Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
8d1dc96d8cfd8cff1c77455385109700N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d1dc96d8cfd8cff1c77455385109700N.exe
Resource
win10v2004-20240802-en
General
-
Target
8d1dc96d8cfd8cff1c77455385109700N.exe
-
Size
110KB
-
MD5
8d1dc96d8cfd8cff1c77455385109700
-
SHA1
143278d86536b009931e85949bec941e6b0ff227
-
SHA256
8d80ea96d391c3e8b4a805c2c1f763aae182f6f3c68b72c1e1bd485265b4a136
-
SHA512
0aed2ec4f8c7d6e2966d9aaa432ad1f3ce2b90bd4405171261253b519dc9c19f164fb2f1e200987bcdbb71e33e87d65c7821108e530d187603f3419ab074cf9a
-
SSDEEP
3072:kMKau0t1+JXl6MGnDu60HOZqQwVyt0d+5Ov1c:kMyk6XIMGnDu/QEytwaOvW
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1488 8d1dc96d8cfd8cff1c77455385109700N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winjce32.rom,YzsGCGQIr" 8d1dc96d8cfd8cff1c77455385109700N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winjce32.rom 8d1dc96d8cfd8cff1c77455385109700N.exe File opened for modification C:\Windows\SysWOW64\winjce32.rom 8d1dc96d8cfd8cff1c77455385109700N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1668 1488 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d1dc96d8cfd8cff1c77455385109700N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430436996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3045051-6002-11EF-B961-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2488 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 31 PID 1488 wrote to memory of 2488 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 31 PID 1488 wrote to memory of 2488 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 31 PID 1488 wrote to memory of 2488 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 31 PID 2488 wrote to memory of 2128 2488 cmd.exe 33 PID 2488 wrote to memory of 2128 2488 cmd.exe 33 PID 2488 wrote to memory of 2128 2488 cmd.exe 33 PID 2488 wrote to memory of 2128 2488 cmd.exe 33 PID 2128 wrote to memory of 2804 2128 iexplore.exe 34 PID 2128 wrote to memory of 2804 2128 iexplore.exe 34 PID 2128 wrote to memory of 2804 2128 iexplore.exe 34 PID 2128 wrote to memory of 2804 2128 iexplore.exe 34 PID 1488 wrote to memory of 2128 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 33 PID 1488 wrote to memory of 2128 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 33 PID 1488 wrote to memory of 1192 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 21 PID 1488 wrote to memory of 1192 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 21 PID 1488 wrote to memory of 2896 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 35 PID 1488 wrote to memory of 2896 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 35 PID 1488 wrote to memory of 2896 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 35 PID 1488 wrote to memory of 2896 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 35 PID 1488 wrote to memory of 1668 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 37 PID 1488 wrote to memory of 1668 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 37 PID 1488 wrote to memory of 1668 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 37 PID 1488 wrote to memory of 1668 1488 8d1dc96d8cfd8cff1c77455385109700N.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\8d1dc96d8cfd8cff1c77455385109700N.exe"C:\Users\Admin\AppData\Local\Temp\8d1dc96d8cfd8cff1c77455385109700N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ALUD4DC.bat"3⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 1243⤵
- Program crash
PID:1668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70a457f17ce8ff348557d40bf4875be
