Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/07/2023, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
Bloxstrap-v2.3.0-x64.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Bloxstrap-v2.3.0-x64.exe
Resource
win10v2004-20230703-en
General
-
Target
Bloxstrap-v2.3.0-x64.exe
-
Size
6.6MB
-
MD5
77e2e8d436cc140543b0c127b853737c
-
SHA1
0016079fd0145ffb1368f5ec9747c5848c397a12
-
SHA256
385f9ac853fcc9d165c8e9d6af751f2b9897da992e239d2f5be0177bafc0dcf8
-
SHA512
3f65e142bed586783a5075c49714396cb033f360c3a78d4a516eeec66c3220a34cf6facb4b3748512fb82b7efc1da5306d360169686259d4739f8df9f17cde65
-
SSDEEP
98304:did5DeAd5DaTsed5DfzEkmiLEiOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrTlb:dhseObAbN0I
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e12b0bc3bcd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3469ADE1-28B6-11EE-A65E-E66BF7DF47AF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005a31a35914bcf84cb1db54e391e8cdcb00000000020000000000106600000001000020000000d6010a255e561b53ebdb32f7dd074b16e1556312beb86a32493bc8c694f0baa9000000000e8000000002000020000000f870d3b40b83fd6a276459d3304e9fc9ca48004833faf79a0fe306a28c380bd6200000004a3fa7c15ff17f98d03070aed2e3784400f912e237022e6a22d29286ac5e5d654000000052ed9b9daf0b132250872a1fde7cacc586dba01bf4a987a69e7adeb86579762c6b3b074a1b89da534e7f591e704a463e1ce5d033bc3276bea1c2bcbe74e0310d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2216 2292 Bloxstrap-v2.3.0-x64.exe 28 PID 2292 wrote to memory of 2216 2292 Bloxstrap-v2.3.0-x64.exe 28 PID 2292 wrote to memory of 2216 2292 Bloxstrap-v2.3.0-x64.exe 28 PID 2216 wrote to memory of 2816 2216 iexplore.exe 30 PID 2216 wrote to memory of 2816 2216 iexplore.exe 30 PID 2216 wrote to memory of 2816 2216 iexplore.exe 30 PID 2216 wrote to memory of 2816 2216 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bloxstrap-v2.3.0-x64.exe"C:\Users\Admin\AppData\Local\Temp\Bloxstrap-v2.3.0-x64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=6.0.16&gui=true2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533c701abc2b94e4380c6af582ea5089f
SHA1e06ac51a9186401a7382c481578723da9118114b
SHA25614dd00e96c56ba6b76fa633c5bf2afa904bf98a541c07fcd354597b52061a84b
SHA512e155511321715658a1c8aa7a1e65437226bd7b6be70b54f76b2e37001910caf028420c65d367a0fcf5430de3ebd7123e0310baa75e0dee28680533d7e0d871ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b2764a4fb1004ec604a31bbd088d795
SHA1743fd0f6682a7f564412d62bf26fff6be93ab04f
SHA256ce079dfc126e1e0894036c258af97efe059244770b1fe7e8ee104a215b326d23
SHA51232a984e0edd32e5edff901fbc7858e1fbe9a9d5dee6b7fbe7d83680fe838ad1535ebef814dd1af315541f83c81d713382db79f3562bd998af368e705a489ea4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411e6f78c1f048bf3f3d8c78e41f8826
SHA1af96dfd85858d60af224a95b0aa2785fdeb5fec1
SHA256dfdf25e6d226085cde3124018fe99e28db504b89b5c1a99c956a8fa1adbf6685
SHA512c4602220225afc00554a29b347cca1b2d34e2f8f32494e86baa7a96b811f63fb35b40ecc9d38c6eadce15b18ff290bda500ff817d4f0f814f195e45e7240ad2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368de6e727b2825ff788af9b4193b64f
SHA1e4425eaa7239de172d7d4e5d102e21246f2bf67e
SHA256aa9e932a9149fd2fdb37d55f8daebed327e9e89fad25554edbf6b79f3fdab7a5
SHA512a49c71b4103fa39751a8efe3460ef687f4997b24737aeec623297f9310a53d7c7545ecd48373ef41f8bcd800fb2acf9ff1fbab56b14c412faae2c7cb45cada7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5269651f461f908815f0dbc6c451b57ce
SHA17f051bbecd829ec585eae10cfdafb743e62a903b
SHA256e0c429a9a5f766c0d2dfd77cb9d2a505b01dfd29f8c893c14fb0bf33855d9555
SHA512875ebf780f248820018f1e85d5250db3889065d0da979a1e0bd6694078a173351ab817b90a872ca4c8fbe23dcf45eb68973fdc64cba43f3d66343132edbf5267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ded11d76c5e14a5fa4dec84da265cc46
SHA17cb52183d7c8df51f1b69386416716a58cc0d232
SHA256a26d4d1663e5c0304a10dfbb2eb17d7d7e6dea4b57f9b357c4614e499650e490
SHA512512695f3e49209a6269e5261511cb8ef4be331169a5ab633104c7c77bd5caca2aa319c3325209ba10298386cf2bfb597b8318a78028e24a4fe6dcb7a63146bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf55d6f1cc0ab4c34d63b891eb704c4
SHA1d62a27d2071c76b55b653912bd3d6d210714c7f2
SHA2563afc64cff2b1f952fb11c09c7190ef2b5a417a67537d404228ebca62cfc983d1
