Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2023, 10:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Bonzibuddy.org
Resource
win7-20230220-en
General
-
Target
http://Bonzibuddy.org
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05b0813899bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a6e323c20f62084fa9d7de2a5e69243d00000000020000000000106600000001000020000000e40b5774ca4cae142354fb1c6566d5702110f63e126260551818310d2bcec47d000000000e800000000200002000000021ce733e15ed7c32aa27aa40e04a519e1b35ecc8a57f6484fed1abf73a5077992000000051942edb3115af6e41367ca9bf5c523bc608c69594fa6c4e21f8949f8fb032be40000000d2550e35116db18db0d1ea68dff3ed5c5b637bcde3c0c399e96c29a6e24b2e241aaf8534ca16ff3f3f8d29dd73bdd865a8119f304793ad16e74f2bc1b848cf47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393159033" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36D76911-077C-11EE-BB73-72D88D434236} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1780 iexplore.exe 1780 iexplore.exe 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1780 wrote to memory of 844 1780 iexplore.exe 27 PID 1780 wrote to memory of 844 1780 iexplore.exe 27 PID 1780 wrote to memory of 844 1780 iexplore.exe 27 PID 1780 wrote to memory of 844 1780 iexplore.exe 27
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://Bonzibuddy.org1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:844
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522201400779abf5b782d56af108620e5
SHA1f15db88408f0c527ff3ba6a7491de9a953a2c67f
SHA256ade37d63d8bc07fb4cf80bf259cedfbd981449ac9e39b00c01e6a62e86f94cfc
SHA5123e40058125afa3f86b945dcacbc26a62cf9f299e5fd475fffa593653b2676af3f137d0c431dc01bc8c7c8de15edc7b728dab9b80bb827349e29e520b44e4086e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53248004a6bec2e4287766b942d643865
SHA1d1f62d8a9ea9444cf99986a4be55d9ffeb76b393
SHA256a12e0d4e91cf4d75c5ad6ced469ff608f757ec4a0814a78d05b21c480e6deb7d
SHA512495927f3d16fd42291e82564ca86f4ba6fd8638c495eada7090ddf24e145a16288d087187e6069638dd5a1792c5afdfc44bbee4324b7d038db4714952a50b62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8c16a7c1979becb4cbfebd466690d27
SHA1669c77fedb8ba08882ffc59faa7e9af95ed521fc
SHA256d88d003831a976d8a411aec239057cddd070cbf10c0fc64c6afcf748eb04bbfc
SHA512757e7e30e95250ef8b5106cd8aec0c886a66db5025bbe58b55428957d0501258cc095b7fec9504e3c49f93f2103ab20a639bbfa261e9cb047536e29f023150ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544144942de7f9bcddd499c6dc5f6c17c
SHA10f78c0d42715537b0287543e9b7d95ca6f3a8614
SHA256fd56ba21bd7ff6604d54274828c19743773d57683a1d7f1be803961bc7173e90
SHA5128682adb9de9457131ec408481fbca3d4e94901230b491eb81d8f3014777a58e18e5afff2bcd09c3536d6a9f3dec8c92aaa05be89a17bdca758b5b2d5752b2816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516b8e7b81a3701e5bf772fd588eb7894
SHA1dbc2b2569c76f391658a240af95281f9ee55e280
SHA256f08066e35a743250400b7935f3cb7e6c3074823e476e568f7fafe254188da950
SHA512d26862a0de7e3c0c549d27dd71c586832f4784ba1220af492f0fdade32c6b435a14d2fb337ec1b0587681ea19bcc6f7bc9fb883e263dc891ce6924815d1ed7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a4d5af524c104b7182d7f241bcb80b6
SHA1e232864f3420f2ac0e09062450a51febee886f7d
SHA25606061913ef0e7ed27f4208efd8e8d97234a6cc8af59d5a9bf2ea95c728a4832c
SHA5128a8faf0e1fbe8985e98d2ff3f7761e93bc9ebc717ef283196b3315f4ec899dcd1ba7c83b25fdf59593a6d4e6fe5e02a871460f17fc141e1f26b50e50a1fa9f51
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BJWXLGAS\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
603B
MD57abe45517d57fbba2bf4291504cb0550
SHA1ce48190e8fefce70c7059c2608eaee03fd599103
SHA2568d91bfdafed922e25b8d826f0f976c17a710c98dfc511b5b9b6ccc88ecff1dd6
SHA5122ec632825fc7d9b26c40d697bf52eef8f427449023a45f6ed923ff8c18f990885457b7748df8eb30e211fe4741e894f6d8258b0ac75e97e7d243bc633a1b1427