Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 03:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.rfriendcorp.com/stamp/new_stamp/2X5M6/5X1G4AW_.html
Resource
win10v2004-20230220-en
General
-
Target
https://u.rfriendcorp.com/stamp/new_stamp/2X5M6/5X1G4AW_.html
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{765BE3A8-E319-11ED-8FFF-FA48AF8140A7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1261186373" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b6883e2677d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1261186373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31029030" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010d3bb75b0ea114e9ca1233a5a090b7b00000000020000000000106600000001000020000000864abc5bff35eaedd6dfcfade33d214e413b4317d751ec2c2194c097dffaa1d0000000000e8000000002000020000000877e01a55b0e558048e61c77903138c5fbaa4fb3ebe99668429df1687482faf5200000005a5a6c9ad4bb10800c73531f308eef5d5d49443840dfca49c6140b10337d057e400000000047ea2b3944d791e74cee6373a1b76afe9cba64605f7babb8e825d4d993ff8c30527d591592e5b2759d5e87e5519011ccaf218f68f424601e6f9dde7ab679fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31029030" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3148 iexplore.exe 3148 iexplore.exe 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3284 3148 iexplore.exe 84 PID 3148 wrote to memory of 3284 3148 iexplore.exe 84 PID 3148 wrote to memory of 3284 3148 iexplore.exe 84
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://u.rfriendcorp.com/stamp/new_stamp/2X5M6/5X1G4AW_.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3148 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d6b67afeb31f0d9bfe232166e8b300c5
SHA16ba1a534d40fea9302591aaee8fb6969bfa28e4b
SHA256ab4f8d3ad2a02ad67059703fcb9c7ecd397d9abfce4b4cacdf7ecc11b4e37520
SHA51262c9fc6797c263bf33c8f52d5d41ce276b3df2aaed6433d582987a607ae508f5389f86d5d8a63cc5715964623f5be08d5741ddd70a0fe18f0140eb314815c272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5d508d9d5203fbae63c7ea1c6dade4e7b
SHA1baf4c376cc13c7876e903cec90f8ae3bb655a880
SHA256910e182c6d7cb894064cd3a6bd7bef863261d5e8f6ce7be281b92532304355e9
SHA512c21cba442a49637fbd65ac9f9b721fd82d781a2a58dcc5d87d88b130cac26573e1643ae07d515938e8a59e3d53a9d4d5ffd9fffcc698c25ef689f8b15aabdffe
-
Filesize
202KB
MD5c5aad01e25110b7292fe17374ea1bacc
SHA17e7db5fedaa549877ac012d49057aadccc3696da
SHA2560c5e06e2b66719faa1d6b78fe2b4ed0570119f119c081405614a07a58ab9e00d
SHA512aff280d039c5665f6a52f00fd9de7f8231dd8c19814bcf9bc616d4ef337d099c2ea2d94a892af266df157932e80926593fcd9ee52730235265eee35dd8f58eeb
-
Filesize
200KB
MD5a9399690b97db8f72e202393fe1c1598
SHA1c9bc934e6123052d6e208fd3057c458e21b20ee6
SHA256f35efdd5dc55bf00b1125bffba5c48152a8447b0139edf807e4d43f583d94a85
SHA512901f9411b56feb4c9fa0d2434655316392b15bf47e5172a13856c48e504d73c8c47e8442103de912a471deabd58cfc2479b0d63adb209c91c493cbd0f232bd3e
-
Filesize
148KB
MD56baf18245061313a4e70a3c96b0f56cf
SHA1d4f12833d1d78eee57e61c9d5b32942907238ed6
SHA2560a7688428bb98d4f7ea79bf318267b7913bf68e5bd08c47511e21ff40107784c
SHA51207e2952d02ac2a46630494e0ed67025737fe46a7affbc15d8975704d3a30a580fcde41a81aae220f5894b96564159fa5621ba05ddfc90d4a8ea744c039ac820a
-
Filesize
1KB
MD53c66b77416dc79832c21520751fa4677
SHA1da63c4593f86289456a5d18993d098af48099d5b
SHA25675a3176ca4a915e211dfe82ff5f3535bc179e8a5f012d07cd981c9700e7dd72f
SHA512529269f0e0a42855b82b31d93497e2cfd8385f2c983f989d1ef58d6b8f5a095652575ac03e3935024bb4806bb78ed75a25631cdf079962bbadb2acebf11f446c
-
Filesize
71KB
MD527f2c38b7d9146c366a67ea9ab325741
SHA1c39ab958cab79e3c635b9c6546fda335bf7e6217
SHA25643a5938b730c9bb89fd3da9935d1de2149221400dcb2b76226ffcd4523850615
SHA512d92c4b860af086a08af631983212651746905c6f92a37065c42c232f91ddf050d4a83fd971f5ade73b520756526c2a746db7d8a1bb263351164d135db68d3c16
-
Filesize
71KB
MD5719dd032def5785d211be60cb2757556
SHA1aa50c73bb832a97fbc2ceb236b36c0d4d0ff4a3b
SHA256177a33febff7cda775265b8a7742a5c306a8c9937b798337790935d7148a3df3
SHA512ca471c9b78a25153be71d1ffb3ef1b24b0966b8f5ae3200dea6ba5a5d78026829923fa10e2e90db0ae8a153cb60541c61d4ae66b9152cb8f672b40543dcbf76e
-
Filesize
16KB
MD5b1c0dea5090e4df97167581af1e1dc43
SHA14ee90a0dc80d6ba8a7cdbb7ab203fb443966267f
SHA256d89846c4b7118cf943b2086b84895a666876d6407cd5dbb077db281d2b68908d
SHA512d587dc5525142bdd85f6ffdb4f0f0c1699e7a896e4776d9e5570e9ce74655e9b5e5cbd4375c440b9758f87b0a9565e62ed997fcbc9564db61ac38f6f1dc58c30