Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02/08/2023, 13:06
Behavioral task
behavioral1
Sample
Trivista Dodge City LLC Invoice 8095015 due May 31 2023.pdf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Trivista Dodge City LLC Invoice 8095015 due May 31 2023.pdf
Resource
win10v2004-20230703-en
General
-
Target
Trivista Dodge City LLC Invoice 8095015 due May 31 2023.pdf
-
Size
195KB
-
MD5
06ea22ee0616a93f9d9fcc63bbfb55f0
-
SHA1
6ae3512a6766bf1298228fdc10a6c60b45b92587
-
SHA256
a0795d3cfdf1038ff9e92eac0982131c5c8235c9751e2873dbac3b7fa5a9376f
-
SHA512
1911ce9c09e0c7213d2d5f3f93298b7dbefac8aeb031b217e134337500c5a48ce158107373784d7c740d1a2a4ebb43afb00573a2b02acea900551330a73d970d
-
SSDEEP
3072:xgKsxEOQe7lMlhGd8PDHCqbs0T5T5vRyDDtOtBPxmQ+nilX0U8xoKjFkCQhaqVs:1WCexMlhIE/I0TJmDDtOUQ+nYIx/f
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico AcroRd32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BA91DC1-3135-11EE-8A8E-CEC9BBFEAAA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397746629" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603c0b6142c5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b14723a8e389564aa88fef2378dcfc630000000002000000000010660000000100002000000043bf4220de17705666baa77e4033307d7f452b2d16ab6e402731831f372a65b5000000000e8000000002000020000000fff7c9170ca6d189ce1075eb0eeb3d2b7645dd6c9974fefea18fc5704ef9977c20000000e1583a8a507439102c2242841c169639aa1ef25b1ec8b00cb0234020ea4048fd4000000019f0b3989e20492f4242d3084342872643d3f17f4663a53bb7db1f30656892183692a9e2b659bb73efeb53351bdfc1116582d879c08d330ac492baeed50de69c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3048 AcroRd32.exe 3048 AcroRd32.exe 3048 AcroRd32.exe 3048 AcroRd32.exe 3040 iexplore.exe 3040 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 3048 AcroRd32.exe 3048 AcroRd32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3040 3048 AcroRd32.exe 28 PID 3048 wrote to memory of 3040 3048 AcroRd32.exe 28 PID 3048 wrote to memory of 3040 3048 AcroRd32.exe 28 PID 3048 wrote to memory of 3040 3048 AcroRd32.exe 28 PID 3040 wrote to memory of 1592 3040 iexplore.exe 30 PID 3040 wrote to memory of 1592 3040 iexplore.exe 30 PID 3040 wrote to memory of 1592 3040 iexplore.exe 30 PID 3040 wrote to memory of 1592 3040 iexplore.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Trivista Dodge City LLC Invoice 8095015 due May 31 2023.pdf"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://urldefense.proofpoint.com/v2/url?u=https-3A__mnhrb.lovernive.com_-3Fewg-3DwtctfbWJyb3duQGVwZ2luc3VyYW5jZS5jb20-3D&d=DwMFAg&c=59WElTcIEwbBjXQe6gMr9RyqhrzJYRWAhv5h0b8rPQw&r=RHcNDwnBFGWmlG4WXI_8cNvrjBLzYnLTlFrd61W9QaY&m=4iv_9U1UYgtned3oVTyyva7RQsbYDdZYKGPmBTOBxoy14GEj5D3WYgYPY0Jw3ImB&s=TyauxFT2CYF2NlhzLqeK076IHo6e5PUAhqab901lWx0&e=2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd2e233eb0dbdf4e007a8a99d849d58
SHA1febd4409bf6705a67765f6880e7d96ed9b2f8382
SHA2569b4c2eb0dafc10d1b6877edb02ae31d6e5a738e06d0c9263bfca05b97ff66ca3
SHA512bba6eb1288efe25da8bdbc5f96279fbd0429be8c4649b7bb90e080f558f572edfe87c9f06c60afe75b7a071211711c86e940ed2cc822be772ed196eb4ebe010e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d41c3e39a1374f5628c5ed44234f6048
SHA198153e02f9cff1780218f6b4b9844ecda7d9a984
SHA256cb93abf0a6a1f93d64c8bf049439682e90704f527843c96c4324f408e99cf987
