Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
IMPORT & EXPORT PERMIT#.pdf.html
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
IMPORT & EXPORT PERMIT#.pdf.html
Resource
win10v2004-20230915-en
General
-
Target
IMPORT & EXPORT PERMIT#.pdf.html
-
Size
12KB
-
MD5
4e9ccd8a1886638758da0c495064efab
-
SHA1
369e37c6cf90197dd32054beaaee1e26c01fa2e8
-
SHA256
8fee5aa2b1f978898416bb135dd0e1256956bf898b4149c6ea84e438da35a432
-
SHA512
a1c8bafc78b76d1bada01dcc7389825816f64b9100adaeb5a9a47b65a018283f6c5c0fc4e129613fd35ab32194eb2e65ff36afbcd3bfcc997f9d93ae45a8fc60
-
SSDEEP
192:5wsZa7gBdwtag+k21XmyXiXmsUC2G+1WSniYZ4sWkPP94vLC5SFxbWomQUUYXRl4:HZuQd+agN+CUCIUSiiLWe5S+eB4w5RB5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402755487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fb61c04cf8d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAD96101-643F-11EE-BBC4-FAEDD45E79E3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea3dc2a7c0fe4d49bd6e8f3e7e71513f00000000020000000000106600000001000020000000d4ec441353e4a5e5667fa5c7069eff671cdf73c286ff537d68e56c65f99a156f000000000e800000000200002000000009a0aa0346de6ca3b2f92f086c04a425568daf1fd98e6a9157f978375105028b200000001c547f351476422de57ac555df9479aa75698c27143b4f16528b88f3a1cff352400000008bdbf13bc9829850cc585787faffc12fa650b1d0eb2a1da4d1b369006dfb3d4a63bb258f3e5890caabbb6d3251b5157f9444e0e15b783ac0a6cc9cc67413153b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 3036 2480 iexplore.exe 28 PID 2480 wrote to memory of 3036 2480 iexplore.exe 28 PID 2480 wrote to memory of 3036 2480 iexplore.exe 28 PID 2480 wrote to memory of 3036 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\IMPORT & EXPORT PERMIT#.pdf.html"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ecbeeb43458526a417240f9e6cbee5
SHA1e35ca1808f848e07860280975a19ab24fe5cc6fa
SHA256829ba9d4c33054a7c786dbfcb277aba7816d453068aa6364dce5f335a33372ea
SHA51265be0db7174bfd3fe534b471af214928a603e9fa64f43b50194a67021a825b842f524a1da8a3bc17ee60060c5bca9d1905173300b793234408de4c5902cb052e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce1b566019bd51425e1a78c35bc8c8f5
SHA12b176e43311293fe2e68adf519a9bf635bad5b70
SHA25675d7e55e1b2b284b29a4486c7a2dea15d7e28df6ad4de88c07ae42084978ee25
SHA512e68f6a866fbc6d1fb4ef1333a379333484188de42fe73fcd458eaaf6f1cfeb0e45661f8f3d1b99976b0bf528e6c0b472abe6bf332c8b29eb7da39000c0d7797e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c5df19f4d34fd739e02ef3163529f25
SHA1d59f257135efc0e012d8dac256e0cca3c3a36e3f
SHA2564c144613cba618c47c8550c6233ab561e9b2788b3d217d8e2dfb0cdfd5060b7a
SHA512368834469b48b5524f3a38c854012d2e83518042f8ddc2d51e76c01e456ba57718ff52357fd42bcbcf9b2386679f99f722f38bbe12df3533d93da8ea235695b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dabce320dce966349d1b4264d1a922c1
SHA16a2bd170b1d27b160061ceb8fc1b8ea1d5f99a09
SHA256cf657892adfa98e3ffcc8ee13795000df1237ca66d17993d6a1759a1a2ae5c73
SHA5127ee4a22421163ec949273b7f7986458542502091690ede543b3d5a759222d0fc2eab38af39c4a13b033a900768fb48c6cb3c7c7361b340ff11d8bc8ee3bd290d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536e321013ed7ad4575121563787ca150
SHA1068fd2554380bd69ffd80d6dede6ec9cb363134d
SHA256d1f090b7661cfc0ced201afde5de4d91368daaa27774cc6ec1542b6f47fd9dfc
SHA512ea1d1ff678a4ecf266532a283d11157da89bb1a96028522986edbaa2427320108f0179bd5d4f1c7a6332b43e73ada65787f4972b412861a8bb956fbc2029085c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce5b3fd77841823e9593c76057326bbb
SHA1472976688c5e787bec2328b31a65f7c0e16c4430
SHA256b1c939af65c43095220586c7e44b7759262d30564f50466fd0a52efdef7d0ab0
SHA51282811c13dac80772b2648149d67bfeb9f5b0c00447c228f890ec4d0dada8b1350f392af05879322d2401a23bd82ec5a2ae049ebade64c8b21b5c7fc7fd4a7a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cc94554222b5b3866b9a39ac9deab2d
SHA1d97782e59243c5ff191b6a99da4f7f60080325d6
