Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
717e7c53050...0b.apk
android-9-x86
117e7c53050...0b.apk
android-10-x64
117e7c53050...0b.apk
android-11-x64
1.html
windows7-x64
11.html
windows10-2004-x64
110.1.html
windows7-x64
110.1.html
windows10-2004-x64
110.2.html
windows7-x64
110.2.html
windows10-2004-x64
110.3.html
windows7-x64
110.3.html
windows10-2004-x64
110.4.html
windows7-x64
110.4.html
windows10-2004-x64
110.5.html
windows7-x64
110.5.html
windows10-2004-x64
110.6.html
windows7-x64
110.6.html
windows10-2004-x64
110.7.html
windows7-x64
110.7.html
windows10-2004-x64
110.8.html
windows7-x64
110.8.html
windows10-2004-x64
110.9.html
windows7-x64
110.9.html
windows10-2004-x64
110.html
windows7-x64
110.html
windows10-2004-x64
1100.html
windows7-x64
1100.html
windows10-2004-x64
1101.html
windows7-x64
1101.html
windows10-2004-x64
1102.html
windows7-x64
1102.html
windows10-2004-x64
1103.html
windows7-x64
1Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31/08/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
17e7c53050f7ea111b2f4d71b553625679eb185e574c3ef92b690927e5258e0b.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
17e7c53050f7ea111b2f4d71b553625679eb185e574c3ef92b690927e5258e0b.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
17e7c53050f7ea111b2f4d71b553625679eb185e574c3ef92b690927e5258e0b.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
1.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
1.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
10.1.html
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
10.1.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
10.2.html
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
10.2.html
Resource
win10v2004-20230831-en
Behavioral task
behavioral10
Sample
10.3.html
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
10.3.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
10.4.html
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
10.4.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
10.5.html
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
10.5.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
10.6.html
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
10.6.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
10.7.html
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
10.7.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
10.8.html
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
10.8.html
Resource
win10v2004-20230831-en
Behavioral task
behavioral22
Sample
10.9.html
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
10.9.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
10.html
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
10.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
100.html
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
100.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
101.html
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
101.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
102.html
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
102.html
Resource
win10v2004-20230831-en
Behavioral task
behavioral32
Sample
103.html
Resource
win7-20230712-en
General
-
Target
10.2.html
-
Size
1KB
-
MD5
4d1a5ee6e2e542ed81b3210a0ec934c0
-
SHA1
2e1ec8d731621a063324ed68d927f577cbd7d195
-
SHA256
100c79857c59392e59ff6495a583d42a086246c8e6567abc87743622f7905d52
-
SHA512
