Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Greenshot.exe
windows7-x64
1Greenshot.exe
windows10-2004-x64
1Greenshot.exe.xml
windows7-x64
1Greenshot.exe.xml
windows10-2004-x64
1Greenshot.ini
windows7-x64
1Greenshot.ini
windows10-2004-x64
1GreenshotPlugin.dll
windows7-x64
1GreenshotPlugin.dll
windows10-2004-x64
1LinqBridge.dll
windows7-x64
1LinqBridge.dll
windows10-2004-x64
1Plugins/Gr...in.dll
windows7-x64
1Plugins/Gr...in.dll
windows10-2004-x64
1checksum.md5
windows7-x64
3checksum.md5
windows10-2004-x64
3log4net.dll
windows7-x64
1log4net.dll
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2023, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
Greenshot.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Greenshot.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Greenshot.exe.xml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Greenshot.exe.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Greenshot.ini
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Greenshot.ini
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
GreenshotPlugin.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
GreenshotPlugin.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
LinqBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
LinqBridge.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Plugins/GreenshotImgurPlugin/GreenshotImgurPlugin.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Plugins/GreenshotImgurPlugin/GreenshotImgurPlugin.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
checksum.md5
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
checksum.md5
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
log4net.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
log4net.dll
Resource
win10v2004-20230220-en
General
-
Target
Greenshot.exe.xml
-
Size
423B
-
MD5
607cf0cb207fe62914afb1d252002de5
-
SHA1
7e9979e5244f6cd3640cf5bc429c29ea9f80c656
-
SHA256
e1f91b7391b071117b03be8e8a21fb644e83a624bfa9ea76a4389e8f2ea7027c
-
SHA512
552c0b846b8a9a487aa27a9158ec01dc35f47f4cf932540adbf3bebad34ed85422213e73ab9f826648d9340ab0d867eab71d23c4b7b06ca1f0775aab9683d096
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a6f5e79054d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385355872" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c0000000002000000000010660000000100002000000086f515cbca4b578e3e939963f57ab5b3b332ef5ed3ba45c309c8e40c06e646ad000000000e80000000020000200000005a78ebe4d254b7ae1cc19a62b4d66d3219eb5cbb81f0f28f9ccabf048d0c94e82000000051d6e7c438a3bb3773fa889f3a610309e3f340e75b1af005bf150b715ccf06a940000000cd91f11a042cc248323773ed15acb156e4f11b798149a3f726d6df78ef41b0ebed151c064541306591fb3f58eaca96b10db331e2b33fbc42b1392ea958f5c591 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c00000000020000000000106600000001000020000000380d81c01cdec2004ec0b23a3c91b6f7fcdbee998134556454f2ebe8d9c70a97000000000e80000000020000200000000c0a6815a015feb40337e720545117f1f9c4335df3e962cd61cf6141e2ab6df6900000001e76d1813654c355fa457b38c6a0634b1aa7d6b68ba90daa5bfcdea91b538255cf0f0901c8aae724060cc69d54908b105ff82f9c3cdc01a6ac10f3a47a967d7000d55ca390c238cdcdc3fa5701aaea0ceedaf89d675886a96d07860ad84a29a1179ac78441d44dd4592ad5cdd946d3c469b48d4dae112544d4889343c6df7c0c5d0f20fb3af0e3139ade3398785dfc59400000007196cf47baac056bcdeda2d2662a8ea83abcff6afa254082d10d190614c7a07aa3495f6d25c5b8865004472808b942a259a8a4b1fdd039f419874678882192b1 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10CE3941-C084-11ED-9381-C22C4A0458E6} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 568 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 