Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
7TapTap Lit...re.apk
android-9-x86
9editor.html
windows7-x64
1editor.html
windows10-2004-x64
1editor2.html
windows7-x64
1editor2.html
windows10-2004-x64
1index.html
windows7-x64
1index.html
windows10-2004-x64
1jquery-3.1.0.min.js
windows7-x64
1jquery-3.1.0.min.js
windows10-2004-x64
1post_video...kes.js
windows7-x64
1post_video...kes.js
windows10-2004-x64
1rich_editor.js
windows7-x64
1rich_editor.js
windows10-2004-x64
1rich_editor2.js
windows7-x64
1rich_editor2.js
windows10-2004-x64
5story.html
windows7-x64
1story.html
windows10-2004-x64
1story_web.js
windows7-x64
1story_web.js
windows10-2004-x64
1tap-editor.js
windows7-x64
1tap-editor.js
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
03/07/2023, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
TapTap Lite - Discover Games_3.4.8-lite.200000_Apkpure.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
editor.html
Resource
win7-20230621-en
Behavioral task
behavioral3
Sample
editor.html
Resource
win10v2004-20230621-en
Behavioral task
behavioral4
Sample
editor2.html
Resource
win7-20230621-en
Behavioral task
behavioral5
Sample
editor2.html
Resource
win10v2004-20230621-en
Behavioral task
behavioral6
Sample
index.html
Resource
win7-20230621-en
Behavioral task
behavioral7
Sample
index.html
Resource
win10v2004-20230621-en
Behavioral task
behavioral8
Sample
jquery-3.1.0.min.js
Resource
win7-20230621-en
Behavioral task
behavioral9
Sample
jquery-3.1.0.min.js
Resource
win10v2004-20230621-en
Behavioral task
behavioral10
Sample
post_video_detail_likes.js
Resource
win7-20230621-en
Behavioral task
behavioral11
Sample
post_video_detail_likes.js
Resource
win10v2004-20230621-en
Behavioral task
behavioral12
Sample
rich_editor.js
Resource
win7-20230621-en
Behavioral task
behavioral13
Sample
rich_editor.js
Resource
win10v2004-20230621-en
Behavioral task
behavioral14
Sample
rich_editor2.js
Resource
win7-20230621-en
Behavioral task
behavioral15
Sample
rich_editor2.js
Resource
win10v2004-20230621-en
Behavioral task
behavioral16
Sample
story.html
Resource
win7-20230621-en
Behavioral task
behavioral17
Sample
story.html
Resource
win10v2004-20230621-en
Behavioral task
behavioral18
Sample
story_web.js
Resource
win7-20230621-en
Behavioral task
behavioral19
Sample
story_web.js
Resource
win10v2004-20230621-en
Behavioral task
behavioral20
Sample
tap-editor.js
Resource
win7-20230621-en
Behavioral task
behavioral21
Sample
tap-editor.js
Resource
win10v2004-20230621-en
General
-
Target
index.html
-
Size
355B
-
MD5
8ddce0bcf9b9221dc622ec6fd931a371
-
SHA1
7bf0d1a02e42983e3317eb42d7cd2b9f64779592
-
SHA256
c9a3653bf2a016c5b9de634cb5363958b1cbabd7993f6929bea20124363414e3
-
SHA512
97813e8e369b7fe2ff5a14c1c4dac6b72eed869d26c4eb6ab7691cdc8cf5802c28482bd44b330add0b16071d1d4b80790964830c4106f128d8d085fa4de55037
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700a3c854aadd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395111297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF0F0281-193D-11EE-94EF-CA5C11B4FBB1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000826db13b4f2d6946b52cb68ee9de0a2e0000000002000000000010660000000100002000000049af8d2b14c2d4d4285500c3adce77397352cde882d3b58c0cc3aa5ea68a120d000000000e8000000002000020000000d55cc4711f065dae28ab9d0a680171cdc849134711ee3831fbc3be7f90c8086b200000008042e93b60bb26566307e732e3a15ddd77a91f5e104a54239581ac4b8b1deee440000000d4a45555e3e96089917238ccaa438352c920e5112195f46566029694a640b0ae52403d6e76254f597e94aee152f0e029ba7f13de39662c8755cf8c55e257f081 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 524 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 524 1940 iexplore.exe 29 PID 1940 wrote to memory of 524 1940 iexplore.exe 29 PID 1940 wrote to memory of 524 1940 iexplore.exe 29 PID 1940 wrote to memory of 524 1940 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a96a7cdc388cf8843b319076a4e232f
