Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
1Static
static
1b5aae06cf7...6e.apk
android-9-x86
1b5aae06cf7...6e.apk
android-10-x64
1b5aae06cf7...6e.apk
android-11-x64
1404.html
windows7-x64
1404.html
windows10-2004-x64
1SFStockCha...e.html
windows7-x64
1SFStockCha...e.html
windows10-2004-x64
1WebViewJav...dge.js
windows7-x64
1WebViewJav...dge.js
windows10-2004-x64
1calendar_d...e.html
windows7-x64
1calendar_d...e.html
windows10-2004-x64
1calendar_d...g.html
windows7-x64
1calendar_d...g.html
windows10-2004-x64
1calendar_d...k.html
windows7-x64
1calendar_d...k.html
windows10-2004-x64
1common_tts.html
windows7-x64
1common_tts.html
windows10-2004-x64
1commonapi.js
windows7-x64
1commonapi.js
windows10-2004-x64
1decode.js
windows7-x64
1decode.js
windows10-2004-x64
1fontsize_fun.js
windows7-x64
1fontsize_fun.js
windows10-2004-x64
1illegal_domain.html
windows7-x64
1illegal_domain.html
windows10-2004-x64
1insert_rel...4.html
windows7-x64
1insert_rel...4.html
windows10-2004-x64
1json.js
windows7-x64
1json.js
windows10-2004-x64
1json_1.js
windows7-x64
1json_1.js
windows10-2004-x64
1licaidaxue.html
windows7-x64
1Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/08/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
b5aae06cf771eae62f010f2db6f70b610445bd23147b5eac248414ec69736d6e.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
b5aae06cf771eae62f010f2db6f70b610445bd23147b5eac248414ec69736d6e.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
b5aae06cf771eae62f010f2db6f70b610445bd23147b5eac248414ec69736d6e.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
404.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
404.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
SFStockChartDecode.html
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
SFStockChartDecode.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
WebViewJavascriptBridge.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
WebViewJavascriptBridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
calendar_detail_live.html
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
calendar_detail_live.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
calendar_detail_meeting.html
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
calendar_detail_meeting.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
calendar_detail_meeting_black.html
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
calendar_detail_meeting_black.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
common_tts.html
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
common_tts.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
commonapi.js
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
commonapi.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
decode.js
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
decode.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
fontsize_fun.js
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
fontsize_fun.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
illegal_domain.html
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
illegal_domain.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
insert_related_news_7_24.html
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
insert_related_news_7_24.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
json.js
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
json.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
json_1.js
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
json_1.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
licaidaxue.html
Resource
win7-20230712-en
General
-
Target
SFStockChartDecode.html
-
Size
168B
-
MD5
0075186861e0a71e5b9b046daaaadcfd
-
SHA1
8d1f23e30125ded761b892ce939e167bdf24a7da
-
SHA256
69aef184af12eb631704c6f6f37f38bf1523b591981e1cce3198ad811eb37259
-
SHA512
a7cd0047a06ee8e980c9712a72d7ccf50148b13515215ead1a9547c7c14e813b0a3f2b178f8f673f77d1dc37e51819b683b4c7885785aebd13b34d0f1b108332
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081fc177b9287ed4a8181eac127bbbd690000000002000000000010660000000100002000000062ee408bb44bcca584ad293024ee2d01ee68546e76cd09061796914c81d67453000000000e800000000200002000000087f8e982dcbabefc88064f7644a78b67beefe89abd8c68ff124f0689044e16592000000024b1dadd6e6b2f67440beb3b76ed34e9b9cbbe92697772f8014990dcd0ec526940000000f09682426e1f26ac6794751dad72517087d0bf9d7cfdf7c07f793f183dc1f1acdec7e8a8610074f7ba289014f6c5fd89bfd7729f23b5af604af1ed97c2709825 