SHA5125bdcd64db8f33492c13890ce960d0bbe701839ae3d1eee1d892899945d0331d6d879d079ae6c20814abce2134f90c4a2964362b1bf12f3bd13a3cc56ef07096f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbf61e3caadb829d826ace2d8a164e8c
SHA1b0701199ab060a7ce8b285425d72a2db305fc628
SHA256eff6910dd0e9d3e49efa17b4d04d664ae54f14715ef479257891a5059eb6df5e
SHA512a2c06ea737f5a7cbcea6c75e3922ac317fc6efecd4fab629e37974675d2998de982ddcd54417889e0aa27d920138eb545bdd2cc6931c7160657842c7f6b144bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af96b64e9e1cdf42ff7fa268f756573f
SHA1d156ec0c482e8e7cf239165a49cab4ab95aa5da3
SHA2567f9ce889fedd5c47dcb0d36703dff1a1d76af9a5dc148e4884323654ffd81073
SHA5129169662b1d6c302be4bfbccd4bcfcf22db85fb8e20c1f243dd3fce3eeb8a788e1bf359b3b21745d2178ea18e6fe3282ea1114c081fb32799f36c86e7a1c6df5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e1d3bf0f362e23a2f50b511cced8c5
SHA1654807670b61f397b880e8d362bbb3065e1a9609
SHA256e5e125c50f45c296049a84ccd84686069aff02e21d721b2909110e5222ba99de
SHA512aec1a810522e7d236a1b6adbe969b09ac505c279709225ed3881073fd925d8884d74546f872194c577bbcd51229181a0c1894318751afcf3ffd7620e463c81d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56687f8c6d95f339fe319e1904faab0b6
SHA139873d811e739e1aef7841a1647c4aca335b8b83
SHA25689e49d0d06f9967c8270ec421a858bddcceb30e8f8f914699f151320cb123710
SHA5125badafe59f00a114c7648788f54736e399a6e03ee4390b8ca2409b0713ff8e1e02a1eb9206ba62f3601f0355b4346c0d2a15de4499b0c3fb1d94813ae7065cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffcb15a5656f561f1d83537856c13ae4
SHA1a0c185632822ecbd3abd6d1c18e273e71dffb3b4
SHA2566878d9a252663b5d4ad0f8aec5579879739f38347a761cf22b648334cf1e6b89
SHA512e168e2350c8d2d4651340d8437f7d5893f3d196d6131502479b6b344527f0c85d7a6f325d749860d7580012bb818719dbcfdf78b3bdd889b91b17d13512794fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5690c7ac4e585482052eb190a283d098f
SHA15276e61a0d76ac063090ff1478f8548445790bdd
SHA25696ae20658e8ff705b87ea76a4457c16a10de7c1d35548b466d50c9079370e38c
SHA51259091d9eef648a0a3c65ba5cecc5f0b5d2289aeae7fb9cde5b53df82b273bae915f37f39e6c4ca41d27f1244ee1fbb98bb689e834449aed636b7ba5c3d3e2f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9f707a31310e1b34c0bd792dae9aa9
SHA12bd400e1ccc0162e8c84375b0d3b054c2388ab1b
SHA256feb390486ed73fbe1afe516c301706bd59c7229e3613b87bc930e1722926b5b1
SHA512eb75c6d33b79a902961284010a4236155bc1eabaa79102db44d454ef6405441c4a13e08087a9b516951b20fbdedaf72ef2ee32c7d53d01c973e0681e7768a1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a2251a83af059f5b670feb24aa85673
SHA1397916bf01c86e5fe230f6f02b24dc9f8ad7ca68
SHA256ea8280937080f6a5f9701dd11d47936a8a1a35762c6b39c9c92fe3b08a2a2f54
SHA512bec87ee0b8c1f0539b32d548c8d81d70fa8db5c600a97b6b31430a83fecf5ec09b8d20e2bf5cec953380d788fb91cf6986ecade28d6b12c7016bb306f99bfcf8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3VKWFGCX\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
3KB
MD50a6a4616f9bec290edc509abdbe48585
SHA10047d51af361a14037a9e07ec23fa83f07666597
SHA2560888e250f3bddb9f52fb037ac83a4edc3e7daad9a5825fcdb1edc1b288d802d4
SHA5123bcc48ae11380f9762929cc3d05d614c1f4b35ecf2e5104b7e46683446578b96d6cba778e34a482197220b5dd2fe579b02b3978e0caafeca117f1e8c7a87f06f
-
Filesize
601B
MD52b73949b0c1b75d6c53b0594e81e33ee
SHA10692cd1c138a8130ad6563ac79d6eb2dfe08e22e
SHA2562cd2cc4a72e35d640d3cb05f815d084bf2102c8b93e289697d290503ae377360
SHA512f21534ed2a513d5808cae808853d0304cbde19ee59c19f511db2ac921f2395bfd71c91576bbc984696b509d8af949a2a36914205112580b3940e5473adfcae51