d560c92e837e7ed2c58043ac783ea9556eb5c069b207ec3afec556c8e03dd2141b68d8eaef201e9c297c0f65da1d0cdd44a86969a2667c380c8004b15d0f9b1d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00d15a156dcd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399681098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081fc177b9287ed4a8181eac127bbbd69000000000200000000001066000000010000200000006cdd6ffe8aaef40a7daba9f259eaf7683c31d2716ba34c3670b335bdb9eddfaa000000000e80000000020000200000002ebfdf1e55f70a7b274e6298590c5b8fff6d81c7245aee495329a459627ea57620000000660c45a07cca4870fdb53f523e4c021852c853efc3f0f671cd43bf8aae9a8f2240000000114f6cd69592b4e626a6e0d68d3acb87365ed170794056f740a2434085f68805e83081b003e6290e01c3823b24a10bde4bca045c5ba8c56c8fefabd8b3a03281 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBCD1661-4849-11EE-A82B-7E970D42A387} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1528 2200 iexplore.exe 28 PID 2200 wrote to memory of 1528 2200 iexplore.exe 28 PID 2200 wrote to memory of 1528 2200 iexplore.exe 28 PID 2200 wrote to memory of 1528 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10.2.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57a2a806b055a0a9f357598a51c53a8e7
SHA1efe3838d51c4675ac2e3d1d3a76e632ee423018c
SHA25620c4564e8b5b0faa3ca389b3203a5b9880ac3222728a613849a4a078fe5da1e0
SHA512f66228b8cf6d7afd62e56bdd4581d8b668173bffb57610b67d7faa851af8d0eefbaa7fc29e5b014bbda399ed9ee79cd0a93f8791b0f2ffe03f23ef00f3d3cbee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba240746538920da7337cf74d4e52b0b
SHA12430ea2b1d03727b1716043cc17a90ddc27a8c16
SHA256d378118d87deff84b744b4c60f5b2966e9543b39542f13f6561f13e87654f0c8
SHA5120233968595befa71c67ecaa782e5e6d16ac3e11cd2bc22e6b18c37e38ad548fd2dd9ee98096f4094017a9a1db60b0ef6272199bc74ae53314b0989ba19f70230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512bb972d4f27c5f7ee67590ad1da7ee5
SHA16d5d2547f13c03d9535c318faf851b8946abdcab
SHA256ebfc24ff2bf9418eb03da75221cc634481a40274209115faba8264838615542c
SHA5128d6dfdae4ddcb79dc42a08e8370f3b440781d1da682326c8af06338c73a4409d02a1cc8ef1ba9cc3e3f215b45dc71c73f1683472b70faa836cbd89bd94d3479f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e06bb4c4ce4426f0ffef69467040951
SHA113cb9b1a483f171f4a1760716f8c574bb3e4c832
SHA2568885a4e70c5fe0d2840bda5b70b2fba8798a473dd9e678c3374c85873fc48986
SHA51221a7db93cde3f6bc5c46d4e5ecaaa9fbf485ab686abfb8d9e8b7f3e837793e04ccee4fb5e827a297a101763b9aff651e68eb9c1d7a0b1c2e9fb138b98d14f18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c281f2005e6fb3322c74645a97ecdae6
SHA1800aa30dff619a12ee2f12f48963edd07d7f29f4
SHA256930056821703c15ad0130f1435b8b8c984b67e7ca3d5203aff2b24851e8ae456
SHA5125e38593f8c82de9cb231dad7584ad627ddf862ae5d745b07ba33a311d7423f934b86328489d092a6e691b3a0a01f5c2b4737164e4c35bbaf130c4180c4daffc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a22a426494fa67ee2e798bc61b372b64
SHA129ce4d5e319894cddb05767ca04d2428a91924cd
SHA2569b9b48be7c89b283ba936c9ab267fc5135a7f0f2d99edca534e802cecde3ea80
SHA512934d95e239a44a0b84bf8423438f7e9aa9a8978b33018f9f5e70221280278628e973e4a1c15d3a476173eda6e69e5c0603f0a5a265d6fd513c5d5d839982372a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7686fcc2d6b0b6bf8143ac4c9dd0d1
SHA108a8c0f8588c3a4960d55954be25ffbcb697524b
SHA2560d4cbd1b7565a23424e9e4d4de3f916436ad51a752971486cdcdb0138e76717e
SHA5120cc6acef5bb3fd3d16a3161973474c97a248a09324b039cee732fc6eed7a58b0b0a5ed9e295d7a6d73885ce856b9646828817a3f54c5a5a9d96af09674c4bd3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a5de06d8d14e68998fddcd25523315
SHA1f79f28e2a4796470b7f97d1e9bd1e1eaa298a086
SHA2560579d1907b709442cd9d2020f8dd9a30420f9375f7dc557c62e670e98d61617e
SHA5122e99a0ab380fbbbbd12dbfb85be036286394b6539644664de71d0b5dc2bba5a855abb683f9b3eef5149a88ea830e5de505d1dcd8fcfc51c8fbf2d06efbb203b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51818d97ea5d522ae5693750e7ed4d696
SHA1e921783d1b56d49da4d315176fcc2e73fa3d229d
SHA256e993bb08588110d628a9d2147fdcc0dbea58ae0e1657141e7186bee79823685d
SHA512512aba120aac891966632e6c6502e0c3a963bdc857b9d5a90beca4eb665a6af36960b542c401ba6b5cdc72b20f0431522bb5f5d57fec3a5029c774db76335e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cfebd860aa6e5f68b44f22020475867
SHA10ddf97d6dcb700d4c9752ed4107864f7e6ecdf7b
SHA256a0d440cd35c6bb96a5c6381aae10186f4d7121d256e384a5722c0bfc23025864
SHA51218288ba5927e00f26328142a54b87c1c7c02718edc290093bde7d3a9600108e510936898752a79071be334fd987b2fd41e64077551490350c3e543b5955d254f
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf