Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
20/12/2022, 20:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.yammer.com/jddealers
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
https://www.yammer.com/jddealers
Resource
win10v2004-20221111-en
General
-
Target
https://www.yammer.com/jddealers
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378336225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ce55fcb814d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D646D81-80AC-11ED-9F99-D2F8C2B78FDE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb8000000000200000000001066000000010000200000000c53d272b4a7157846b6cf4e90f9ddfa4bec99af41683589dcef8605bc71ff39000000000e800000000200002000000011dcc7879080e230f4fd10aee2d5a0cc54570901d58f14c02247b2642c70854c2000000034c439c01d04ff1705ae5dc90803c0a675d83b25b1e6bb99ab81ab275a3e05f04000000006cb7293c5cf9331c0c5ed22ee2d37253d4c84a2a646d7bfc77edc0d626d0677a883792895b67c5789930ab9cb3b995c3d86c45f39e1157903ddb17f4090b96f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1220 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1220 iexplore.exe 1220 iexplore.exe 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1156 1220 iexplore.exe 29 PID 1220 wrote to memory of 1156 1220 iexplore.exe 29 PID 1220 wrote to memory of 1156 1220 iexplore.exe 29 PID 1220 wrote to memory of 1156 1220 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.yammer.com/jddealers1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525418dcbc750f07c7c3242e9ad31e0a6
SHA1c217530d81ba0b4924c5d0c211c46935b122afec
SHA2560d93a5c91a8cdad2500f4d1879bb1f281a0b7bd01980220d65d48c25280318e3
SHA512f66f13c0d8875553f8c2869b4b1363552de543d49c170c62f5b2daf871bd232a52769dfbd9e0127fdb9cb74122b70833ae903edd73ae34599942230f04e3914b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6e5aab785ddf265030ce74e29e5818
SHA1d528757fc2b1c4fa9d8a61036e582905b54824a4
SHA256f7b9b7ac9a34fe4bfe3cf4ae4a4d06b00914499428831c562cd6e6bc9b2d7a56
SHA5123a3d70de901295fd1299524a9f22197a277decc5cad6a7ce3e7c270102581ed641ec42d5fbf1ce5602e7e1b8fc81eb6c1e39350c6b3f9e4ec523f1a6b0606794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb81721b1624829a0144d26b413fba47
SHA16f7d17c9ddf7a41fa1cba818f6494f019c53fbb7
SHA256d93c36efa5a062bf0fbaa2fd62f67ee673c10e291857f8aa3d90fe1c71eb1269
SHA5125457cd2a93b527556765a21ac01ff95e8126bdd53c8103c625e7166c37c0790a5be28415eac79c82cd0aeccdfa1cc36c21c2ac8c79eb974bb19a9a9db403ec0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653f90b75b6bd0b3fc05282bda3d260a
SHA1c2912d2597fe9b288ca3acab81d0d21f5f944c32
SHA2565f4d92fd211d2219f158008d8c957babe1d8146fe6b51b27076aaa9cfaf9ef04
SHA512d695f3a4888830852d8e4a434fc558bbc5c293449a5e855af32e28d36bf5f49134e49c0e57e69ad6c93660319bdee9ebb8edc8513cb41faa0bd64d78613de68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead526fe51bf43f43867f2a0662ac13f
SHA1f5713a04845dd93689554c0856c88f579de63ce5
SHA2569a4e956b6cbf64c8a02e0ee3c4df79bf34cde071e13c3f7d17a75fb5c01fa63e
SHA512e9ac05095484a5180746eed44531b35b2c6294d1038aa7d1f71ffe195b2e37aec3fc687dc84f43bf8957566ae83fb122513a33f643eaa6bc73dc2797a3c41da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b4860df964a93051ad0d19bc89246e
SHA1f500186757bc09ba30a9d363afc9256cba9771c8
SHA2563fe939d2046b84e38f509d1db783b9cb8a03bf79392344a197764c272478b505
SHA512872c2141e794a5d63fb0e2c69df837b859588af71ed840668362b5b727d71718915811678aa310cf7eeeb19ce4af3e607110cd94ae18fca647a601ebc794f2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c7f99e3ddd063a1258bb463067cd33
SHA10dc5b639677e54a594feed5fc989d87c923d223e
SHA256bd32ce32d5949ff222dca50627b84e77837fe3e5c6ca9429d8919a1b3a0fe9fe
SHA512885b5c7e45f2814a5fccedd99c20416a78fa12e851d7de7db074f1b02e4b3644c4c18d2fbea444641795089900f6d96b98e80687171a40c06153d75c215f9631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d6e10892f877257055a7702396f270
SHA174d8da7160615dbde4f2e8165d3a98f4c056bd56
SHA2568e50f6c4e22cb6fc9ace1c0ccac4e9ab12dae8ea2d5f5ba9018f71cdfb970907