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081fc177b9287ed4a8181eac127bbbd69000000000200000000001066000000010000200000008a83dce75aa0e82ce22923b2aae05db6c6c731c8508304fba16bd71f5a89c311000000000e800000000200002000000073ff0589f9acfe3d48fbe08b8375096b3035a36f89e28e53384d5190d82217b3900000004eb92395be03ec3ad0c021938c394acf8f351a6f359f8f9e3d1475e6b6c6e0582f19cc40ce050597daa53db3f788350977b34ef21c5755f5f74c44f59bb83138e326bcc276eedb61e9b45b49d042f1ca2c8fb58629107009417ea82df01f213418d7a31d2dff4f58461d16d7e9dddc30cfd6495940237d790ced2f5b13598df2169e5e20b13622d1b2705c18ab30feba4000000085d2de7252d409ec251323eab6ec897dde7e1188ba016b1d4ad2b8404a2a1437feeae54ca17cc11e9e206b62a88572197e27857a4b900a5dc2c9be7b3a84a4ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398298721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32D6DCA1-3BB7-11EE-A0A9-EA84BFBCA582} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b07807c4cfd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2072 1948 iexplore.exe 28 PID 1948 wrote to memory of 2072 1948 iexplore.exe 28 PID 1948 wrote to memory of 2072 1948 iexplore.exe 28 PID 1948 wrote to memory of 2072 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SFStockChartDecode.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ac87e2686eb4fe514e6a8b659ac18f59
SHA122813ca5d8c7be119ffbd1afa9b512a461d8e64f
SHA25695012ad42ce629a0581c5a3260d166681bfe1a23aa310a5d5cbbd74bd690e882
SHA512d5b93f40989205a9af07d4b63cf810e2ec3a794e011dcdcbeaa275398756dca873d2bb52f54dfe073b3e5b243c134200adeca828fcd0ee7c6cd2a706b0d210f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02fc3ee10281cc13582f2ef87286688
SHA1d58f6822fde64001aa59884f6b803f3eea4d67f3
SHA25674588c146f7f92df54e597d9606fc08d9e03e176b48eee6a6e9bd67203d908f8
SHA5127e94117691aabee0b0d50dde3f79112101cb22aac9a96f2e7333022dad56543f54d863e60b24248be5849e3b7d10e12b21c0e0eba6f3f4441e034b062aa94976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dffe6a767a69e6c05fcf1b34a8cc6256
SHA156ed588fb11826ed50f5769f31bee580d8a42cfe
SHA25678ab0c78708a7bfdbccb9452c0a83b2f1538ddfb7a840ff42100629f830b1df9
SHA5122207bacc4d2cebd22e3f086ee012e737b1603dff94ab6756175b751060b68c741fae87cc7064db4170f170c03c12f3e31ac64cd09c05997f80b4f298116e411d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cf8a1f0b28c85e628dab970d5d7adb7
SHA1d59ea2b1089741ce62f4b106d08a826f62560ec8
SHA2566097ff4198fa22cd1491dc2fb1a87afda18bf24e143cf906075195caeaea3f8c
SHA512a9db6fd755cfe8185075886f383fc47edc12f7c1658cfe78ff079b34bb85a9568a1ca58670530c1b70b7131d17bc2b793ac74f0b4e41f920ec22b53c9fbe9c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d7d74001c62d4e25b699286cf345c5a
SHA1a3d94d3636e04fa7031f4d36b2642c2be5fc1312
SHA256677fe8b025dfa4fbc6a5a76922559c63944793168228fb6ee408534b69d549e4
SHA5126ac21286ec65dc3723d88279753258d575f6fc3858ea7df973583e08264d1bea0060b75beea63f62f422693fddec1602adefc027301449bd59e4341816787642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5234fc5d1fc07d02075e64a1d75af0b48
SHA15e75552d0097bb6665b0736754c70e6dd64e7981
SHA256accb2e70b2815a9be5f3f23c889482aabaf6d9de12e2112e9f4cdf3678d390b8
SHA5125477161f4b37e25d36d64916e98892a24dfbc4938e6d91f112856cc5b046d1f45781a9ee410d78b53dea01460b050f4294dc7d2acf8ffd12d38b3d3177124012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a7c8818265dbe95ec638836d53993d
SHA1b46697a09aefc03bfa5c22a3affa6baf5f1add50
SHA2563caf9320f7fdc32d46d7441b33d3a0caeb055c753680febe679d715e642301e2
SHA5124dd76f845659563d2e02729e0d73cf58212f292ded138fd2aac476cd424a9d9ad00c1b3871c8cf952afb70ad29423c8b943e2a01539f4825814f556b33b93d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5778540f276631d23523e0b4e4d0fe385
SHA1585bac035eda70e24f3c0ea50b2fef89f61245a0
SHA256d57f314754128e68fd7c2c71a88f8b41837f3e000f005a72d3d458d2a24187c8
SHA512c5c4688cd0ff9f26c5f06fc2c5de8145c31b29f673cb27dda86b6e25a1b924cdd5e18b3f8e02b7660ddf97d1b53201c574ea2a551a23fbba4f38cbf4566f5a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bed32ccdc5f94f2ffb7cf4ae2dbe211
SHA1beab78bd395af2bbbe2157217f43811f7e6d5f93
SHA25682ee7f952059825f41a3cac98d89a6ee9a68371bed8fc633f0696a2dabed0622
SHA5128c893efa4c6ef2f7c59b08b2bce6d54f6acd80776f2705a9d0d49c5efcbf98b09b5d335c7808e20dbd3d79dd76a2a544e453429a45fdc7f28b5b3c6272194f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503dbade2a077f169911a98f5bec64b0f
SHA1468c3f6b470ccb753f80d4098b9a3f2f43f39d5c
SHA256943c31cea3f3724a0871bb400da8821efd57c6f46bb045f314313fb0a3ee8f46
SHA51238f9e84bb5bcd286e5e6fd63d85e2ae2b25df57757a7d062470b12e7aebe45b02a0d39fc42398f0b6ed0ca9d179ef10e20d6e8dc053549595f81011e7aadb229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f4b1ba0c8ce2cf25d2de9f94b8b6b3b
SHA16bd55a2db783a18e28bd071f41e7cb86254f7d20
SHA2560c6f1ad6944b278f717eaaac3bef17708af006d04a4b9126a99ed873e6c0cb7b
SHA51283cccc3c1245488a47687fb20f8532618adfa15561d367671311d8314ae65f558666891e6e6528ca5bc4910504f1c362a32746dece376bb7b21828c065932e50
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27