SHA512b3ff1e01a669d1aba2d1678f29f5404f6be6c1153b14f27386b219b3bec79ae2e427a0a5d94a0af0ac92e4295a5f9724216058bed225f0f3924dbe418ecfb763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39e65bb5f7c1efe83b7e8a1782f8c68
SHA1947442b54ba16e2852f15a718d0d16e45f87d5dc
SHA2563d6eabdf68210bfcb08dd867cd5e4c8ea208af44696a46e446732887bef06e0d
SHA5123bf4e3824871f7906109bb180b635da44786f95071148d663bfd51dc3c9b5adef1cb0aba649b06d50078e54ae2f99d45c44990db775d706286513515179d5bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52964dc330aafc93a34b8ac47c34fc4f1
SHA1d551f87bcc684bdefb2afd5e51da8f165f23a69b
SHA256e9ea89460dbabe584420275ddc18d6900c4013dfe43e4591de86fdbe958db8ae
SHA512bf2d8145d9ffd32500bf1691eef026a187ca19e2132fe4bf83f38d7c21bd97450818d153f12e033f8576913dc1d782d1d5144acd7086d3aa1f6b7e9614340e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c5904a8b5d9b2af864ad40d5b652ecd
SHA1b6b7d07260e49eb5b0848af3d7d503dac04b415d
SHA25605d9233e0676679e105d20b6fd882cac8e6d3be592fb146ffddfc432e9f53e66
SHA51267e8977c1f4d90499df01bf9bea3dc694e07778243d7a2f90797538678b7b7006befdf2adc3ef8e9939f136cc05e197ce6e2d9d1d72545ee3cd7b69c8fee9fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586fa397fad7a560f05fd17c45fc9e280
SHA190f7661a8fa8ec90ca39493447cd3537c49f14b5
SHA256e671314865c675f0b8e9c22b861ef99c09770e40b7457440d8d9d4fc9e29b364
SHA5129b50d0a709ee13a5492f05ab1fce5ea983b1d65a337cdaccb52f34fbe4fec58354f7d0e7a304740532f37a62cffe5be10f14e3001313bde36379733f456824fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6887ee6abff9d131ae26088082e7016
SHA105bc7b76879728b718b2f7a5397f7e573579da10
SHA25636d3e3b41b5871e7734ec76467efd22abcb63c774231bb3b079531bd9f7797fd
SHA512ba34a51259ace960a02bfab7d1b0ee4ec1234863e32bb248b7dd3c2278f353a8898307a65940d96873adce58e49265d1050b969129a3b4931b1cc7c0130bac4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5512f9c408b09830731a257d5349d4a09
SHA11cdad505d92dddc6e47f60587c10b25b4e8cc114
SHA256ae9761aeca55d37f79de5d48ee0483039e5cd458838e5f2c33ccf47909fbbf3c
SHA5120c7ed3008ddb6b5afc48201fa3ac20e4c317350edf643358755d8f13ea36460de6076033c4fa9db700bda05e9ea73a364a80dd23817011d0e72471d1a23eef13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545bf18d2f39b83922f86b0bb32f2ce03
SHA1ca98b921baddbb85966b59da1408e6562ebd1c39
SHA25673efeeda6848dd1b6bd590cc4faaddefaf9360c20deab1f3a1faf3147ed8d6c9
SHA512198fd7eb3b6d7551ed866dc5e6e4846f465bd2a59a9e35ebf1dfa5f2d5858412a059f0004718b30713dd46f2ba484714b592b08ef31cc8c30cfccb88d6cc098b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522360ad86f51ef6a0d6192089b69420c
SHA19ae05b286ed9921900ea17b25047b5008943f091
SHA256a116b3a1abc062dc62e1347b45de2e97dacbb441bebf3b3742117d358afae196
SHA51251c9ee8f57dfa789487acc3abb3fb767d6086953f699e9355a8e83974c47a9e5d9635dc9d2d62f29f035a1a3671a25cf87b8830d028f256342e458c9c169b6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45ccf5be3aaf35ff9bb99ecacbe7b00
SHA146ba2ebdabf67a53553925d6d290d47cfe3b9a5d
SHA2561089b692de52d4f152d4d2b7b78563dd6cdaa092d25bfc62a1039ca4fc66374f
SHA512a4f27877d51371b170ab1b8d0f97346d83e3af58dae7ba0d7ace5f6a4b0a67533342b45f6320345d521f05563b7e0b3f64d755503856e1ed09ff082757a61082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a76897c5db7e4cafb7c32b819095f71
SHA1a9c3f28120004f6b11a6fdd2dd96b3e4e81c2573
SHA256ae0a28724554aa5d64aaee7ffbd03913e378cf91b7517af0cb21c930fdb2e6ee
SHA51225dd200385180e98eacbb8cf0d33e80983f8062cb6cdef7e35ee5a1de460ee6a973d269a3751a9ef3661c29ca1ceecba555ae1bf6b861f635ca5b28346c98ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55747de56566d9141b3ccf4c84d0c080d
SHA1d41d321f6d160140435e90abb8b09ffc79ac283c
SHA25608907fbf35b9b4a4bb94377d4f754dea5efe3ec73e0797d7a3a36973ad6a21d7
SHA51214096dd21a98168d874ee539a149aab5e26b7ae07c50effee92d8d8068aa14f4596b151b482f22504abe59e761530683a5435f488e652d85a8154a6504bc4c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567adf553e7b7a389942881326447ad28
SHA1f50642d4ef53a705973be4aae76b9f339ebe35ae
SHA256fa2f0c3ec7ec6edabe27300406f9b4de870cfcc4f5031de4bb2e9f89a2c0f341
SHA512fffa531c5ac11ee29e3a48b1af147de27af1145957db7464d170e049ae88fab98d5ac8bddf0d01dae275fae47dddf7208909197de9bfd328a1c5679311a2e16f
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27