Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 11:35

General

  • Target

    easypanel-iis7-1.2.2-x64.1.exe

  • Size

    326KB

  • MD5

    17ce44a8181ac75fe9405baac9082609

  • SHA1

    fb4776761783c63779d5e3f32f32f5fed845c692

  • SHA256

    6d30614f604753572d48cc9e9f50726c1d9f715632e8437247d2b4a409cedad7

  • SHA512

    1cdef1844fb244a8b9f4d18ba7d58e2844343c817812fa6ad355fa67a908f4001e0140db773aa753b9ae4333376ca0c22109d09f75444a1ca46ba77439d00b33

  • SSDEEP

    6144:9/QF8Dz073tGyuWEqSCumIUCLLwlAtiasLnnrMsoQ:1QFaz073tGH2umIUCLLw6ti3LniQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easypanel-iis7-1.2.2-x64.1.exe
    "C:\Users\Admin\AppData\Local\Temp\easypanel-iis7-1.2.2-x64.1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\is-H15HT.tmp\easypanel-iis7-1.2.2-x64.1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-H15HT.tmp\easypanel-iis7-1.2.2-x64.1.tmp" /SL5="$400BE,89524,54272,C:\Users\Admin\AppData\Local\Temp\easypanel-iis7-1.2.2-x64.1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.kanglesoft.com/forum-2-1.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27a9c8e2611de0ed5cc0220d2c347477

    SHA1

    cdb607d073f16abbbd3c1c0af520a040dc95bf8d

    SHA256

    9fd74a9f94df4d91d20d3aa46295431c01edd9a3dfcce4ab271da30384c94b79

    SHA512

    98fbab493071af66e8503e11f5e5ae29cf98db73a6300297ede4808a874aa6e96ce98e7e6a65f3ce89e8c6741653763a99cc86953a7ac7ed34f4c195b8ac3733

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21508986dfe3722ab49281ce8f4ef30b

    SHA1

    0dae6e4867a66ca43adcf783d833e951ee13dee6

    SHA256

    10a1a6a47f1328aa2f3808236657487e0053ed48cc004dda09d2ff7eea81114a

    SHA512

    4c721fb707aad1039b237b89641cf731e9281f7a298d9f243f8155cc21e069e021b41371a7ecd8070f499a001cc1c49d62e292e4ce264af7cffcefbabade3155

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f41e243aaf6699debeaf9d693ac2760f

    SHA1

    67db2dc1bcbb31019ff2da8eba0c2a3143565a66

    SHA256

    312ab0737b33c823b881b8c074bf97c3d4690f039090ec66881ffd4c2ce8adfc

    SHA512

    d219057b14e50c6a78325833a42b66e3bb34738176abf6b90377716df1f6041b816259a771033795c7b4ac1ae1eee1b6fa6d6124e7b71c4ba32c004f278e4968

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f079b0fcc3663176e13aa5bc0fa01653

    SHA1

    0c7c1d4598f3b7cf1695962ea83c006aacd368d3

    SHA256

    83c1ac4e1636f759a72c8ef3df94507e499382478809f711a12da1123c09ea5b

    SHA512

    a0e7add3f05412232f125f2cfc2ecdc8af03a5bda5aad4336a6ec6001760cb8561ab5111912a87406ca22e15a808efdc5166b4883dcf7fa84346d529d17235f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f941d7ecdaf90235753a429f51230c1b

    SHA1

    55e098d4afc93db93a0cf7272361b6c49336c62e

    SHA256

    2398e853033c02d130ef1e50d6595abb4e06efc198379978b804dca000a5b95d

    SHA512

    007f51eefedff7789eca3e968f163158103fac4babc10258c177300747e064f0d50ea437ab09cbd63ab0f36d989722208159d8ae90e03d1f0659c60f5c0c3216

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb74909ba962d89421274e675942d1a2

    SHA1

    d03a626d462839cd09287502af6b3a0a1dce4d82

    SHA256

    e75391634cf106d949f6d8f706229f6adc892de5d61d271cdeeda299c49b3e2c

    SHA512

    486af94586214531778c19f9a9cc8abf9e6643539817e6d6c8826843398072e3f2364991be52b021650a6296a678c3810766b2be664bc8ebf23f42d8c090fe1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df30fea496914d450b7892c2fd80c90b

    SHA1

    028438429cb7f4b65878c7d3d39237cc7db67be1

    SHA256

    0a240031a87930da7bfe26772bb8e838960924c0a7ba9ae07b17cf5789904317

    SHA512

    2896a9782e5eddcfc891e0df18aed7647b18d364206adfd6ad1e4ead356502e784ef2117a0cef757f4429d37e7e8205a7d462ed2608d89ad22507c34724b0ead

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bec1cbd6e78ec84cb2cb895af83d5bf0

    SHA1

    f35699f0a8724d29b52311bccdb2c7b4ba2afc3a

    SHA256

    8a571ed2dfdba3d62cd8a13a9b0f1f32f35f6b153445c840f1e79d8c94ab42e7

    SHA512

    31b415623268f2109d4628c0a2279bdf88d2aa26caa0790a3475dcad0c735563be527567964c937efc3f760a543da063dae8d1d645801a8cce0579c8988f30d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae1d6e6ca78f473d8516f873a6d43043

    SHA1

    12e5c662516dd810ef6a6f1ef82e9b4fa3e7cd49

    SHA256

    372ad385079caefef9b643975d93d598d06b4c9223180d4f61851f276dc5092e

    SHA512

    87847e7bcaf57b1f90d628ca3f93ca6e952f45c57ff1517fcd3b12a765d4d052d86c61f3738aa9349c1178c0dacefa8c02b193fb85029a60ca29c55f59a88adc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc393b742d71728122499bfa6148be11

