Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
70bf73ff0ac...f5.apk
android-9-x86
100bf73ff0ac...f5.apk
android-10-x64
10demo.html
windows7-x64
1demo.html
windows10-2004-x64
1floating-s...ed.xml
windows7-x64
1floating-s...ed.xml
windows10-2004-x64
3floating-s...te.xml
windows7-x64
1floating-s...te.xml
windows10-2004-x64
3free-text-...ed.xml
windows7-x64
1free-text-...ed.xml
windows10-2004-x64
3free-text-comment.xml
windows7-x64
1free-text-comment.xml
windows10-2004-x64
3fyb_iframe...l.html
windows7-x64
1fyb_iframe...l.html
windows10-2004-x64
1fyb_static...l.html
windows7-x64
1fyb_static...l.html
windows10-2004-x64
1maction.js
windows7-x64
1maction.js
windows10-2004-x64
1menclose.js
windows7-x64
1menclose.js
windows10-2004-x64
1mglyph.js
windows7-x64
1mglyph.js
windows10-2004-x64
1mmultiscripts.js
windows7-x64
1mmultiscripts.js
windows10-2004-x64
1ms.js
windows7-x64
1ms.js
windows10-2004-x64
1mtable.js
windows7-x64
1mtable.js
windows10-2004-x64
1multiline.js
windows7-x64
1multiline.js
windows10-2004-x64
1no_sleep.js
windows7-x64
1no_sleep.js
windows10-2004-x64
1Analysis
-
max time kernel
138s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230712-en -
submitted
26/08/2023, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
0bf73ff0ac2e81d23a005b08f8670249528170bfbb249e38a5af809c6a56c7f5.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
0bf73ff0ac2e81d23a005b08f8670249528170bfbb249e38a5af809c6a56c7f5.apk
Resource
android-x64-20230824-en
Behavioral task
behavioral3
Sample
demo.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
demo.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
floating-sticky-note-selected.xml
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
floating-sticky-note-selected.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
floating-sticky-note.xml
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
floating-sticky-note.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
free-text-comment-selected.xml
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
free-text-comment-selected.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
free-text-comment.xml
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
free-text-comment.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
fyb_iframe_endcard_tmpl.html
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
fyb_iframe_endcard_tmpl.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
fyb_static_endcard_tmpl.html
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
fyb_static_endcard_tmpl.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
maction.js
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
maction.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
menclose.js
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
menclose.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
mglyph.js
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
mglyph.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
mmultiscripts.js
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
mmultiscripts.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
ms.js
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
ms.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
mtable.js
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
mtable.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
multiline.js
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
multiline.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
no_sleep.js
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
no_sleep.js
Resource
win10v2004-20230703-en
General
-
Target
floating-sticky-note-selected.xml