SHA15d9be01811ef096adf077e005a0b091d5c5c3e49
SHA2563541ecc76f5f1f8489731da956d7606d31c0f25fa9d0e8a98602aa101e246395
SHA5123a74f11d20fa8d131b8e8d74868ab425a1e78898b89db1215ec82d47f527f4c7dbbef0379312ab392aef68ce79fb4484e7c6d1e55b3d47e77b42c19616e041f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593badbb9fc38a1304e584c5cb8755f68
SHA19c1ebd390a99d22f4b34338a1efe7fea8bc99fc5
SHA2567cbdca6e509eb1d2c8b90816deda1147e1fd4028392eccf951a8df6104b411dd
SHA5121421c437f40f88c3e9b65dcbe5d9f89c442bb0ef9445c50f55441942b2c6204eddff9433bbbf53944a62021388085a55cc8c8c7e2ee2d7a1a0ffb98de54e7bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c0264fc9d222f66a2f2f9028b44d7e
SHA1b47f901b43da5b3b01de082e5e64f7100ffbef83
SHA2566aa2d3e348336e3bd05f44f1d7bd4e04619154a55b42bfa0d46772ca2f93f9d7
SHA512d0eed3cd39db29612f6190a42c22cd7e0ac04bb4dfdc6a93c7bdbff717c409f5e5f2b2a79431a803199e2adca0cb77ad71db4343388c72f8baec3f2ce4ad0407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b8ffaf2b6c499aba7adda25b148256
SHA1b0f3a95df75cc410efd32501052a029b3f4fa92f
SHA256c7fb291261e9fd4d8c3f6585eff60872c19ddea05cdf2d0814f22bb49ba02f1a
SHA5122e4643bcf46fcf03f1d190806c2767c61c0fece020b14836068beb4df160bbe6a6f724180018a9d7dc1113913fd5cb91abe5bc69576ce1da0db7c861a85ae49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d3ac3772a72c44402b866ece6fea05
SHA1b23d318726e669375b13ee00b12deafd4c5cdf55
SHA2562970d15eb9393ea854934077f517dca42b09e0c13c22be9da64ec5933c57a4bf
SHA51234f92a7bcb4039bef48179c31e1aaf61f62255b13b6c4189c630543dda6a4b308c7694e42482cd8856e0f82cc58f02f890fc4e72991df47c08e6322ffca0d602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ebdf465d8e40e6fb862907d1977ab7b
SHA12a3ebf968ea7729791f195668a560ce0e60df551
SHA256b2765ef64e9b9319473977e5d0a12b426093a9f8ac4d8d109e31fa5d6549de62
SHA5123da3fd6e8c333ba13faa163d30ab958f81f367cac799e061de6a133e63cd7939663029247f02f87ee074ffcf582bbaa950d215f2551a47c95b19b8d7e762ecc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9836f3fd7c3ec626c2c05b43810fb3
SHA143a363131429a4da9ca140491b8fc574733530cd
SHA2565d4a7be278e9cb517a75b162ad8f7a3e4673761a686bcc4b7c90e494963a62c6
SHA512648f7b741c89270616df981f2220aa744ada88132a784816071959a213afe960f5f5e60f131d4dc34849bf8481a33f10bd07240acef86d21f3aa9ef9a77d9358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e76a851de678e03badc998fa69800e8
SHA1afb1a968f4baa95235a0b7dc2d5b1b2cc9f234b9
SHA256718ce6d5beea14698dc23d30b94973bb230064e94c3665100177fd58721c00a1
SHA5128b266d70536d54169b00aa42b6f9fe603114a31afac883f1367434e9b065a876b6c4d5a3424782ee90c2f7aa8aa17cc0dff3d1abc1f2cbe665a27b47aa47d4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0683a0e0dc84b8512446e73f8cf5f9
SHA13a311a266fd1e40153100d5a9b0e98b05059ecad
SHA256461241853de789a839d54ac07e73c9d55df61a818f60417c0b629b26d16e4d76
SHA512bfc213c65af791d721e76a29bcd55ad616e8627725a340948885f1ff65d60c8fdc750f5eb3cafb8f0c568e2bfa9fe67fa2672c364298664accc306ee3cb318d6
-
Filesize
188B
MD5330e4de3b2c87408ef0683b1cad8ab83
SHA1c699ce2c2799a1ac425c697e681991f4d49d165e
SHA256e01e53a77c55031c3d0c1c1a90907d5ef5a512118eb6d454ba09d4a06c3f3f9c
SHA5120a8acc473ca6d0e1c2f6ad24bbe9ff8d4a334ba2e8a71782388ec26faa27fde1296c21557642b5fbf9b902a1ec31f0b7dc524dcd48953196f298d165b56e2b72
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
62KB
MD5909506f7b15b1153eccfccd063a5a26a
SHA1fd4d2bd55c28b83be2a2da05c3e5d83d39aea614
SHA25621b6351f2f1407315b223fad789088fd79cfc4aa6425ebbc9a0f010e4596596a
SHA512e830d0330d9d585f78f16f152b5a9e0d25c38d319950dd3ca1dd3e4e5fe083f0d5736802d117b75910b3967388d92010a329e1d79f01b73c8a7fb4346b5aecd9