SHA512f13ce7ef12e927537835d94aeabfe5b1075d8928bcd41aa0837a61e0ca4526bfe2e080341cb32ea23c97d2210eda0e2c03e7a480488e986d54192d1ee87d1ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551c22bf11ffa903c6897a7fe01a526db
SHA15bdc2f0db6652cca3897ff9287cce76bdc505a55
SHA256e1db3d19592a1cc9b872133f74c550602546c38258fcf0d2a42074f715cdf57f
SHA51287f427c0797cc3777352ef163e40fabf6952fbe957941e9c4d605e2516d74115e0ef46844e7f0175fbf31c4c23a473f4c02a29ab3cf984d1b4266984e987dc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ce51221b753ee06883a310d2da063e
SHA1b7110811581bd324afba760442d48505d0618529
SHA2561c88e8f4399143ebf8a6692eb2498ee239f35c00eb0a58955c013865e03dc45c
SHA512c4481513b0802b89fc0d535017eef6e3da0d9743b4e272e06a265f092c715d636b19a4570194bfddf27b64d42f6d1644445f79facad52d67c665bff37c115d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227d690a1626cea57c7d40fc873daf66
SHA1976becc39d6f98bfc16197e1b5986b187a52f30a
SHA2560f33fadb8b70ac4aa479288a7a270dfef28fb20a5625e339370571638add4358
SHA512ecf843cf64ad3d8df6f7deeab5a6e9a1a2a30b7e3a67c8433ca46d5955a3c74ae218ad0979df30bfd2758e4514f1042a46d904d59224a2c773478879ab00a5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d55524ff9a00620ab8fb2852fe98d5ad
SHA1f486c567549f7bdaffd7ce918215709f3b627c48
SHA256a37af323166d39bb1e90b6b760ab6f5f0baed382a68dd904ecf2d95b0b7bba51
SHA512c3b44cfc0b624771ae67e5df913d7a792f27cf478adb5bc58b5947e1095ee9ed7a3e5db95dc83899496a7fedf1424f5db5fb57d3bc629472354281ac643ec706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53696c0a4201a98f8186e1a36f3170c21
SHA1bd9ae2aec559fa553b8152cfe4fa83560d746814
SHA256143981ea71d1c82e3d9fe06ab66934ee30f2fd7711858dcf1046b8aefd2a8e91
SHA5121ab52e0398a4578e648f75044a661bd87d30a70581d068097ee8d36f207a04ad75d397148fc39e92a76c152335d441626a857b5cc64565402849c592d04a1459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e457e6661215b5e0cdb80d0039cc9d
SHA1f557331d490fdd952a2614227bcc3761aa6ee638
SHA256c45748398ee4359135110ad834315699a0e22749aa1708b9f9c25c40a4377de7
SHA512a7ad045a003b8f9558a88af651deb16caedbd1f8af725b638012abd5a02a5ceb0790631736c06af03fc569d103c44ac806c878070771cd69bcfe0f9390926200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57516062b1417d0428076275978b72e27
SHA1e923fce994ec4dc223b06eae955b496c5cb4b124
SHA256ccd22ea4b8379fbb06e71ae9336ba9a780cdb8229a3ed5a31ecd3813ce372173
SHA512f026d5cba694c1d68213a157c734f44baf8261255cd83e96cb3527bd71026cbf4d7b0804199dd96874ce5a1cde0e709f97ea3f0dd5789be43214e50d351b0ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dde809b88f1e2a7b14e98ee50491560
SHA141d34cd9782af8a48df80badce7c469780585ce4
SHA256b25af874e721eb9c790fe6fdf7492521231ebe46a0428a076fb7418489be1b5c
SHA512024d353d102ca6733d5242dd221f72165bdaa9ebb3a2c9bb6c26d4b6fd8362603cdf84eceb16a0263011de36f5aa80d717715db6b0e92c16b749dd2e0983e606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57c6da0146ec3eed819d5b9b7385e1e
SHA1747a073dfdfb26705ff919ed4b5d53140f4cbd4a
SHA256ab9d9142d6e322127140e0ab281fdf1a64ad014a955c516bebd6e1cac4381dd1
SHA5120579c9eb29627118df24e3b4f3ffcb45254d686f38a9ed403fc6c06b1658a000dea365f0a0d84e478e9ea8973fb13b84e38899ce54b141fa0ed5991163d90e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf8403297c854448f5e270d4be6b33f
SHA14a521b81d47c44fd7137fcb9b522344a85fcfc40
SHA256ff5351c6d64f663f3bba2b9804ef58ee79c73f4c3eb25df93634b987fc6f99fa
SHA512f13bf992919dcc83645ff49e28c518c5387684ca58e7acab3a866bfea9eac6d92f00aaf103d221bd656f3ec3a2c9a4285c76e42e5605013c73c26c276c4f0df2
-
Filesize
5KB
MD58da700f20daa37d50ae481b46524ccb7
SHA16e9d5657946a36264a27da12dacad1955dffe960
SHA256de411977971351427d90b0108e04281ce3db238abd4d6cba175dd9082b7e1005
SHA512b0f9dbd298d297d1d3b99ff25a8ed3d4efa128abd50f81cabf7861ecd20c1768ef1d57db92d088a4ff4f451523e3d82470b6d3d70fdab565d4a0581c65a84e47
-
Filesize
601B
MD5c9ff329b35ddfde5986889177dde5fd4
SHA1251d487a00f4063e2a10d462dd2e68807661261f
SHA256a6386608f3ed3965150451a4edcbebbd72f02e5c81773fd4f49243e47f46dd39
SHA512264a6738137a73479ace27bcd3b21cdc088205db4ef8f76e2379b281dd0a3a01918066a8581d156ef2d3bc54650b5d1085e860b00960131948a577a6a47624b6