Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/12/2022, 04:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://links.twiliocdn.com/ls/click?upn=3kZIcBV84MSbPEonqfrF6dGb3PJ6jbldw7J3yS57HqemXns2WYta3RoHKq8W8aC7dpcuZO6hV88bATZHBHyDHuPY8Ti9l76WpI7y7y0-2B0tfTn8Gz7zrrkV-2FqxZGEI1pUggRA5KvZyNDlgUTGzsSR5rFfvu49i4FzNZBEDTmqSXLz-2BjS-2Bjf-2BB5X3MM28mG5mqN33bPAsfcGzJkVOBS-2Bi77lmHW-2BqyMM4w6s-2FBmRYFZJwc-2FQSdBAtKYDuQNtode72oF-2BMITl51YnqWhGyvO20o-2FgKHYhn9uVuvlSoek2hZYtD-2B-2F98Mu5Xm2Tz0-2FUIItjKvjtsY_25yE1MSaF2t4Ef21OWLU937Q4MctB958zt48B7-2Fz705AW6RPC1OO-2FOtHRBOPrp0ftlhcq-2BLLFeNMaPZXnmJezAwWAADYQPilh7PUkufv4oX2kmmZMGJZwP0NkmL3tftxzrvioCtYHhFT5OcI-2B5qPyVtyW8fDgQSZO9erPYFlO0AHul9Xpt-2FWygFIiS53ZNxpeJ5UNjr9umOoL6SJIQm9UyWN4XZEiSLudEkLt5B4UgsRiyvqO4REK4RvVC8zu7xv
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
https://links.twiliocdn.com/ls/click?upn=3kZIcBV84MSbPEonqfrF6dGb3PJ6jbldw7J3yS57HqemXns2WYta3RoHKq8W8aC7dpcuZO6hV88bATZHBHyDHuPY8Ti9l76WpI7y7y0-2B0tfTn8Gz7zrrkV-2FqxZGEI1pUggRA5KvZyNDlgUTGzsSR5rFfvu49i4FzNZBEDTmqSXLz-2BjS-2Bjf-2BB5X3MM28mG5mqN33bPAsfcGzJkVOBS-2Bi77lmHW-2BqyMM4w6s-2FBmRYFZJwc-2FQSdBAtKYDuQNtode72oF-2BMITl51YnqWhGyvO20o-2FgKHYhn9uVuvlSoek2hZYtD-2B-2F98Mu5Xm2Tz0-2FUIItjKvjtsY_25yE1MSaF2t4Ef21OWLU937Q4MctB958zt48B7-2Fz705AW6RPC1OO-2FOtHRBOPrp0ftlhcq-2BLLFeNMaPZXnmJezAwWAADYQPilh7PUkufv4oX2kmmZMGJZwP0NkmL3tftxzrvioCtYHhFT5OcI-2B5qPyVtyW8fDgQSZO9erPYFlO0AHul9Xpt-2FWygFIiS53ZNxpeJ5UNjr9umOoL6SJIQm9UyWN4XZEiSLudEkLt5B4UgsRiyvqO4REK4RvVC8zu7xv
Resource
win10v2004-20220812-en
General
-
Target
https://links.twiliocdn.com/ls/click?upn=3kZIcBV84MSbPEonqfrF6dGb3PJ6jbldw7J3yS57HqemXns2WYta3RoHKq8W8aC7dpcuZO6hV88bATZHBHyDHuPY8Ti9l76WpI7y7y0-2B0tfTn8Gz7zrrkV-2FqxZGEI1pUggRA5KvZyNDlgUTGzsSR5rFfvu49i4FzNZBEDTmqSXLz-2BjS-2Bjf-2BB5X3MM28mG5mqN33bPAsfcGzJkVOBS-2Bi77lmHW-2BqyMM4w6s-2FBmRYFZJwc-2FQSdBAtKYDuQNtode72oF-2BMITl51YnqWhGyvO20o-2FgKHYhn9uVuvlSoek2hZYtD-2B-2F98Mu5Xm2Tz0-2FUIItjKvjtsY_25yE1MSaF2t4Ef21OWLU937Q4MctB958zt48B7-2Fz705AW6RPC1OO-2FOtHRBOPrp0ftlhcq-2BLLFeNMaPZXnmJezAwWAADYQPilh7PUkufv4oX2kmmZMGJZwP0NkmL3tftxzrvioCtYHhFT5OcI-2B5qPyVtyW8fDgQSZO9erPYFlO0AHul9Xpt-2FWygFIiS53ZNxpeJ5UNjr9umOoL6SJIQm9UyWN4XZEiSLudEkLt5B4UgsRiyvqO4REK4RvVC8zu7xv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B5970A1-873B-11ED-B531-52E8C5FCC7C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "379057321" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f40d738cd929d44b9d9e9e86afec369b000000