SHA1f28ae42a199ec6056224d61efc50344e4882d69f
SHA25679dcbdde97d80bdc94383e5989b5ccd2e7c22d6c0a07446fa33adc6b91ebd907
SHA51266ae9f86e1ebe2db3eed7570c6ef14e806422f2c298826ad57d0b991a5ff1815eda3b5d2144862b34d19043e01ba8e6a95c95a955c4af475af50fefc2a3b5be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5556c74a1d9c268d73870ea2499c36642
SHA11406042e82e9022f0c2f8f1dbccba3ab95ad020c
SHA25634a6258defbb1a498620432d9135ca12e54d525939ce6f33fc4ee6d4a9e59ba8
SHA5127a9f482d6016540292f08c04ab3eca998dcb2ea8bd23c475f60ad68403cb361303afb5516a7aa880f471d1420d3c42a54855879b79da9222791da86dff314d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5802d872377a92b44fa84106a9f884ea5
SHA1d24f29fbcae3ed26b0c21a31022e788a53cf0bbd
SHA256ec57b3bd0fcbefea7375277f9a3e5f357ff9d15838a279915b41cd84ff53efc6
SHA51212f5b16dca88db865db0040b5c71814b22e1894e691811bd8ff3c1e045abd7048792cb6c1238fc48f90250a9e58f63f0e72df0b41f426e5b7812176613153e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52745411a616bbc093abb7177af21aff6
SHA11e8ca5ace838e057e2ca1a67bc6d2b09c02ac89a
SHA256a389aea8aeed9d955aa2aa46c36b18df775d590c60c032f5527ec53f111e27ac
SHA512a0f0be8fc3970ac1445fc67c0f540ee318d773c80622a5d605155ccf0bc86b76d398d05fb19a3ab53d169ed465b675d526e920f85bdd1c118600e1f1538d9b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c7745f5ee187d092ffe234545d2743
SHA1c3949eb249ad799271933ff48473cb8be7a3c8cf
SHA2563f0cd67f6602abc65d3ab6fbb531a09bb195c7b4871c0cd73516eabbda5f20c4
SHA5121f9428eb99ce0952d563474ad15c3a352eb122401c9973f1420ace7bbc0690ea105caa7dae278bb653ba87ff54d88b9dcec263e22fc02302fd7899d936b16290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bbef27055a7023214faa2553ac96637
SHA1f1e096c76bafc8b07207781fffdb1ba76b9cf447
SHA256f01f51423b35367e7c3f8ceeac1cec2fa45f713d4b2777776c6bde37548e7c5a
SHA512e3e00c5a17d8fc7a786632fcba183de07c159ab6d05818444ac3830d20c2fc9fadca5779b74cb10661f8026a17aa04df48e62a0b6f323e5c7a5c5d587ea1ecc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b247a984a18b5dd25867293414cb752
SHA18f0a25d2fa25973e2397a0ad2c98dc4133641dc8
SHA256012adeca56077ce8bbb88aa7b05aecdc25d0aea38b23e8522bb258e0a496a4ca
SHA5129ee004c8722ffefe61482149253fa3b73e44cafecce646439f09a3bd7ade09de6e3beda4a2f97d3f662794a5a15376a9d57d1f5c76bbc39bba7f1040410d987f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5058447ac3939ae4185474c776ac46b84
SHA1d0873f712cf08756133d054b9d9a3faf866ec942
SHA2562bb16eede40fab4c9404476dc4a7b0342dd82d730db4cba1d54ef7fc1c17a372
SHA5121502305dc860b9a2e1f74aec601af5e38ea619962b7693fe8842742586ddbcbb1d08d0c616c2e9127642498635580193754005880cbfa236bcac5ca5e62a3192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b42bcded70494fb8354665674fec378f
SHA1d65148882b5eaf6db1bcf4445b16440c30838400
SHA256d253db156e962bb00d00dc1a651f7ea031c69f5323b1e4f990b4f88f9cf600b7
SHA51217f29a2ef3aba4c635c4aa28cc6a51658712176c123ab148acea5e961680543e485d439653e183824b20bc8203d1824625bc4f2796b5f0a204e4e96c6f42a6e9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\134K02XQ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD51c15f0123c0f01e2a521e3debdd2a343
SHA176bc361572baa8ba841af3f7cf34aa6895252a2f
SHA256c337ab083e49ab1d180b733ebb084a35e06e91097072828a61997fe075edd1d1
SHA5121fa1a5e4ab8d0da1bd01763697744e104db010746e3f5b9afc64d161823dc939b1fae2f7d634b173be442d89ea1b3b1b33abdea2a5c9b6a5380b9bab0a133227