    SHA1

    894b62d9cb9ae6fbf73b67116853552e84dab985

    SHA256

    6e37d08f61cb22230676a2e93fb4a2a2ab81862290ccdf3eb59daa9897f34657

    SHA512

    a6dad54eeddffb290f606a8ff76065df9f44990d11504abfbaea8bede184dd0fe0a9af59b22e03b4b4363ea4187b58b1a886a19f9013a1ae2567e62294ed97de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9209546289d73794b4609d86d325e24

    SHA1

    35c9fd9ec4af447c6d5e665b8db2a433536e08be

    SHA256

    9f6e36933dcd27c610240767a9496dca37a9a954cce1504a232ba79372116979

    SHA512

    569138f975a3dfb89dada6dda4577e3e5b57e0bf93ceaf8652ee6a18caadf7328820cc071ab2293f9f8d74e10c334b9968994b94ecb28e4fbfef92291670151c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    090781d4c4738a7a6868bde80829f668

    SHA1

    cc1d9e7b9f72a4af93304940e7ac33dda992995e

    SHA256

    62570f6fa7b925dc75a2c3feed18a4d97fefcce517003b4a80f6ac8c01758800

    SHA512

    cb6c77660b604639e51308aa5e64bb0295dbafa0d310b9ce4de568307233afa62e3283addd46b3769fc1bbab0e5adf0aa8db17acaacce9e39a2c112b9cbee47f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7e9cec56139b747055422ec4d3194d0

    SHA1

    105a8cb7ed065ab235461b9a7f2ce1e35d0b370f

    SHA256

    89ebde9a5c653ff2e35ac45ca43f11b41266605fd1463726941e59c75292304b

    SHA512

    9fe078d276297e327274ba56ee93b970a5ab577e83abeef0b35cba66d3c520bbc1c5db0c9a7cfcd9945832da2dbbbb7d8ca0208b000fcf01332789cf10b8a9a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c838153140027b5b9a1b99eacb1f8e3d

    SHA1

    d6c337e7f9ab55c45809098c325d606c3263f744

    SHA256

    18de458d8d8366cf4b3b88e09a94b833b63e4bb2730e635cb9d0f3169c93a206

    SHA512

    aaa52ff636d736e473d029ac2b6941963327bd4c8c1fc16d7aaa90c70275af783928ea43fe9c6fc99738a11f16a5b8bd00b2f0ad6773339cb0e7e2a19734f0e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    016451f715bbb2906e0cb69ad9c2e6af

    SHA1

    e416c967d553acf46d996dd1eb1785a45c9879f4

    SHA256

    199bc5353f4be300601fb7501138682841deb8682b4db7fcf1cab2ad3ed15d54

    SHA512

    4838d4969f3cc53f6e39d4fab9672fffeff98c2a9809dea07d11515f8ad407fdd38260ec74841d30fd94edc9b1eb8803c49b14823c2ae98a79d3ec4305324c91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58c8fb2da75884bd374075225d8e87d2

    SHA1

    a2f010ebeaeb6cb7740890e9f8cf42c68434d674

    SHA256

    0b41774f84027e03603a3775e6b2f839bbb762ca2cb843dd27449762ec749896

    SHA512

    0131f6bafcf0b636e04c1169ec431146308c872831f09d5a3fc83f805951d47a48b2ddc7f94bebfa238cc1911307899c38b6448a750359d62f5510c6f1910997

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91717019bc168eca1a90ac7448a8d0fd

    SHA1

    f190437ca3da74fd07a253253eb4ca6cec1e4cba

    SHA256

    c121926337bed26ccfe5027b5ccbf3ba8d3734d122ab4f67075cc9fefc719d16

    SHA512

    0fb975ea8498f71f80bd4493e31d341a51e0b5720f415334547983232ba688627124bd6a7f8de646ad1c54f7843218c3d5dac2cbe5e5dcc8b00117944e373b2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b210aac3f95846e6e11dbcfbfc61d8bf

    SHA1

    b393424a5f9abce02622b46361738540a2b604b5

    SHA256

    5d65c025238a64f88e6afef9d229cc836d516d86a077594e562bd8e2b0b6cdd3

    SHA512

    cd716becbf7fa1040d0640e36e403be0691fd21ddf8c07a217a155d6cda41dd37bb750821e4da839baaea59dd2055bf67aae2daf4dfa6b3eb6bf64297d6d183b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2be52b4bf297de4c0e8e3cfc7b1368a9

    SHA1

    225b89fe84b70b0f24e510860adbaa32d544bacf

    SHA256

    19fda8e82791de14409543ee2a42a130beede7958810e624c9cb3b97a3aacec2

    SHA512

    b4209001ee3122ce387a60c012f60e68a53391beb188b0a6f9cee8af35ce897399ecc9fc520c3caba440155481b8d12023f4545eb2312da7869834c2a9a98b4e

  • C:\Users\Admin\AppData\Local\Temp\Cab81FD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar825F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\is-H15HT.tmp\easypanel-iis7-1.2.2-x64.1.tmp

    Filesize

    689KB

    MD5

    15430669556c2062ceadd5b125e8cea7

    SHA1

    276c5f36876a783a01ef10b9df39fa0efe3e296a

    SHA256

    64db719c67988b106bf2d1a5b842445e8ff9b6436be28bcaa0b8876d330f8168

    SHA512

    2c2a87d34922d747827a2c77813ebfe9923bdd80cd4be909f8da3c8a4dc3a079c049db74c8bc36edd38663ee4635cdd0fda4f9cd2adc3b40d426066611206f39

  • \Users\Admin\AppData\Local\Temp\is-NAFJF.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/2164-452-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2164-8-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2164-21-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2196-20-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2196-3-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2196-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2196-454-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB