Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
1worldbox-m...om.apk
android-9-x86
9DefaultWsd...tor.js
windows7-x64
1DefaultWsd...tor.js
windows10-2004-x64
1machine.xml
windows7-x64
1machine.xml
windows10-2004-x64
1settings.xml
windows7-x64
1settings.xml
windows10-2004-x64
1web.xml
windows7-x64
1web.xml
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
worldbox-mod-0.22.9-theworldboxapk.com.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
DefaultWsdlHelpGenerator.js
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
DefaultWsdlHelpGenerator.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
machine.xml
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
machine.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
settings.xml
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
settings.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
web.xml
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
web.xml
Resource
win10v2004-20230703-en
General
-
Target
machine.xml
-
Size
33KB
-
MD5
0869544722561f5aff0eefc83fc7b001
-
SHA1
1e118f4b5c1c6a7b1858e3fccb1b1d1095561976
-
SHA256
ef9b9387168fd1dd6c996f96c134d9c44f8eb06f9587004bf997252a520182d6
-
SHA512
ced7c9a5363cabdb87b01ed6b4ca190a690640dddf5cbcc0438acdc611a8ee942cb6cd73c78d3fc2d59f70171f22ac832a10b1e23758dc92599ee24acd978ac2
-
SSDEEP
384:PbtltttttSRtNRtcRtGrRtSRtTf5Rt70zDgRt2Rtuj4f1RDRty6ugyunHMSeuWuh:dkn
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395462087" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4e20c56306bc849bbbf82eb036fcf6e0000000002000000000010660000000100002000000092c2aa054324af32ad1a46def1972b776eb66cbccaa262492c1f450c96609dc6000000000e80000000020000200000001e4d204199cf4942e9ac78f815984ef65831f877279b6d24a9a52ee02cc07d4620000000078049a165794ab31d70e815b7850154a655cbf5b6aeb17737f6d3ae93529f2f40000000295d1d4109921ab4a168958b92477e10d4877df029585c8dbaf0d64d73deab00ed01123b269630c63cde486ee4aa6db9783854a03bb80af577bd71ba5c2fb35f IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E8861A1-1C6E-11EE-82AB-6A6389873578} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409e62447bb0d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3891603265-141683679-4067940827-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1972 2268 MSOXMLED.EXE 29 PID 2268 wrote to memory of 1972 2268 MSOXMLED.EXE 29 PID 2268 wrote to memory of 1972 2268 MSOXMLED.EXE 29 PID 2268 wrote to memory of 1972 2268 MSOXMLED.EXE 29 PID 1972 wrote to memory of 1544 1972 iexplore.exe 30 PID 1972 wrote to memory of 1544 1972 iexplore.exe 30 PID 1972 wrote to memory of 1544 1972 iexplore.exe 30 PID 1972 wrote to memory of 1544 1972 iexplore.exe 30 PID 1544 wrote to memory of 2056 1544 IEXPLORE.EXE 31 PID 1544 wrote to memory of 2056 1544 IEXPLORE.EXE 31 PID 1544 wrote to memory of 2056 1544 IEXPLORE.EXE 31 PID 1544 wrote to memory of 2056 1544 IEXPLORE.EXE 31
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\machine.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586e5daf5477213afc65ce00d3b0f168a
SHA137969cb03678534088c8a2c83d4e5b0cb0561f78
SHA2568d1ae4d9e3672da4b76edefa5c78df0eb66dbedd9484f7bf7bc53f59f07ec25c
SHA5125ae375256a143d9c4ccfa35bbf3537d35d415b67ec614e6b3469e203b3e0a213eca8f7f0f139cc4309ec371dec835b3a7089452884a6b2ee5154f615d0b8d562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc9fa5a7554c08b5e56a05c9199e6688
SHA1a28203d265a211c17f0862f75f1e35ecf83d92a6
SHA2567a7c2af07efbf856d9cadf99c2e211420d8fb80164ccb17b40e6cbbd98d81d20
SHA512029892d80584d25da71d98696b4844854798cfcd3057edb63cc9fe79f0301c5a270a078409246250bdb53ed5ccff9697f5f5a2e5682d42cec8024e07c1ab87a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59855c23d8f0c9fc53fa58de1396d67f3
SHA1cfe86fe5c1386ca68700fa10ff42a5dee2c7d3ee
SHA25670431b0f23a492c55069c693528489116b82c4be4727e0f9050890f8d480f9d1
SHA512ba16f465ad07789a4e47eccc686e03b2dc184563f550e61ae8a30f561c039fb3dc310f7f4ac5a99cb9b20a33da609f0350923c93d38fca9e0ff36eb0f70c8702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4278fe51a98b14a971534feaca5ac1b
SHA138693ab9e1c8cfe3dc13e7ebff739d975b0b5106
SHA256a849666345d992e74147d4b77505ac75580af878ba9bc706095eb429d88923f3
SHA512d3b61776535eecdd8030da26b55d0786ab43e167e1c390e48c5010e350d964bb8f981d11efe05dc13c8f04a798dac7f473541d288b6b73d79add26e4145b8a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575944fd9a8ad7c6f605b53131b340365
SHA14b0b31e80369900e0c0e4fa8f3deb49afb442f3d
SHA256c089fd8e0cc3e200a269fa2274c4036d5c470b7a31c69b796435ce13b15ee06c
SHA512b00be37ce517ffb4cdf50969d164df18612218e1fdaeb0f254bcc17e105b05eeb733c3b50fd9cbf1f0fb4549f3a8dcdf00e1ea38e29f44b0ee48065028e26cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a909096c84a4b542586b85ff8d7e9510
SHA120896c4cd7b2d06ab55d5d4c685c23848ca61f09
SHA2569dacceedc0d057a6c70817bd863a28708ed74206f2f34f0b16e159e016734c85
SHA51292d61d2089680edd92cb35db57a9cc46497565731425db48cddb193b293b913537f065f5a319f07c45f0fd30299ea4f25503caeb7452a6a119cdb9abdfdf0b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52756604dc3d5084818416c748f5a88
SHA1675ae2e1feb9823246e2ff8831ba63c04f46e467
SHA25672539a42eab004fdb5a408014c3f180b1e196aeacb106191a9f9d58eb8c2393e
SHA512b174904629660c14d00e8774c962a7b91bec10588e0a6a57db3e8afc85f5a4034aaf4a8f28cade36500368c160e6e3c9b8cdac562ecb18aac7809b4b19f6c718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e437a8fa82afb81dfb03b0f3b54e69c
SHA14cbe8ff6cc895d7289315dc1eb88f3ca0a7685c6
SHA256df2a0872a6cc4eb4da95461b54df1f697fd137e404ff64f8aa3fbf7748453f7c
SHA512faac1fabf97e301ea24cb72b95a9665e9b28efd50611c4a86c1e73d79d360a5fa8f6cca6d673b515cf177f512d0c546ae7d2c3ebea4414368019c9d42ed246cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a78a2a3732c39210256b62f30ec43c7
SHA16482eb04dbcfb64ae7f65d748f89ab227332dca5
SHA25694a8e7a5ca6b381e1423fe2bfc79f97179fcd14cea7c8f7ec26cd0ab3b5e7f50
SHA5126bf78658bd26fa9ea7c0a17de0bf3442af44f54866e3979f93852df987c74c1ad189d5b7f8ac373d29ad427c91e3e3fe29a4fafa3454a01c092f17c1bb8fe8ff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DXRMASGZ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5d1e804a0a305a633c593bdb77623ccd6
SHA1daa817ed03b7be9935dd1df03b865b9b2b9a1fc0
SHA25674507c1b6eae8fcbee28f303bd9bb5abd413c87a7d5b82143a800d694a76b0a8
SHA512a95293f3286d13b572df3010968663229c49fc1601b15d722400b027b2e1736062686b80124c86bc1c3510affe5dd9eac7092e64db03ae99abcfdf86fdc1621e