568 IEXPLORE.EXE 568 IEXPLORE.EXE 520 IEXPLORE.EXE 520 IEXPLORE.EXE 520 IEXPLORE.EXE 520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1232 2020 MSOXMLED.EXE 28 PID 2020 wrote to memory of 1232 2020 MSOXMLED.EXE 28 PID 2020 wrote to memory of 1232 2020 MSOXMLED.EXE 28 PID 2020 wrote to memory of 1232 2020 MSOXMLED.EXE 28 PID 1232 wrote to memory of 568 1232 iexplore.exe 29 PID 1232 wrote to memory of 568 1232 iexplore.exe 29 PID 1232 wrote to memory of 568 1232 iexplore.exe 29 PID 1232 wrote to memory of 568 1232 iexplore.exe 29 PID 568 wrote to memory of 520 568 IEXPLORE.EXE 30 PID 568 wrote to memory of 520 568 IEXPLORE.EXE 30 PID 568 wrote to memory of 520 568 IEXPLORE.EXE 30 PID 568 wrote to memory of 520 568 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Greenshot.exe.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:520
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f179a76af8324d0416b9455d3634c79
SHA1937206070c1c977c1f7f13d573882b7abbd69a3a
SHA256a4eaceecaefdebc99a4562bd7ffbc179f55678730234dc855bed4ec0dac68006
SHA5124831d3adeef47bc89d269db3e53c1b04e0e2146f3963c17a5ac6702f20df93a1192fdd35d1a70137c525ab087923555b886852dd2604a47cf1be8acead566ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de5be9862289870e42ea66ee78b074d
SHA1dc8aed9afe7888ee12e8a8ed41646f9330f68eec
SHA256a502ea37696394259066a9f13eb93b8ca5142c29ada1ecd78ce45453e1f27f33
SHA512dece475aa013ca5fcb9f93c1fe8c6549438fabf5fe2ad63158dadbb92d313d5c1aaa4f288fd0d181e15429089efd855ed53dc2305718d9a537a29cfc679ab774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8e5fb3467f1772478bca619e16c9b2
SHA1926e72ef2cdb17a21983b77f31453766e0c85e87
SHA256c20dac063ffcf05a4497c2e89d8d6c2792244005046acd4be3cee3650d9c1dc1
SHA512ecbdfd6edb8172f69a5bbbbdc0a0a04343c425b6e0ec4990cc6618a3de0a3093616d33eafab8c0e92de0534d0e5ccd2f38d9b4e2945cc4b60ceac6b217c97d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bee61fdcab85b95c20c5a867537eb54
SHA18cc5b0c87173a2ed8839e457c21cd83194bc44e8
SHA256d89480f623c706835792725717f84514c18211c3da39889be7153096e6e143dc
SHA51215e9a1c62da9645c665944b8eb33fa390add94eb32dc68fd13c5fa5cc7a5bbcf8ea085c69faf4faf920f551265fdd960389b959a774194adbf01b8c9c5b52a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d21833e8eca871ae72f61ad4222f56
SHA1b514b1eee3d32277073c9f1d4123b78dca3d50b3
SHA2564b74b2d2bb8b21d88db910c0be2db63647ac0947e5280ca2910e09f5d6d08c99
SHA51270a281591223d88a49d55183e9aa3e0c94d3c740ab27e28b495946c6df526d7c6fe7a4dede7d13ef688bf8e80fa2d56ebddf2b993925ed27205a09b20f5f7348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a72ff460a66fb018d3d28dd49feeb7
SHA1b64b40e6c5219bd8d117b1c76918c6ae98beadc5
SHA25695d9fa79cb8cf622bc73e63e6538c92268d052e4b9c57bf665b36af6404a3159
SHA5129531db70a2477bb23a789d02378b66b91cc595dd6c32b12b4245cb3a1dde8dc906699420bb6251eb42a771a915df553208cf87adf01c27f7562c6e2d30c98ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c0cf10ca37c30c84f91b6482ba588ee
SHA1f8a015b859bfadc361212ca6a044bdc6dd84e066
SHA25665c7cb4156cb94dd17c7eeee7fb6149c39cec20e7ddc5b7ee4b247d5de6f93ab
SHA512c9c0d6324beabd7acaab1bf186f3917e7b2cc5bfbd415784fa95e52b354cef49ab170c59e5da677541fa73cf24ab11b2e9953dd6533ca6c4c287afc79bdbd3a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UIC7WQYE\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
604B
MD5631070ecba36bd0a6b15a90630c09921
SHA1a77cdf7c207f372fb15e09682e805fd12c3ce70a
SHA25640b06dde197f99fc02e3ede3525a5cac0087007a9a28574b2bd708831e68a8c3
SHA512e88a995455c9a333bb57a846107d042822b75ba0d4870640365c411dd95473035004d70e2d2041e8b0084226e46ffe75ec8a2a8508a01483050c308f789caaec