Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
1Static
static
1Payload/Ze...roller
macos-10.15-amd64
1Payload/Ze...bImage
macos-10.15-amd64
1Payload/Ze.../Zebra
macos-10.15-amd64
1Payload/Ze...s.html
windows7-x64
1Payload/Ze...s.html
windows10-2004-x64
1Payload/Ze...min.js
windows7-x64
1Payload/Ze...min.js
windows10-2004-x64
1Payload/Ze...n.html
windows7-x64
1Payload/Ze...n.html
windows10-2004-x64
1Analysis
-
max time kernel
98s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/03/2023, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
Payload/Zebra.app/Frameworks/LNPopupController.framework/LNPopupController
Resource
macos-20220504-en
Behavioral task
behavioral2
Sample
Payload/Zebra.app/Frameworks/SDWebImage.framework/SDWebImage
Resource
macos-20220504-en
Behavioral task
behavioral3
Sample
Payload/Zebra.app/Zebra
Resource
macos-20220504-en
Behavioral task
behavioral4
Sample
Payload/Zebra.app/installed_files.html
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
Payload/Zebra.app/installed_files.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Payload/Zebra.app/ios7.min.js
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
Payload/Zebra.app/ios7.min.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Payload/Zebra.app/package_depiction.html
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
Payload/Zebra.app/package_depiction.html
Resource
win10v2004-20230221-en
General
-
Target
Payload/Zebra.app/installed_files.html
-
Size
721B
-
MD5
1a221a25114ad48a19b0c8f39d846e20
-
SHA1
8a6fd7717d5d9d3fedcb0b8e056daf948f4ddf0e
-
SHA256
338e1888db08d89155386a4bc671b26ea6f90d18fb744d7acb6a2cf5c887b1bd
-
SHA512
6962589684b51ae10c935015c0368246859f47b26a310f75fee423126f4f9a1b4fd3e2ad1b22d030f73e415ef2c958e8fa7240cc5b2023695bdd08427a4a8f32
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0cbba438850d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C3D4F31-BC7B-11ED-9F91-E6255E64A624} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "384912355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c00000000020000000000106600000001000020000000222e4d2bc9b41c82b87ab7886856eeead350def8a67fad6c873706e1e1342069000000000e80000000020000200000003309553f15b33e75e15f00b3fb1270d9f68cda690e93b7fc8b34b7c06bf47e4120000000a78b6eb0723c2f3a340288c68a978269b058d115cc68f349cd82255d1319c61b400000006ec65e3a7839a238428e844c507f24c9d3903bf760af2cda8db7cfbb3d9e2faf0c57f1e547ee7666ce1b3e401dc83b9713653650a293e9b79d432d72c985cc14 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1100 iexplore.exe 1100 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1716 1100 iexplore.exe 28 PID 1100 wrote to memory of 1716 1100 iexplore.exe 28 PID 1100 wrote to memory of 1716 1100 iexplore.exe 28 PID 1100 wrote to memory of 1716 1100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payload\Zebra.app\installed_files.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a7a40eddbb46874f6aeed2f3f0a4c8
SHA13fd3980c578ef2dd21f8fac3b39bfed1fff48aff
SHA256e6e1da0e33c2673969d7c3a80f395d0097b4f5e32c628691a6ff364ebd2d19c4
SHA51247db60dbb6a31f9a10998eee89383b9bcf99e503807bd3be42447afaa28e1fb6b96f0283460c496e3c46bfeca263dc5b48426df62d42ee41d9f9ff81f5092944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d52f48350202cb5b14007a1cfbd4bcb
SHA1b833680ad07b4be0cfe299389f12e15d74c0f975
SHA256ad9985696022975d9a441806c3167b8db38eab0fe5ff8758b2f2f67cf6a22064
SHA512cfc6ca5bc2a36b034b945148bc3aeb28f60c67231cc1ec612cdfcc47241ff2066866e6829293f5d3c6b0768fa4c628d8b313f38e838a58009ae0ad09edc2ca41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd513959041bceb6cd9261b21774444
SHA1edb4a6a03cc0c68960ed4a1c06236cadc662d64b
SHA256141d1fa60419cf49aa70af42940dfc476ebb284b4da95d7bb7ffa79e364e4d32
SHA5128124d6f6ee6d1c16f028e59fdd1bfbe223b6313b41f34e043358c7c2132711b0a8f83518116d9f93a0bc7d77fc2b382d844651bb44f86d78b04c5d5b340d1baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc68527e0f75372f09c8b2c34e4425d
SHA1e1624901ae398dd1242ad2058f54375ec66ed5bc
SHA2562862b01c919c5c526efaa8214a49e4c7bedd75aef3c121ec8907fcbcf7ffcdbc
SHA512f3a065907c2d52b7f13c20b45c6880b18bb11a95333c86b824fb800f6b0afd69fafaf6f30055a8744f54e09bc15599bd471222b8800f505dc54349aab1682dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3239151d14ceb6aa2d7f3a51296814
SHA1be5868e9c0cfda377aebfb84c8f9784e99b19dcf
SHA25617a6cf9301ac77d683b75726c3b51392f01e84c30cd380e4f1500ed9230256f4
SHA51274225256d2191be35de67dbf6956038073925ea60ff203895c222a492fff5e3efb4c55f268925c87564d89780860c8e4cdeecbae0ec53d44f8198025e63ebc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54823a930329b2d61b99153965d8d24e7
SHA1d6c190ac066a5757fa161db7e8d28e9b72499868
SHA25671c708df15b211f7d24b2a391571ac99381652166a9fc06a6e7dfdf47845ac29
SHA512db0874361f1e05e377d43d897c9db526e645b0dad63593a731de7ed6665f9e3e6b407dd934988e7632012625ba424797c6716d5e3829507ea0c5bc1957b29311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1df29462c3076f3c4e3995f4d30466
SHA1140dbc81111029fcd7942039526430c1250a27bd
SHA2563b85aa398175cd094cc7e623d34d58d8d707c721feb4b86928932f13c6321d95
SHA5129fe61bac1ed29997bb7470e302bb8bca8861c79a12a5b53954e1020ed039cb5535f7542425b1e3dc0a92c3068967b0620a620371df272391f21f8d60363efc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75ae34818cbd6fca2f63b4ac1783cc6
SHA1a2731ba60667736175bdc7469a5adc4033973afa
SHA256627ee8bb0be4cd37fc597a4f57d364557a8d1619661d6ca04cb473fab1c243a0
SHA512fe0a54f3177a2ab7f81d69482bc5a2dcb931be522d7a6fd57589f35d0ccc8552f01ec81e3bcef2fca443e68bab553aae22b5521eb1648d83a864951d18506a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f078d6b402407c56fb84b8c593f77a
SHA143f5106aa155498a4c12cd1f655fc63870d24a68
SHA2561288a3c17bd7237292a1d922c2231a4af75719d3fed3591f240a1c7f8f3b57f5
SHA512606c3942088db7d2ebdca6ea2c68836ef4590f8c19b7e7c333cf1e510fa67d8ebe710cdae7b53b213d2d0bc69345d6201d08eeae78afdec2ce77656a41931a24
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD5940b75a8d44f17495d744ec036eb7fdd
SHA182bf3cf3997267e9b58088df09f74effc5720be1
SHA256e407d151ba2c55790cdff99360945f3fb8f41f24a89ead87263a1c5aa0120cd9
SHA512e47928bf7aab4fafc959d58070b59b34171d76b7074933ae2a39cc4bed395e372c428015dac6637081c2788805fe4caa9a45f454dfe8c2129c57d9674218d8ae