.exe 33 PID 2576 wrote to memory of 2024 2576 Zsvzvy.exe 33 PID 2024 wrote to memory of 292 2024 iexplore.exe 34 PID 2024 wrote to memory of 292 2024 iexplore.exe 34 PID 2024 wrote to memory of 292 2024 iexplore.exe 34 PID 2024 wrote to memory of 292 2024 iexplore.exe 34 PID 292 wrote to memory of 1428 292 IEXPLORE.EXE 36 PID 292 wrote to memory of 1428 292 IEXPLORE.EXE 36 PID 292 wrote to memory of 1428 292 IEXPLORE.EXE 36 PID 292 wrote to memory of 1428 292 IEXPLORE.EXE 36 PID 2576 wrote to memory of 1428 2576 Zsvzvy.exe 36 PID 2576 wrote to memory of 1428 2576 Zsvzvy.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\uaa.exe"C:\Users\Admin\AppData\Local\Temp\uaa.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\uaa.exe"C:\Users\Admin\AppData\Local\Temp\uaa.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\uaa.exe"C:\Users\Admin\AppData\Local\Temp\uaa.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\Zsvzvy.exe"C:\Users\Admin\AppData\Roaming\Zsvzvy.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\Zsvzvy.exe"C:\Users\Admin\AppData\Roaming\Zsvzvy.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\Zsvzvy.exe"C:\Users\Admin\AppData\Roaming\Zsvzvy.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"8⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:292 CREDAT:275457 /prefetch:29⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52e1058266ffce954a2c25811eb5bfbb3
SHA13b449a645a3f34b36bd7baa231df4d675c99daa3
SHA256e09742c8d9f8ed59268bb24bcebd33fe14e36c8665e2c44bf57a8942a0e7e040
SHA512c758a661f9ea0df5b43cd46c5d82ee0f4c0c1743f378fcbcf242ecb8345f855c7967e60856fbfef513bd1f11d81bc5f959b843cf58916ac5e838738dc9131ae9
-
Filesize
144KB
MD5120cb6528cd6cd5d87c8091b549141e0
SHA11274d57af7e11f22361df7807ff5c213585b2aee
SHA2564107ca25f7228c0aa5407b528fa6d48d10734c4ae72088a78857f77c8e289910
SHA51258cbbeada86393d285b3a9501c226f98d761bd7ac0de67228af1b2a8586a1b81222f3fe8043f0a7ec5a9431b764634d2e1de98b0dce9bef682287cff76716963