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b0210000000002000000000010660000000100002000000093cb9980743d26bf34778a49f3266dedb204d48c60012dc15616a21a368c99b3000000000e8000000002000020000000392e0eb0b58777dd64c4c7eb28109b5834dcd49f43d1411f126685ed80042516200000005172b17db0cdd1a68c1b295756f0e1bfb9687e2424ee952d27be94a04733247140000000bb8a58e6d1d32828bc60086416be2c76f98b500d165615aebcc50782f7d8f9b3bea5c6e7fee7024c1400ff8ac08959c032d150589e075303876da212d48691d5 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399249334" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{839D05D1-445C-11EE-AAA1-4E44D8A05677} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5029895869d8d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2904 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2492 1580 MSOXMLED.EXE 28 PID 1580 wrote to memory of 2492 1580 MSOXMLED.EXE 28 PID 1580 wrote to memory of 2492 1580 MSOXMLED.EXE 28 PID 1580 wrote to memory of 2492 1580 MSOXMLED.EXE 28 PID 2492 wrote to memory of 2904 2492 iexplore.exe 29 PID 2492 wrote to memory of 2904 2492 iexplore.exe 29 PID 2492 wrote to memory of 2904 2492 iexplore.exe 29 PID 2492 wrote to memory of 2904 2492 iexplore.exe 29 PID 2904 wrote to memory of 2824 2904 IEXPLORE.EXE 30 PID 2904 wrote to memory of 2824 2904 IEXPLORE.EXE 30 PID 2904 wrote to memory of 2824 2904 IEXPLORE.EXE 30 PID 2904 wrote to memory of 2824 2904 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\floating-sticky-note-selected.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffe1879ccd11c900c4f8dad4cf315160
SHA1d3095b29b92b7a801fa71c1873eb154ec645f843
SHA25625ffc686fcb03743b1b0835395e14d7b771672b6599138134b3148bb2ecaa4cd
SHA512f4b03c5452e9b2533b97d953a4976c377a67ff3e7b7e379cd8c2cf8a44230218d58bc5212547a61bc69f65a2a1cf1a1c5279419a78f5d2fbe0cf03e243bc449b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6bcfc424656a0b53b4c1f1af056ae19
SHA162dbe51880598922680a3ba3c7a4b4320ba6e5f4
SHA2561e070d198409076c8b5fb041d2ff2424b996114fb183c14cc241c45d959ee47d
SHA512df3986407160f50167cd55cb0fd40564d3f3eaaecb0119162c8cf77063a4f8788a0e84ed4e9bc60d926b9c21de0ca4bc051e4302ba20271de5137eca09929790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516ef276efcf7905f25c42f168fdc742c
SHA12a6a8bd17453e9947d3ba92c1a5f62e81e40202f
SHA25625f4b1dd44079647145712d30adad539fab01a085739de91400285dcfd6020d3
SHA5127ac5e586791ea7e158eb54d83661caa43a4cec67d95f6abfed734f4e4c256c660049b7ff19005aea380613a136bef0bc29e8ee723c7d35ad84489d600c6be4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553bba9f8b5aeef79c11c8983bd8c6fca
SHA10072905317ba009d4bd933d7e3453cbdafbd51eb
SHA25653af3c4dce76734f645a77d37bd26fa015affcdf180ea8802a6f5d1a775fa355
SHA5127e3f12030514ac93208ad9bc36ecac51cef3dbcb1b732574097d597e894a902f9a3bcd8c0ec8ded506e7e7289fa5a9e459a29124255c00ae4e06cf144f9d9c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59731672f1d94968263b6abc9370b7835
SHA1e7fe2716a31b75cdfa00fb7e36056156f192dda3
SHA256475cc4b82fe8103072b3a92d3ee348e709fc9e7251ff82398c6d67f78cbf5d9a
SHA51244aa1f8685967ec2ad76d0d19e30c0ece33110cb678f8d9de8471a58f8c7fa89503e797a83a3b0cdc062d66efcefc142eba8cf1617b50e2a1314e39d0bb93ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9486c2e08f6a2320402cdf629fdf95
SHA1a841ceed21cf61e33aa921c9da87a607b1553cea
SHA2566a62f6a07b95f2dabc8982961ebf6ff5e94392e2dd63892f544c641de23c4e51
SHA51245dfb022780b87a01d0d4f1d3510ea2b3d84b5a23580bf57dc33c6c5ffa800bce293a2d68461edd34b5192a83ff844d955456e1ef41e5fb718455765b7ccb7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c83ed1262bfb2c080e3fb60b07d15ff
SHA105b76823c730c754ff363fd3d0cc7cf3049f5b7a
SHA2569fc95ba9cc72d3a58d1e1e7a3efa2ec2a7d4b18a338fcf910e7aff386b7a1f56
SHA5129ebbe523c954d69cf83178dccf0a695c8f14b393d4d59f105d6333eb81e2ec2d2db0055823b09a89261ef93736eae67e4b4d41678cd15143c965222b548cc4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a2e5c99de1e60112b790495d7a0d03b
SHA15f381821cb3b6004df815cba0889459f8a3b3213
SHA2565ca71206550217f35088d8db97f5d554492958f53cee0ab30f389e67cc89fb58
SHA512b99e66e61e51cf07758c33d5782614bace481c6d59d6281e7248c8513c95f8b380a2a955bfc55634d6eba378c89d4527a46622a1567c68e57f6bb60abd24b237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507701a631e505f2ea9c2003c244caf14
SHA123ce339ec39983f2ae7fa883b327dd42210e6729
SHA2565a8eca66310270a7d29909aac230a04ca5ac369739ba4d88cd0325a091a424c7
SHA5123dc4f56182dbe051385b4a3a3a89bd11e7e4ab0dfb2efd425da5526a86fd2e2d80074446812b74db30498c35e164c9d4c0827d01d434853e2622408eefde10b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf