Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7GB_b19741fxj.apk
android-9-x86
1YOWA.html
windows7-x64
1YOWA.html
windows10-2004-x64
1changelog-ar.html
windows7-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows7-x64
1changelog.html
windows10-2004-x64
1clockDarkTheme.xml
windows7-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows7-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows7-x64
1credits.html
windows10-2004-x64
1e0012.png
windows7-x64
3e0012.png
windows10-2004-x64
3e0231.png
windows7-x64
3e0231.png
windows10-2004-x64
3e0537.png
windows7-x64
3e0537.png
windows10-2004-x64
3e1296.obi
windows7-x64
3e1296.obi
windows10-2004-x64
5e1299.png
windows7-x64
3e1299.png
windows10-2004-x64
3e1300.png
windows7-x64
3e1300.png
windows10-2004-x64
3e1302.png
windows7-x64
3e1302.png
windows10-2004-x64
3e1439.png
windows7-x64
3e1439.png
windows10-2004-x64
3e1440.png
windows7-x64
3e1440.png
windows10-2004-x64
3e1441.obi
windows7-x64
3Resubmissions
06/07/2023, 18:35
230706-w8fqlsdg43 706/07/2023, 18:32
230706-w6mfdadg35 706/07/2023, 18:27
230706-w34kgsdg32 705/07/2023, 09:21
230705-lbqjfabd66 705/07/2023, 08:59
230705-kxxdfach7v 705/07/2023, 08:41
230705-klwmrscg9y 705/07/2023, 07:15
230705-h3aqhscf6z 705/07/2023, 07:13
230705-h2e9lsba95 705/07/2023, 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
YOWA.html
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
changelog-ar.html
Resource
win7-20230621-en
Behavioral task
behavioral5
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
changelog.html
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
clockDarkTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
clockLightTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
credits.html
Resource
win7-20230621-en
Behavioral task
behavioral13
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
e0012.png
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
e0012.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
e0231.png
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
e0231.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
e0537.png
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
e0537.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
e1296.obi
Resource
win7-20230621-en
Behavioral task
behavioral21
Sample
e1296.obi
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
e1299.png
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
e1299.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
e1300.png
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
e1300.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
e1302.png
Resource
win7-20230703-en
Behavioral task
behavioral27
Sample
e1302.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
e1439.png
Resource
win7-20230703-en
Behavioral task
behavioral29
Sample
e1439.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
e1440.png
Resource
win7-20230703-en
Behavioral task
behavioral31
Sample
e1440.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
e1441.obi
Resource
win7-20230703-en
General
-
Target
YOWA.html
-
Size
648B
-
MD5
00afda385226fc12c0ff63f0fc065278
-
SHA1
b40143e306c45e09b99f3431ffdb02c0d70932c5
-
SHA256
e36c965275a591eb12b4eb64bf9d69e59b73526d86fb6bb1ffc2ddec12523d33
-
SHA512
2ec7d3fa444986a48a7f8ab3707b7e45518bf6408709189a2c2a1fa420e8919612b1136deb2d1dacd7bedf1cf6e3746fff985935aeb92de50808566bb8f6c91b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000079aadbcc12564442a62aad76c0e1e2aa000000000200000000001066000000010000200000005e043ffbecedebeff3adf639673bf12f160216413febc23e24794713fb011a34000000000e8000000002000020000000442882b39ffe401f0fe0d3e4b39f5fde8b3f2173cf4c1fcb46b98f8fce18d91b200000005ef8213ca867097ee73d8fd400d6dfee47f69a1fa8f61a458b3e4422a5defbfe4000000021ef1dfd470c5516a13df120900da6a7e8cf0a69a9de53f9e956b2a9bb7b3e0fd8a2c24c6f4defca2f4cf5e73fade1a8adf8ed180efca16b54697253ac8741e8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7073B061-1B00-11EE-83E7-66DBF85D7F8A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395304894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a6d5470dafd901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1724 2348 iexplore.exe 28 PID 2348 wrote to memory of 1724 2348 iexplore.exe 28 PID 2348 wrote to memory of 1724 2348 iexplore.exe 28 PID 2348 wrote to memory of 1724 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\YOWA.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1202898895095797dee95e67d8a6090
SHA1dc06dc1cb158800cfac7317f3d9b521493e0e8ac
SHA2562c9341e37d7f418f6e682c507099f35ca8869c7607b198787eaf2b5c42abef96
SHA512e014bc78ad8dbfb19371d0e4c45d1c9baae0ec7a9b76d14be21960e7ce47a858dfc5cb83429be4f58cfe3cf692e94c97d7a05af39e76b8fefafba739993576c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bb4afe6d8bfce5ee6d473fa70f9d1f8
SHA1ed2c5338dcf4517b14a7650b7a3605fe66a78d50
SHA2561f38af5620a03815a01da5af4f91401e030eb2da853b7bbbe4507aec46342fcb
SHA5126b6484278e17b1405a52a97762935631236db45696cf37d3625383ce204574e3aee448d6dcb286ef96dd407746010a829ef51fe0000daca4c90b4f059bfc2295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b29ba3155549aa26721b85b0326808
SHA1008db10f77b82dccb46f898133319a2f13eec43a
SHA256d02e367bf53e440c2d5af952130ae0910597190584047c283117fe6f8f6a1899
SHA512df3caf8392f5064b9630a233d8316798b2fd3c781465e9299ccf6b473180c21ace4ec19adcb79191cec77f13817bc0f1e433886e3f088e1a4791077efef51b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cecd93821a81534976bace696ba5a71
SHA16e89434b8bf378dd76d3f1e46b0d1d8b33820512
SHA256951da21772a52fbe6b46bcb0a5cd5c05a9d0ed0dcbf839384ebb7f4fc25fca7b
SHA51278a992c8b670b6ca6ce0186ff7e149cf6e71732d539304560d8d821cc1a7b449cddc04e8b09c3660e7414fe8517a23bb2b4edb29c00f9e3e57cb476f4e36ccb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M70DY8PN\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5174ef3b3a11521c9b35201aea8a37e7c
SHA16191ff49898042e48b426ed0d3ac8b9087ac687b
SHA2568efc19dd01317763de213b8c5ca5ebe28a4b4b8fe72b4a450570cf61a683d025
SHA512da04532b69816f153f02b76fa09c34cf28fa504cde8fbb78e9fa54d54b0ec1098cd720855c9a3f0b5d08e2dad0640675bb72583ff4747360477ab7f6dcc47851