Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/12/2022, 01:14
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://697417f2hd637a678d29c07.repstara.ru/[email protected]
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
https://697417f2hd637a678d29c07.repstara.ru/[email protected]
Resource
win10v2004-20221111-en
General
-
Target
https://697417f2hd637a678d29c07.repstara.ru/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9626AD1-8003-11ED-B7DD-7E0305A911F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000037ed4c6743213041b36ed7ed13ad299100000000020000000000106600000001000020000000bcb8fd5f4e2890c52f705db50844eab59806a898818971a5b4d850ca00aa3e94000000000e8000000002000020000000dca4a59e381e2a2f55f5331c0d77cbc630d8f17910b75e620160b17115f1594120000000eb3795899a704e49c1d6bc68d1477889699a1fbf531d4fabb72b9ff6b88fbbf940000000d0ac7b882b2cdfcd85c26031ff6e7683e50879948843809b41eeca2793b627d197aecbfa2e30e37ef1434230be27325a433c348ac49941df549e74767617e2b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800c6e831014d901 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 396 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1140 iexplore.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe 2028 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 472 IEXPLORE.EXE 472 IEXPLORE.EXE 472 IEXPLORE.EXE 472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 472 1140 iexplore.exe 27 PID 1140 wrote to memory of 472 1140 iexplore.exe 27 PID 1140 wrote to memory of 472 1140 iexplore.exe 27 PID 1140 wrote to memory of 472 1140 iexplore.exe 27 PID 2028 wrote to memory of 2008 2028 chrome.exe 30 PID 2028 wrote to memory of 2008 2028 chrome.exe 30 PID 2028 wrote to memory of 2008 2028 chrome.exe 30 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 1992 2028 chrome.exe 31 PID 2028 wrote to memory of 396 2028 chrome.exe 32 PID 2028 wrote to memory of 396 2028 chrome.exe 32 PID 2028 wrote to memory of 396 2028 chrome.exe 32 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33 PID 2028 wrote to memory of 1980 2028 chrome.exe 33
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://697417f2hd637a678d29c07.repstara.ru/[email protected]1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefaec4f50,0x7fefaec4f60,0x7fefaec4f702⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1108 /prefetch:22⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1864 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2032 /prefetch:12⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3240 /prefetch:22⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3408 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3412 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3644 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1100,5265234061942990796,2914206190041473278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3468 /prefetch:82⤵PID:2392
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5c0711121d384b5aa57639b1f3133f8f4
SHA15c0ef164c56297a923fdc197d5b5c9a72c2f305d
SHA2561bb6682ba486b4e9a5caad51b2928fe7a01774c0f73f6b1ac34fe82742fe7816
SHA51202cb01d31661829c8a8d8872b2ad2ef661da2f867914fe15e5cef122dc0e726faa4c4703149d55d7292b5d324ebde754ee31fa23759f72f27bbaa0179c8a514d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD507d3d6adafc37e432fd2d4a55c2b5c8f
SHA192596359667278cd861f1df26ef139908698f415
SHA256ce62ca45a13d87346ff26d9669bbdb1c8b203ad2e4e318a303735b4ca70a33b1
SHA512cc381702d50f6924e8e7dcc87deb4e09418677ddcea5bd9d0ff521daaa700cc0e45931c5bdb6634dbe370772135f7bb9f2cee2d1e42a2a62672d06af617c25d5