Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
19/index.html
windows7-x64
119/index.html
windows10-2004-x64
13.ESFramew...pk.dll
windows7-x64
93.ESFramew...pk.dll
windows10-2004-x64
9Images/Public/lpk.dll
windows7-x64
9Images/Public/lpk.dll
windows10-2004-x64
9MailToCode...pk.dll
windows7-x64
9MailToCode...pk.dll
windows10-2004-x64
9htdocs/plu...pk.dll
windows7-x64
9htdocs/plu...pk.dll
windows10-2004-x64
9jycms/捷�...pk.dll
windows7-x64
9jycms/捷�...pk.dll
windows10-2004-x64
9lpk.dll
windows7-x64
9lpk.dll
windows10-2004-x64
9torrent/to...pk.dll
windows7-x64
9torrent/to...pk.dll
windows10-2004-x64
9定时任�...pk.dll
windows7-x64
9定时任�...pk.dll
windows10-2004-x64
9Analysis
-
max time kernel
186s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
19/index.html
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
19/index.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
3.ESFramework.Demos.P2P/ESFramework.Demos.Client/bin/Debug/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
3.ESFramework.Demos.P2P/ESFramework.Demos.Client/bin/Debug/lpk.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
Images/Public/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Images/Public/lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
MailToCode/MailTo/MailTo/bin/Release/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
MailToCode/MailTo/MailTo/bin/Release/lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
htdocs/plugins/editor/ueditor/third-party/snapscreen/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
htdocs/plugins/editor/ueditor/third-party/snapscreen/lpk.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
jycms/捷扬文章系统0.4.1/程序文件/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
jycms/捷扬文章系统0.4.1/程序文件/lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
torrent/torrent/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
torrent/torrent/lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
定时任务程序/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
定时任务程序/lpk.dll
Resource
win10v2004-20220812-en
General
-
Target
19/index.html
-
Size
4KB
-
MD5
9b4764883a609aa87ae954d89ae36a5f
-
SHA1
960ed127e50d70c3d36d827006030194c4f480a0
-
SHA256
ce74374ab8ecdc49a65dc95432c0549ad7d9a70d0cc080dab7b4ea5483adf8b4
-
SHA512
31da3abb6f9ce7348668ba19af4b0ef3ac42e40a8e9760c884d305e445307c20ba01e055a1e323b737330319425f9ae61ae44366ba3e2959563a1762d36dea81
-
SSDEEP
48:qu/Q+My9jzIoXBANp4zAB8AutlEahJ4QUiJy8xYyRY5NafPFg5gahbzRT4nJGCTg:vMcIoPLHhJZnxYyA+8hpKIL/ZGi
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb00000000020000000000106600000001000020000000befc4a55dcc1380270d22ced8e5188fe3c58aebf6add5b8fb8ecfa60bb2fde93000000000e80000000020000200000009651d3d9f8b956db73940ac24a3bc295858090b0beb2e09bb10e9e37ecab33402000000045d5fc439bae6da3f6ba18cc00810447b00c1759dd1cd3d8f2897102fd4aead840000000a184914ab62874a66ec330b5e64aec3615194cce92bf936c158bc47af70e6922dccb16a2a5982d8c50119f785ec994e86597f981132064cfe608f7d20163e658 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb00000000020000000000106600000001000020000000be1a5fa7c6abd7b9b4f2b7e917882019a9a3aa5368a1a8ac2716ad492b147ebc000000000e800000000200002000000039935d47f505366e20a6ceb3e8b9be3bec24b76ffede3e16b053fb75c8ed214720000000b149a997474f923cc4ab8d76b68fc30240adaca0034dd394f794be0afa3c5897400000004f3e182931f833014536ca0f4e5ba5f9fc63682f51b625ab04fbf568e48cf9d7a3a208406845b78940e299a776eb1d4a68a295f6be236ea61ca5d0636eeda305 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10181d3f9001d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376229664" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{600E4714-6D83-11ED-BF5F-7EADEF22860F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106cd9479001d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 iexplore.exe 2464 iexplore.exe 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2464 wrote to memory of 1452 2464 iexplore.exe 81 PID 2464 wrote to memory of 1452 2464 iexplore.exe 81 PID 2464 wrote to memory of 1452 2464 iexplore.exe 81
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\19\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1452
-