Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
1Static
static
1b5aae06cf7...6e.apk
android-9-x86
1b5aae06cf7...6e.apk
android-10-x64
1b5aae06cf7...6e.apk
android-11-x64
1404.html
windows7-x64
1404.html
windows10-2004-x64
1SFStockCha...e.html
windows7-x64
1SFStockCha...e.html
windows10-2004-x64
1WebViewJav...dge.js
windows7-x64
1WebViewJav...dge.js
windows10-2004-x64
1calendar_d...e.html
windows7-x64
1calendar_d...e.html
windows10-2004-x64
1calendar_d...g.html
windows7-x64
1calendar_d...g.html
windows10-2004-x64
1calendar_d...k.html
windows7-x64
1calendar_d...k.html
windows10-2004-x64
1common_tts.html
windows7-x64
1common_tts.html
windows10-2004-x64
1commonapi.js
windows7-x64
1commonapi.js
windows10-2004-x64
1decode.js
windows7-x64
1decode.js
windows10-2004-x64
1fontsize_fun.js
windows7-x64
1fontsize_fun.js
windows10-2004-x64
1illegal_domain.html
windows7-x64
1illegal_domain.html
windows10-2004-x64
1insert_rel...4.html
windows7-x64
1insert_rel...4.html
windows10-2004-x64
1json.js
windows7-x64
1json.js
windows10-2004-x64
1json_1.js
windows7-x64
1json_1.js
windows10-2004-x64
1licaidaxue.html
windows7-x64
1Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/08/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
b5aae06cf771eae62f010f2db6f70b610445bd23147b5eac248414ec69736d6e.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
b5aae06cf771eae62f010f2db6f70b610445bd23147b5eac248414ec69736d6e.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
b5aae06cf771eae62f010f2db6f70b610445bd23147b5eac248414ec69736d6e.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
404.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
404.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
SFStockChartDecode.html
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
SFStockChartDecode.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
WebViewJavascriptBridge.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
WebViewJavascriptBridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
calendar_detail_live.html
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
calendar_detail_live.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
calendar_detail_meeting.html
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
calendar_detail_meeting.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
calendar_detail_meeting_black.html
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
calendar_detail_meeting_black.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
common_tts.html
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
common_tts.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
commonapi.js
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
commonapi.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
decode.js
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
decode.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
fontsize_fun.js
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
fontsize_fun.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
illegal_domain.html
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
illegal_domain.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
insert_related_news_7_24.html
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
insert_related_news_7_24.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
json.js
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
json.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
json_1.js
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
json_1.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
licaidaxue.html
Resource
win7-20230712-en
General
-
Target
illegal_domain.html
-
Size
5KB
-
MD5
282bc362aefd810dd32fc3db205352a5
-
SHA1
4907d358d07f4538a2867cb37ca9692b9c60b7da
-
SHA256
69eeb53e42abf592cc44fbf68a1f5debb82135bfbb93afcbea156efd4d5d705e
-
SHA512
cfb7b67aa6c25b284a5a4fa0f4a1c296e44c4da83f48825e871d69bfc72d4bb8adff8c555fd071ad9ebb5967861f539d1942bc60ce85e6776c7a9759d42a18e9
-
SSDEEP
96:CJydFMTYoiSy7C8FMCK+vYQ05EAzq9yYqVxK7cv8HdCiciELPZdHnOy40dHu:CJ2uy7XFS4YQu/YyYqVxK7cEHdCicjPq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C6EC171-3BB7-11EE-8C62-6AF15B915EED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398298711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000c46a6c99419a97a978fcb252bb92f64c0a9f5687283a7655226dca4456de9f22000000000e800000000200002000000048e775b25d98d4451e61ba4af467f204cad9c30184393333a861a0d3f83bc46e2000000047c67bfcafad149fc6a432ba75fcbb7e30619b7190515951e1a21b9ae0fcc188400000002df317fa625aaa920dfb8917033d4498f4d6f47f1cc8731a4465f3a58a3a7dd60ee877fe3cea8ba65c3747e0fd4a885064d262c4e2e4b3cbf0f19ee84f8e7f97 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806f4001c4cfd901 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 844 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 844 iexplore.exe 844 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 844 wrote to memory of 2988 844 iexplore.exe 28 PID 844 wrote to memory of 2988 844 iexplore.exe 28 PID 844 wrote to memory of 2988 844 iexplore.exe 28 PID 844 wrote to memory of 2988 844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\illegal_domain.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c233fbc53ef753d6aea7efe3e4dcf569
SHA106cdba09f690fcc900ab16e01619f8e244eb421c
SHA2562b657dc597d355dc9c77e4a796fbb3c8941c442cab6186f8aec18abac85fda90
SHA512acc741111945a62db4b7b5457a9cd5c3a1a1f9c76b05938f764812ebd2972ea74973dad2880d21adb84f2845a10482ade61f05e4f1a0c1d80f714be4b5ba2048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7f4a653705c9a15b7b5e312c99240ce
SHA15415cbc5a05465a7b426822670343b1c6ce049a4
SHA256fdf561dc512e16de5699457e5f1d7d31f23a0a87450307bfbf409beed96fa538
SHA5124186919eecd194557002c83ebefc3fa8ff406f2338aa349ddd5f41c18a69329665a08bad7039586c586040155b58b9ea05fa8b27bd7a4f7017bd9d80a24569c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b25df7673e1236ff242c4422ad947f39
SHA128e4aa29ce07bc16abbfb447d05ba842b32f56e8
SHA2567b9d0ae520b8e8f2127945eceb2c02623a6c226ff4a28b3bad6fe3e209b6ffa0
SHA512a9606433c5a8fe962435a1c75e9c62356ad5d3d0aabea233c94b7e627bcb380ca4530942bc64ecd1ec986eff88634113e979a4484d630c1c057f8301e7ea6c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5564ee9cb68fcccd4b195e1686912375f
SHA10d506125c674bfee21608d19f06451b8a2e46f0f
SHA2563ffd97610bc89b23077650cf91c2c44052333bbe315c10832b00208544b3214a
SHA512715db08681d139fbb163e57bafe8a5cba4ce71d65d925847c19f4ea177cec1903cc44419b0fdc1df97f5bc31db0e0185a4f1ff301fbff5d16cf94e49cd719aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520e6ffe730faa39ec67f7d95c54ba719
SHA194a476d11915f34f56cc1126fcc23ec3fd3da513
SHA2561792c5e2436632ba7057632f3f9434562d0c2577836316f254b776c727efa824
SHA512e9495503df66576e5c0649179e43bea746773f4d7aa3723bf766a9cdac9acfd14af18fec918e24b2848c451e01bd75db0657e090840f4cfbe79a6adf1452fa6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f945ec77fd44f4351d9795e63ec7b66
SHA13460c7660527942f6913d919af201f7d0b5a6249
SHA25615d2150d0fec05d33cd823ffc9ba86df844759e410254a9e0b39766f0f708249
SHA5125335fde81df5e6257b7487b3de5eebbc41c9cff0007ff4822b1294b4c04422c96cf1a343796a73dcb9390b68e383881595d11bcae572fe064cb98722e08bf429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db3c5614f8bf8e3793123daba5a46047
SHA11d255f4a33fc38841cbf0a1f8937bae67a5af5a2
SHA25625b5ab89a48b857ba9b89d93eb38d3c7aabaafe74fd3a2adecffe876e88abc50
SHA512e662d6a5652d35de96d40e6ead41954693f806122a1bd4c2eb4397ceba535c24f71f7ff7f35e5af4745f9cd7faf7d4c73f40eb16f82dd8b77c6aaaefd6dd0cc3
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27