Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
7612122f55d...cd.apk
android-9-x86
10612122f55d...cd.apk
android-10-x64
10612122f55d...cd.apk
android-11-x64
101bf84a89-2...c0e.js
windows7-x64
11bf84a89-2...c0e.js
windows10-2004-x64
1ad.html
windows7-x64
1ad.html
windows10-2004-x64
1aps-mraid.js
windows7-x64
1aps-mraid.js
windows10-2004-x64
1assign_lab...l.html
windows7-x64
1assign_lab...l.html
windows10-2004-x64
1blood_gluc...l.html
windows7-x64
1blood_gluc...l.html
windows10-2004-x64
1blood_gluc...l.html
windows7-x64
1blood_gluc...l.html
windows10-2004-x64
1blood_pres...l.html
windows7-x64
1blood_pres...l.html
windows10-2004-x64
1consentform.html
windows7-x64
1consentform.html
windows10-2004-x64
1diabetes_r...l.html
windows7-x64
1diabetes_r...l.html
windows10-2004-x64
1dpr_report.html
windows7-x64
1dpr_report.html
windows10-2004-x64
1dtb-m.js
windows7-x64
1dtb-m.js
windows10-2004-x64
1edit_insul...l.html
windows7-x64
1edit_insul...l.html
windows10-2004-x64
1edit_label...l.html
windows7-x64
1edit_label...l.html
windows10-2004-x64
1edit_medic...l.html
windows7-x64
1edit_medic...l.html
windows10-2004-x64
1edit_track...l.html
windows7-x64
1Analysis
-
max time kernel
138s -
max time network
223s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
612122f55d5859458323f874ac961cb46291de4359284feec5bd6181d8b163cd.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
612122f55d5859458323f874ac961cb46291de4359284feec5bd6181d8b163cd.apk
Resource
android-x64-20230824-en
Behavioral task
behavioral3
Sample
612122f55d5859458323f874ac961cb46291de4359284feec5bd6181d8b163cd.apk
Resource
android-x64-arm64-20230824-en
Behavioral task
behavioral4
Sample
1bf84a89-28f7574e191c74305c0e.js
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
1bf84a89-28f7574e191c74305c0e.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
ad.html
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
ad.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
aps-mraid.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
aps-mraid.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
assign_labels_local.html
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
assign_labels_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
blood_glucose_entry_local.html
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
blood_glucose_entry_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
blood_glucose_local.html
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
blood_glucose_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
blood_pressure_entry_local.html
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
blood_pressure_entry_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
consentform.html
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
consentform.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
diabetes_reports_local.html
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
diabetes_reports_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
dpr_report.html
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
dpr_report.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
dtb-m.js
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
dtb-m.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
edit_insulin_local.html
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
edit_insulin_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
edit_labels_local.html
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
edit_labels_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
edit_medication_local.html
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
edit_medication_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
edit_tracker_local.html
Resource
win7-20230712-en
General
-
Target
blood_glucose_entry_local.html
-
Size
1KB
-
MD5
3189fa9ee5e017a8594ea3bfd6b979c9
-
SHA1
36abf30ffc1fa35bafe1151234e3a9196320452c
-
SHA256
b34900c40fe1d76a24c116b4c2c1dff4b983a3ca6c355c1d3c94c7a088f7f2f3
-
SHA512
2a0ec7f8d35f40cdb7120b70d74064ce4272fc75499d5fe74fd839e25b4d9bc979a826c69311b49fe2b3647355bfd86d583e879637645e58d4c11c1d3c848119