000200000000001066000000010000200000002e4cf65cf47a6db122aae354e60799e27388871d30fdcbe4a8c764f00a13ca56000000000e8000000002000020000000867ce59d8e2758b12fa0d98580c0e4d9fb3eb1032dae1245e4250fb5fb1ae35220000000525ef44f138aeba8c7cef4a360f1839d801a077c6f93df4cd008c151576baf20400000006199b33d2df9ac1e257b7859cc6d77bfa4edfee4a2de198390853a0e477ec27d29ed257f091509233a5a140bb534bedac9ad590f60578eeeaeab347b9c67b310 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0680bfa471bd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 748 iexplore.exe 748 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 748 wrote to memory of 2024 748 iexplore.exe 28 PID 748 wrote to memory of 2024 748 iexplore.exe 28 PID 748 wrote to memory of 2024 748 iexplore.exe 28 PID 748 wrote to memory of 2024 748 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://links.twiliocdn.com/ls/click?upn=3kZIcBV84MSbPEonqfrF6dGb3PJ6jbldw7J3yS57HqemXns2WYta3RoHKq8W8aC7dpcuZO6hV88bATZHBHyDHuPY8Ti9l76WpI7y7y0-2B0tfTn8Gz7zrrkV-2FqxZGEI1pUggRA5KvZyNDlgUTGzsSR5rFfvu49i4FzNZBEDTmqSXLz-2BjS-2Bjf-2BB5X3MM28mG5mqN33bPAsfcGzJkVOBS-2Bi77lmHW-2BqyMM4w6s-2FBmRYFZJwc-2FQSdBAtKYDuQNtode72oF-2BMITl51YnqWhGyvO20o-2FgKHYhn9uVuvlSoek2hZYtD-2B-2F98Mu5Xm2Tz0-2FUIItjKvjtsY_25yE1MSaF2t4Ef21OWLU937Q4MctB958zt48B7-2Fz705AW6RPC1OO-2FOtHRBOPrp0ftlhcq-2BLLFeNMaPZXnmJezAwWAADYQPilh7PUkufv4oX2kmmZMGJZwP0NkmL3tftxzrvioCtYHhFT5OcI-2B5qPyVtyW8fDgQSZO9erPYFlO0AHul9Xpt-2FWygFIiS53ZNxpeJ5UNjr9umOoL6SJIQm9UyWN4XZEiSLudEkLt5B4UgsRiyvqO4REK4RvVC8zu7xv1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93f478d3107f47196f1792157478b4b
SHA1b2aad7868f7b0c350e599a3ce66699abcdb31fb7
SHA25614275f1e6593cbaf27ac27799621e83e2081b0212757feedc2b7de23e402c62e
SHA5123643a43be6e8a915c022c9d2f0ca0f75c0a1dec413a4e3a974db4673b10d382da73cea7ce67f4c3845e6c904eecba1b5eef05ed698e7a6c810986717e809fbe4
-
Filesize
5KB
MD522a729d780145eca967c46296dd4a1ac
SHA196ecc88ebbb86974de6f8fc8b2a4659a8fc5cc43
SHA2567ddc7ee89aba6f94f4e79d690ad4a29b7e2295e4411cdc540f2d77dc82d1d711
SHA5120e875352dbfc76d2a905779f5193a3029bfe6b9d42d1fb689d0d3f0d0de5c4cf920cbbf547b46ef59552b164fd53220864260b191a5524ece0d6fb5ca4def1ca
-
Filesize
600B
MD5f1dea5853c6a841aa8f708114899751f
SHA167a98f123466504b6d989453760a9f6254c00f80
SHA256b19eb2d41e5e60a6d59cab75a888c1ad049427921c8dc6f80e0dec4e03dd9730
SHA512b17389120e6b8bfd4e45cf36c2eaa706be5f2e633dd3420283da0aef0c4fa084c5056e42289d1779a43e1a0891a119c37cf0c62f489080f4c7f3eed746a6d6b7