Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 00:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mygove.com.au
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
http://mygove.com.au
Resource
win7-20220812-en
Behavioral task
behavioral3
Sample
http://mygove.com.au
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
http://mygove.com.au
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
http://mygove.com.au
Resource
android-x64-arm64-20220823-en
General
-
Target
http://mygove.com.au
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D781DE1-6A08-11ED-9916-DE5CC620A9B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e35e0ead8a32cc4098bb8e4bc8cff7e200000000020000000000106600000001000020000000712c99fe232a906c090ed2fdb49cb32010101284b3c5cd5cde9e95e5e28abdbb000000000e8000000002000020000000fc7825cdea71f19ba9b2d53aaadac4cf2e66a662a90e07ed78de60789525fe64200000002ed1311fafc4a6112325753071e68df976a0166fd3796dc413c57d8f97ceb3fc400000003ba7476c904e8e87b07d5031f41ab75463cb80f4f19a4bab2751a5a4f545821a0541c44c430b9e8ea49616b8aceae5456f2604dd91f971bede37b486954c6e55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400caa5715fed801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375846996" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1652 1132 iexplore.exe 29 PID 1132 wrote to memory of 1652 1132 iexplore.exe 29 PID 1132 wrote to memory of 1652 1132 iexplore.exe 29 PID 1132 wrote to memory of 1652 1132 iexplore.exe 29 PID 1132 wrote to memory of 1372 1132 iexplore.exe 31 PID 1132 wrote to memory of 1372 1132 iexplore.exe 31 PID 1132 wrote to memory of 1372 1132 iexplore.exe 31 PID 1132 wrote to memory of 1372 1132 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://mygove.com.au1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:209972 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1372
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57d2e8ea72713a6da885ec4561f92c355
SHA132fa9d058d375a1291ed640905a61450716202b4
SHA256bcc3298352ed9f2a262f5406e10c858dd9732c8bbcfcb57bb47808effa88e771
SHA5121cfeb8d88c59f1ce27e282b81aaf2a724f921c468daf1de6bf23ecaa14d8967514c04f8ab950aa5e13a32aa21d9e27b6f6c0ad15bd9d9d1ad639e182b432acce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD5d5f44030ae728558d0102445d170b873
SHA1a9c2e9ce4d20fe2e8a1656f4f457d9a7fe6ee20e
SHA25672f2e03c205a810e0ee66b1ee52f2c32ad4d5e5f8b14c5f26810f281761abc0c
SHA5122789092aeb07658bce3654e02b17813f7bdb90a1b21c62f9486972572b93c50c62910171067519ca14586037c361f6b2deb1b270c7d9bdf5a87eee7160a2ec00
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_B49B51C2F61192D2C0D20E671D9EF51E
Filesize472B
MD5ff44194230f74713e085ee26358fbfd6
SHA1825da24516932e9b0547989124bbdaf216b7d4ae
SHA25688d2a59b12745340a399375d2c4b15d2904dcdd7fc86b15e205658f24ee6707a
SHA5121b53fa74830aa99f93fe6122b6e511b001901ffbcd7eb68e3430f65e529824e060d7e6a79f720dd5a73ea681e6c6a95fb79b92a17dc9ef2917bfe579844437e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD57c4d85f3ba5510ed495a41aa68370444
SHA1bf17df969dbd56c21c4f0b8d1020cb0adf953d91
SHA256412b8c1998374fba1ee38239d49dcd6dc90acd769e23b53d48dc9bcb2e060485
SHA512ac161aa23c283050ae954bc3ccc0f6bc2ddd1136b6a9bf629d8001419c03276e5d24441d6a2dc4b28feb8b50a911465896e456f0de4953dce575d51bbbb2ca97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5ef2b97a016cfa8be0c095b9d7445f2f4
SHA182a74710fc1bf20fe6dbc6fbd9d22c191ccc7132
SHA256c76ecdbc187cc9151aca66747f52b53b8287a6ea4dc211e35f62ed3cbf8454a4
SHA5121c5d5a159b5c38c7db07ca1ee4f4d3d5b1fa017fc64e1e89d53bc0657db53fedea028346c6b784ad6fafdf8a97574f44d91c5cc60cc8bb6c14af5475c278a725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5595e7aafd6523503d2e9cc7386ca6672
SHA1d7c24fe1f63b188be2cbeea99dfa62ec171d69c7
SHA25619d9d494cf184f03556aae938c08f020520e43dd672971b3a312309daf797787
SHA512876e263fbd6ab610f1d35a9d97a433706cd062d75e1e888e1c8681c044b5eff71e297ea48781b8503cbeb2f954bf7beec1ed1ecdc4dbb72aeaf3bf52b4f65169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7dc71d8ab423b6ef9ff8fe348a50cd
SHA159200a1271049caec1a1303b1786493d19cf3afa
SHA2562857aea91cb805f3a33268fb46adea892b338cf771e1503645ebf78263b1b8bf
SHA51292a79883ea85bcbc8ff66616cd0ebdcacfc682c53ef6d3cade36e0b3ae1f78453c3bb2595b228ecc5995823de4892b31a985b20dc67709db95455c61651bb439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5721aebb6c18e0e21d20ed9b891eb4125
SHA1d1ae7966a48b7ea2c1abbca41032485dd7e36f03
SHA256431519f48dc0b78d45c31a7033edf4d5baf3508f4aca03cb430907ebf6141367
SHA512ac16236e57963e09158ca02ce3d8fbb65c4b9cea62c902d5cd744ce18921ddb2ee85da6e8993ac567b8223b8eea12f24554d34ebc6c8f12298713997841f61f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ab241d01859b2c7eaad972477975570e
SHA14927a41929fc42f9456541896a3a5208c1410679
SHA2561449d3396654dd85cd0391e448824b8e54fe48866eceabea199d0bdf182e532f
SHA512b54bd0f085cdb09dd40129975f8d96aef9431b899a235edfecc0ac6ad3d11816f7df5b930fa2b83878c08e9f432dc9a184a6b264d6dd8fd5c58766b61fc3c7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_B49B51C2F61192D2C0D20E671D9EF51E
Filesize402B
MD5cc856a2d6b1131ee4f9c345958f1cd73
SHA1af0072a5221a032616ac7d90b856dfeb340d56c7
SHA2566fd9f1548b93961bbc6139d69a0cc4dee909471be11802a94145b30fac96cf1b
SHA512bc593a3dc81b2e8a84e247bfaf582731422e5f1f48a7daa9e0b80c26af318e3f3c8e6b37938b5f1ceb9801559194ed32c9d5a5b209412f3e6dda95f794e89b59
-
Filesize
608B
MD5e06c39357ac492d099e5066edd0ce784
SHA161669afdf8b44151f397b2acea2cb02bbf60711e
SHA256facd7e0ca3e59e205767c290dfd949b37a987f274faacc0dd970cb2ea5e36f24
SHA512993880e3617fddd7473743d3ad5b01637ed91a02b99c90e6b21fa53db11487d1eb51eda6a799cd28bb8d23a8d01527d396421befd1e6f294af75a8169f8a2111
-
Filesize
329B
MD5bd64db60b10927a308cf80dcabe9a931
SHA1e84c60e02f28ce128a5316352fd43fcf405eb536
SHA25645d3fe3c18ef4fa8a58c162497eaf441549e5f04dd740f503b34744897dbc327
SHA5121374b4a9cb2b821e3b211260b69ee297c151511b63fe3e6e3db71c199aaae405e636ad754b1839fb3b4a2a4a8c59f787cfe90f78bfce6e6c1a97069d1d8d011c