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399249587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b14723a8e389564aa88fef2378dcfc63000000000200000000001066000000010000200000009d3c8598e9057b2a966238cd15d86151ce4db002717d55a38d2632efbd8b39ae000000000e8000000002000020000000315645f40231a816ed435fcb9044b991457a1f52f43b4f10fb9ba8dde99a8010200000003f9ab291023bd8e88be256e2aec7587770623cd465671dca3908ef6fdcedc98940000000e67d2c865b8ee9b994016b57ceba76b91fa1bf5d92142f7f4f4cf8bdcddcbccf06d5d15ef56ef242b324bbde0656f3bbd35010b118ce4e709c0ad5fef4351f79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2092cd026ad8d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12FF69C1-445D-11EE-B469-EE35A7B3029D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2816 2708 iexplore.exe 30 PID 2708 wrote to memory of 2816 2708 iexplore.exe 30 PID 2708 wrote to memory of 2816 2708 iexplore.exe 30 PID 2708 wrote to memory of 2816 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\blood_glucose_entry_local.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af02e5907cd159d0fdd1551df320fb67
SHA1523f58abb77c704bed6103dad2552da16d8e2f34
SHA2561a98f729edd7cdca55177f6195c6da932f470010d333cef14131a22d7f5b5c43
SHA5125834b3619e6a8777116db0e96d8c20bb492792cbf6cd9d667d352df18188e9f3ea64b55e83bd0e921aff2aa3c099e6a885b9792e63d631ad243cd003ce6ab006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597570d4a5056c9c93ef4fee01db86aae
SHA126c879de8dd67128d23a949e2483ed614906b9eb
SHA256b3f3326b14736d9d8c366574b0213586ea446ff4b9c22f801e1a86f5857aecc1
SHA5124f1fdfa6a2c970ec264e544d60cae5902631ad6d465d39c13d5a9ef25bc719b1128d1cb68460cf0b2838ca57486ef98fa170d8e1520e1477a4133e8a927bca2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585629b7868d88a1dd5f4e18cbc3219c2
SHA1b0d8239a7e4f4283251cd0ba7f19d0c4dd2af384
SHA2563e2e427fd2b69332fcd13c63fcff6400e8444ebe375c4ee65703111a26d9fb20
SHA512c7e7f46249143d843ba244937d3f3bc2a1d2c8da116324e0917ff914b67ab0b5f9395e6bdf1012d66eec164880b944a5f6b3bcc92a1dbea72c244095cad0a95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d0a67709e69e636d4ce3ecd5a1c1b6
SHA1fba468241c5c88f9a9a92aab6fb2a5e23b6a18d0
SHA256258f10a83b6c74edc1374baaf9d44f5eb24c50e214203b40ea7d75b02389ec3f
SHA512ef52850fb524850112104d5f656c0e9559e2080511b2cd141473059839911fc29b24f3fa2ea573c3ddbae41b7beedb4aef9519b86542547b48abb2972a543fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bccd101dad7f175c61994f2d1a6bd60
SHA1e4eb007c85d137ce64bbbfca127922d0cfdcb2df
SHA2562e0d294a61773e24610b3f4145c62a57a6990f2d89f39695f9a268c5fbdf44dc
SHA512a60e0aa2ffe1a54bf7779a132358fad7b02caca829f060124301466473d186127d4227f9aa71ddef793f7e4c31eec6774be6484e3a63adb6c4b8821225b2f121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573a255d3fd36b81730e18f68294b248a
SHA1c4910b808ac2dd74917be81fe10963c2609b4b06
SHA25657ce970e06e0d163c16cbd11b0fe685165b65073593f3837a1df278d5f1bfd67
SHA5124145761e17663aa20fb9ae8411b9ef0860ccb6d5f73278285ee3b098eba513547cb3221b391e9313c77a186573b78918443c13eee270cc62ea5da5891f36af5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51886800dce5791ced441788bd82ed937
SHA14f7eae8b8441e81cbfa913581fd24c8dd15fd77d
SHA2565b4728c0c9ae4a64527e3bd4dbb70bc65383ee37ebe5dd1f59f5a3c1fefb3c3b
SHA512a646ad0ba821a2af136f7600a152cc703de04522581d0203735491658f331251242f78f9f71aa9425761671b57d9b30f733436241b3ac3cf393ce7b6b7d8c7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5270ee80ed4a56af85adef27207741bdc
SHA1e427ae764c1febe5122c0076fe2eb7bbc9a191e0
SHA25678f9cfbb75a72087f8c20b31c9d0e6b9c03912f6c3448a0c9c4c8ce2d4bdf62f
SHA512ef2dc1cd1a6bbf5d576534380b7327798ae9657de67a77a0e4b90b89671cf68994d9528835dd5d371243a05d3bd9a2ccfe4810a9a272d1228f09605cc65123e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57158c3b1a4074625f2ae322d089af3b4
SHA120a89bc767873af54488051cb0bfcc049903db51
SHA256102ab2158370396641b3a51acd5df1fabf98ad1d9ec3028bd064b287aa2c3dca
SHA5123e2c2bcb49ad97c5403526cffdf1272fccc267ec4d1c1cdbb3aa1e01e4ef9cc149469bd78d0d551ff68485b44be58304ff8e97911b698d7a88c13c33a52c9518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b29e6af69626b42a704477e421e6c4e7
SHA13565451f106a308318f29c46a828355ad79e5bb3
SHA2562ef3c2a2330ad7d52ee484990cf3bb262f5c30356239d3945d62cb6dfc4cad48
SHA51244e6b70b60b23b444de90fbd9840d76cf1dd86dbcff2b38736b2013cf5a1cb2eff19ec703127d800d16d7af48bc9d32d191cd4c85e3966443677c7ac214c2fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d13aea0f8dd2b67e3d61392ec6eb686f
SHA1e96234e156a0d593582360a406749c15ad4846e3
SHA256b291650380084e00c8d9aaaa78e4f2f7ac3efc9c95bcdd74a6b4d1ce4b76270f
SHA5126795f2136e0923e594a03a28bef0535fdb130550340bbefe991c5754eac7af4ac492df72a6533ddb232351ed917e7a17827cf71551f8986658900092051ee4ed
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf