Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/09/2022, 08:18
220914-j7mfjshfe3 114/09/2022, 08:17
220914-j63q5shfd7 114/09/2022, 08:17
220914-j6s7psdddm 114/09/2022, 08:10
220914-j244eaddcn 114/09/2022, 08:06
220914-jzhgmaddcj 1Analysis
-
max time kernel
173s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2022, 08:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://snorefamiliarsiege.com
Resource
win10v2004-20220812-en
General
-
Target
https://snorefamiliarsiege.com
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E5C26848-3414-11ED-B696-CA2A13AD51D0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207e02be21c8d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b1421600000000020000000000106600000001000020000000dba3ce7a9358c4409a595aee5cf0254144a4e8e6b4f101887a4b28b83838b639000000000e800000000200002000000075722519f80977b873b55eecc42aa2cfb03a34c9a41ce78dbb95c2b8eea04d4e200000001180955dfbe2be7715a29880fd2dfbedf969edf37b06eec5403fd00f984d4d5f400000000f06ec0b9e8f5b462e0d565be5e5a455bb0cdd31b6ea9f6af7841b99f9752bc8db2cb711fd24f1ae756ad015b8f6928d69b95ea647948aab029debf17a4cbc9c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3125648242" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f40bbe21c8d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "369914964" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b14216000000000200000000001066000000010000200000008701393302bb0e431f1ee861291462111aa5a81bb53daecc5915cf0968f5d342000000000e8000000002000020000000a9f014a273c3e9b57b38ca68fcfbdb12e2f7fb85613f75e19b564daa48bbedc4200000009977ed91ac6033b8414136dcdb5cc5d8fea3d3f842097dc4e18ed700ff5f5a2c40000000091724b3ded55d85d27a97804a4882e9e7b6cf1a2728b3028df8c39b97cff6e8d0dea844d5e84084cd52b5a2f710e18668d988dc8a9b5c18ad433a621f67751f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2027ddd021c8d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3125648242" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30984225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30984225" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2728ad8693e804caf0ad2c227b1421600000000020000000000106600000001000020000000be1a0505a5d045b05e4b264c1ab71a219bd6197d16a25337b72f6a62ad72cf50000000000e8000000002000020000000d8003b28b86046d0778938d5d396c60c903cdd59b3fb8ed1b345a6c169da013020000000cb64c6880f761b419ae9eb8cfe58d5e6ed160e5f9b7176a4a34156eb89f0528b4000000081e3e9a03921e4e9768351f0e5c4154687a808ada8646ff4264ed8ada698695c9ed8c5b18b4fa6606cdef0a2cd1e6d437e419e540a42a218f29e52c26866c546 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30984225" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3146584549" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 3108 IEXPLORE.EXE 3108 IEXPLORE.EXE 3108 IEXPLORE.EXE 3108 IEXPLORE.EXE 4860 IEXPLORE.EXE 4860 IEXPLORE.EXE 3108 IEXPLORE.EXE 3108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3108 1560 iexplore.exe 82 PID 1560 wrote to memory of 3108 1560 iexplore.exe 82 PID 1560 wrote to memory of 3108 1560 iexplore.exe 82 PID 1560 wrote to memory of 4860 1560 iexplore.exe 95 PID 1560 wrote to memory of 4860 1560 iexplore.exe 95 PID 1560 wrote to memory of 4860 1560 iexplore.exe 95
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://snorefamiliarsiege.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3108
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4860
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f925e4aed099160efb6ac7113258d73a
SHA10f7a6a1217c219b59c121b943f186f2963c850f9
SHA2565105322f3b3f9b7e368161190d6f60c14a02c922106886f1122cd1afc1d8d1eb
SHA5120daa61c7eb1149872d3b092aa24310b929902bcb7cbc261a2fd201916eda23ad79325d3219eca3243f6c769a26155dfd6aca4d24ff29099b18bc87c10a940b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_298E60D5E528EEA70E86195832615F2E
Filesize472B
MD5e3444b5f3c37baff354188ecf879dea5
SHA1376964b8a46c323d1c6149dbebd916249ef2eb3e
SHA256967ef38086ad7ea43cda4d4fa854e3119edb37a79f19a59b8f95ea339b8f3318
SHA51249f26c0c90df85678c347a95025732442c6e332f0c986a74972ed0ca0966060527d27c3ffe3bce90078b91d46e3175478c1fe3b002aa73842cf8982ce43d69bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD55a11c6099b9e5808dfb08c5c9570c92f
