Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1SetupX.zip
windows7-x64
1SetupX.zip
windows10-2004-x64
1Data/Packa...in.xml
windows7-x64
1Data/Packa...in.xml
windows10-2004-x64
1Data/Packa...ls.xml
windows7-x64
1Data/Packa...ls.xml
windows10-2004-x64
1Resource.dll
windows7-x64
1Resource.dll
windows10-2004-x64
1Setup.exe
windows7-x64
1Setup.exe
windows10-2004-x64
7jre/Welcome.html
windows7-x64
1jre/Welcome.html
windows10-2004-x64
1jre/bin/JA...32.dll
windows7-x64
1jre/bin/JA...32.dll
windows10-2004-x64
1jre/bin/JA...ge.dll
windows7-x64
1jre/bin/JA...ge.dll
windows10-2004-x64
1jre/bin/Ja...32.dll
windows7-x64
1jre/bin/Ja...32.dll
windows10-2004-x64
1jre/bin/Ja...ge.dll
windows7-x64
1jre/bin/Ja...ge.dll
windows10-2004-x64
1jre/bin/Wi...32.dll
windows7-x64
3jre/bin/Wi...32.dll
windows10-2004-x64
3jre/bin/Wi...ge.dll
windows7-x64
3jre/bin/Wi...ge.dll
windows10-2004-x64
3jre/bin/awt.dll
windows7-x64
1jre/bin/awt.dll
windows10-2004-x64
1jre/bin/bci.dll
windows7-x64
3jre/bin/bci.dll
windows10-2004-x64
3jre/bin/cl...vm.dll
windows7-x64
3jre/bin/cl...vm.dll
windows10-2004-x64
3jre/bin/dcpr.dll
windows7-x64
1jre/bin/dcpr.dll
windows10-2004-x64
1Analysis
-
max time kernel
104s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/04/2023, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
SetupX.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SetupX.zip
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
Data/Packaged/Main.xml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Data/Packaged/Main.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
Data/Packaged/Utils.xml
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Data/Packaged/Utils.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Resource.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Resource.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
jre/Welcome.html
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
jre/Welcome.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral17
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
jre/bin/JavaAccessBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
jre/bin/JavaAccessBridge.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
jre/bin/awt.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
jre/bin/awt.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
jre/bin/bci.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
jre/bin/bci.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
jre/bin/client/jvm.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
jre/bin/client/jvm.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
jre/bin/dcpr.dll
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
jre/bin/dcpr.dll
Resource
win10v2004-20230220-en
General
-
Target
jre/Welcome.html
-
Size
983B
-
MD5
3cb773cb396842a7a43ad4868a23abe5
-
SHA1
ace737f039535c817d867281190ca12f8b4d4b75
-
SHA256
f450aee7e8fe14512d5a4b445aa5973e202f9ed1e122a8843e4dc2d4421015f0
-
SHA512
6058103b7446b61613071c639581f51718c12a9e7b6abd3cf3047a3093c2e54b2d9674faf9443570a3bb141f839e03067301ff35422eb9097bd08020e0dd08a4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EC0BFE1-DA00-11ED-ADBC-5E76FDCFC840} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e32a160d6ed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388157987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc000000000200000000001066000000010000200000007b0b43e2f22308087ca874ad83ab4f87c1d609097cae6bbc78db1028846a739c000000000e80000000020000200000002506ed146b30c9892b45249a085b96b9bcd441955e6481949af82fe4dbd3f280200000002bcc162e4be8e4b7f746397bd620537930b0386c0c3057090296ba37b760c4d840000000f15953f9b8fdfd7d631d68a92570de7f999ace907eb0527d36af3e8489a7e8a753cee9c33183ad7f8e94430f1a72977face84e887fc25cdb9cf0e89c4b38b471 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 776 IEXPLORE.EXE 776 IEXPLORE.EXE 776 IEXPLORE.EXE 776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 776 1640 iexplore.exe 29 PID 1640 wrote to memory of 776 1640 iexplore.exe 29 PID 1640 wrote to memory of 776 1640 iexplore.exe 29 PID 1640 wrote to memory of 776 1640 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\jre\Welcome.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6762fbdcbeb4db83d45967120d05ad9
SHA1e6db20273b0993a5319ed74c5854d962e808fc8f
SHA256c1e3d14ada48864aa37ecb0592d1ad9380b5fdb2a646655b7e949b6555aa23a1
SHA512aa22705f0c8a7f448b48d2753691de052ff1c5f063781d65053fe6b1ec70fc899423cb4c8f7ebe389bd2fcde27f9aa6df72ac1a657a5aace9d50d30df9e291f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0f9644ce86145e7c9554936906afa1
SHA1ba5b49a32e4ad53aa694a357ee9ef91bfccddf66
SHA25650f2493716be6f4d9edb94f010bccc94b02200b73d32537340e8adaa080f5bbf
SHA512a2f6602f241ee5934ba7593b8a21e83aa1c9095f2a705e6ff9d02970a63b3efee0e2c8af13d615dd776345a4055c75014cce3abdf60100c83dde547155538ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f82d9f1f88c7a14e0bbf0cfdf8df54
SHA1265ef0ee29f446c73ff5316aafc5626ed1b99688
SHA256a50422fff136dcd8efe0c35b48ace114945f25554d7911b87fe5cc7461e42fec
SHA512f75e271b68d43d88bf084e5a6960a2029630ac71e660be89a790c5e49263d4ea0e202de0b3dc47958c349f10c60448ec125180684c42810d4ab8b023e4d2076c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcf1c4550c8ad226497178e7f0551092
SHA148f4b842bd21a65ff30233a80f018ea18c670bd2
SHA25658ea420461f79bcbe11f87b70649114c33c950e6b285ba554cc26e54e0a39ed6
SHA5120f1fd70077b7d9bb078706fd981bd791feb178327a66a1cc31eb011712efca5b1f85ad2008c0b8df0212ddd2103f0e3c12ac72c59bee71152ccf4f747259a140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ab9e59cd48a034b61e3c5511a2c246
SHA1aa957c922fa682b2ff5a0f3ec66e8b2f10f8dd3b
SHA256bc2d10047d6646b9bf8de428a625409297e52ffcaaaa1041825ed498fa63846b
SHA5121ec283181b17b695cc356a2aec870a2a88d6e78a5dbdc239fd57e42c0b0d35bd3f2bb0ca4a8448e1fe4cc2f34020508ff61a116e5f4c5d56f01e3fa0592ec10e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
603B
MD56955ca4d4c0eb92602c3b5f25665a15e
SHA1625b2dbf16b34f14f38713fe0731ee914d0ff8da
SHA2567b8808b0c68a4457c02f6b99953081d8946ced8b7d810c417e7ac38af1ffdb7d
SHA5124c4c41a03b8ab5049364689539cc48754ae3732e66dc5f76ff83abfe7f4ba8ec36223681b61e38a687a9bd6ac66b87b477f3bdf914d5a04dc6f77999e3768694