SHA1e5dc219641146d1839557973f348037fa589fd18
SHA25691291a5edc4e10a225d3c23265d236ecc74473d9893be5bd07e202d95b3fb172
SHA512c2435b6619464a14c65ab116ab83a6e0568bdf7abc5e5a5e19f3deaf56c70a46360965da8b60e1256e9c8656aef9751adb9e762731bb8dbab145f1c8224ac8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_9DDCDFAB142B6C8690BBBA31E07BF251
Filesize471B
MD5b7e665b6b70fa840ee6a1417da402132
SHA1658fa05afcf7752e8cb02979c28874efb0f4ddd8
SHA2569905cee109c441b937300b368ceccd186877a0923164bf3e1eb0971a2a224400
SHA5121c16d5a8b9ea68da2f62660453e6017849c2ffbfa9327ac4386bc3aebeb7b145ae44e554b4f0a3f0d30670399f2da2e35aa0f8fcb38f174005c7945519447fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_5334CB9450F370ABCF9F7C7C1E0E3E61
Filesize471B
MD52fd2cf9b63aae357bf186ec168463709
SHA13fc73f2bb5688809e3b93ae4ec2acbeb6dad2fd6
SHA256f2a2e44d62b5daded7b20ebf95f9b098fb60d45f5340eb806d481133ca6cf19f
SHA51263357541e966001971ceabf2f3b55e1ffcc2488619192f569748060e7b61f1770df5cb3b1e658830a5be1c1a668eea3f3f4b4da042a645e0276ee0a876c15068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_6C240E0D86504AE299C65A20D03460A2
Filesize472B
MD5b743089bdff5635e2f7c38d20c1910f6
SHA1f1874493bc88c2d9ba4a95a43e810da1cb452abd
SHA2563a60895d54c86a3e46a3dbcacfc07f3fae4ba79add296b16d0938baacc8d462a
SHA512a82c6c9674b25abd652f4d07511c596b19051e7ad9c13412eac6eb74bab549d54d6f1eda93ad4585ba2ec9d3008a5974c15bea71d6c5f47d0390743cb4bde5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5d9b85699fc388fe9a6e549ab76b54e14
SHA154ab9e2718efb461d2a38e38b15f332ea46d72da
SHA256fcb59ec14c5b4c84669ef9f8ee49adc053f8c094ab30d9e04394cb72145d4d3b
SHA512cb092fd2443a0aeef889368dec1c0969f0b711ca32054f678796bf9404ee9e4fdb690800b9688658b00c4653f45db3ab547533b9a32f7b07da6e72c7ee8b39c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_298E60D5E528EEA70E86195832615F2E
Filesize402B
MD5c23866b3560da1d25db7303d1f2d3286
SHA12c44f4ca8ce849bbd7d19f734e3b5398e723dbd7
SHA256e7220821b52f87531cc8446e7cbf6bb54d62260241447b314b250a71c90872d6
SHA512129603ade7d68795aac8da5288056aeffa2ef8e22819ace7c4017bbaf73263ce71f26b6803ae935e82bda83891e28132e278bb01d709f6e9b2e80d699252a87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5ab1c43856361f16df473ccccd08526af
SHA15bb788d5d64c885231fc15d5350271887043af85
SHA2569c18b79110328cdfffe445ac81adcdf6be2f113c43b57af9fffff299ce894703
SHA5125e3f448e6ea662a83a153bbee0ce50d7cf516309be4c6920a81249fdb681f14564d3d2995705aa1596ec282a1cc9bc2b7012deb2e3749f3c170aa77f7cab14ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_9DDCDFAB142B6C8690BBBA31E07BF251
Filesize414B
MD5b46ed62d60d70f9384a23ed4ef43d2b2
SHA1134ba7d65bc638555f984b025abe02181fd464e7
SHA25601683a8dc73fc73a3085422144c1091488994adf8dc5cb35b135ffb8815d92b3
SHA512277e9a7c0eaf31460642b35a122fd53f2acae9b766d6cea10de57938419bdf9a11125568225bc21d6696d6a1f62a15387d49031b2230c904ce1f900291c46fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_5334CB9450F370ABCF9F7C7C1E0E3E61
Filesize406B
MD58c4ca2eece972e4089712f6978488ede
SHA1662dde561a2ee73c5580cb352a70f1259984bad4
SHA25682d8766ec9067f67e7bc53716c78640b1a92383d433ba892d559a53a8c794c41
SHA512716c3588d47a73290da3d4f0733a30b58d0b634146afb54cecaccef14237aaef9d49ee37401c9afa1073e9cc1464af3efffbe0f137b7030fe537b709a081e578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_6C240E0D86504AE299C65A20D03460A2
Filesize402B
MD5964b1aed94f8bc0f0dce46702b814277
SHA1a0862b3036839b12e6e9b8c854c20766632b9b8f
SHA256fa8ee2bb24486ccf952eeed064657a0c4de720fab26a9d58b179a1ef4fe2460d
SHA512e8c1edae367f2452c7d04185b0097cefac9aed5dececa585707ece0ec867998227418f52156b3aebd25aedb6d480d44c92919a56009ecf08eac1c93a9736cc8a
-
Filesize
5KB
MD5c22068489d8399fc2e463d88c67a8b9a
SHA12069b07e6f67fa675b56b40e8ac0e1f73934dd77
SHA256653930dc62dab13f5dfd9a59f277c1fac50cc89313d33daedaad7726a9606149
SHA5120e28db59ddfe6d305ea141076ddf44d1373cee229a38f0b7905f595bbd9dede8917d47d000a0ff8aeb40d39de3a88a65bf221c9fe2aca863d5b1b49b2ff3a0fc
-
Filesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563