SHA2564267f029f1f5bc99c12a155d5b48bc8cec914087ec34d8ef2f756a65f1eb4b06
SHA512e6e1753250675657ca02e207121afaf899fbc5d01f474d837c4820fa92d9e0f4c55cec84fd6080cfbb99dbc6e8459f4798949d6f4902d007cf9787b55c3cef8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d41985d221f7f289c0d20b3d1ac530c
SHA1344f060667084fa9481ca536d37c4905461cfebe
SHA256d59b71835063d1c82e72d631330f153feafa7616b41c9f9164e0b3b70367e70d
SHA512ccfa55b25b70c3753c69bf807cdb7f2fb37b1bbc9ccb10f042977ce64073b51ba6c4ba496be2214c81064418bab7e1484f77eeecbb372aa65135d16ef0bfd685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56101e6f4d2d1f5c84239c1daeaf7098a
SHA1c1421045a2f560eacde4e706ebb98e5c7c51804d
SHA2560ebfa315e5070872452dc2367efa14a0d9c4bfacb1297a02c4f6971a19301482
SHA512f13e6f0884022676f4d5a711d24c372d594ccdcfadedac62daa74ce8c79557fff8c98055869900b8ada37eac5797bb108721b6a050149c86a310228a7878e2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f26096ec76020edb087f38a1967627b
SHA1cb43d15712973feee9c1068a16105cf87e0eae95
SHA256f90f56fad0376a843320abfa6a902569138255e04318fdd5ed07d63f07d499fc
SHA512765751c83518789b3c60c1ad54e6c136b08722165c7c17c46382fea8bacea92f4069cd7ddf403aabe1d03de8bfe23e6e9089762e77359fd8f991b78c6940e85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffc0819adbaae9df68ba9ff0a28c9ce
SHA18ec41bad5bb0574684102718784b0b705ac75ebb
SHA25692832c7993f74779e7115dbfaebcc500363b951a53593f8e5f3739401b68bb33
SHA512590e02a98c0e1043730ab62c55abfbbdc1dedb980af847eefd5dbb596e7c807a5cb920c8df17627e0145b238fd2577a4bf2584e9cbbf1789c60cad94900a394b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55785747420c65b4c37bbb999116088d0
SHA1d5205ccb2e6382d5fd08fc7d568a3ee7d2cd918a
SHA2568f917df47b49b43e9dee4659f0404aacf1398e532983e93c23a897c127ac4819
SHA5123d8918059e2129442cceefa46dfee5a6ccfd502ccb88d83cf12dc14357d448c5838cf2033722874dd4e21bea9d4566705d115ba39eb21281a0ee5beb24f13e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da1dd3191d2d46c10e442f25e63974b2
SHA18845f19bdb96e99c9c36de18f1e59c587bfe86b3
SHA256843cdedc3b65177e20c9aa685f552823923f66f0ed039e39927c2b38e0955991
SHA512912c4045c03a3002bf8ccad6a275f369cacdd0802ff24363083cde8e1d52158bc3d64707f9aa4580bd2b7f73efbbd92b79bf79bd66c996bd5fdd1b1b4b334bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0d7a48e99e28aee18136265af9b89bf
SHA1c183fc77acb3a6af0a74fdbf7d6d8818c019f1c8
SHA25606ce68c5816031cbcb745a77efb383eda53e6a41b3f392c5f27904dec69aecb9
SHA512f60dbfaccab6217a0916bec8917b34b6596656194d1c344b7d4f423955da7a52a71ef1be6e0167bd8b11e91484c1525cf49a09e809690954c05e22d07788fabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5615c221ab4799c36fd40c153107fd65e
SHA11c17ee8b305f1a0b7877eabba62c50476ce6cc93
SHA256e9b250a54e0a905202f2fd8559542c995034801b75482784978f54b93dd5e662
SHA512d336296e7cb4a3c504b3f659fda48dee254fe0abf21132285b407d7717570831239e70d3cab5002ac90adcec9cfe032c9a5cdab8f5846a88acb08c2b7868a2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550c6400892d2a0c563967c6a86e3e15b
SHA1ee06e1fbeccd5ecebef76fb7af3cdd1e96f4db62
SHA25633bf382a54954cece9712a0827aca3c4b2c4f3e26d9bdc7880ac904537126721
SHA512e7ad7651adb70e6adf57f5dd3c23e3565c9cc81b8d61af161c6f1400764466275fe437b10e939d3e6b4f8c8c4d7e02fd6938aa98a5ec091504bddbc391b6115e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd871ff9d573d12f840e436ec512bc59
SHA119309586d01f9f6368bb8f6791ce47035a4fe601
SHA25626e9ace47e25e4da4d8ecd627694a49ea805e5fa8533af982e57537137d2df15
SHA51215e54c4158aca9cc3dcd9fe50e3bf37a31526e71d4700c192a5f4132db2b1da7eb4f5c5981724a44de9a70daab33fe986b2e6a8c32a9045cd6a204939342cd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54605d5456dc290d8552171f1f72cc3b0
SHA1d1330ca173bd8d92e2c63debadd2e6753dff1cfb
SHA2561aa4459adf9dd9fef7ee99f037edacbecbc056cfba5970ed9d56d33e086e2d4b
SHA512ec210b128aba820580928b8887b22b5a0e1be7522856025ff4e84686d935ce0c4e96deae2c7ad1a6c4bcdf9281d5ab87bc164d71b483ed5e919882202555d2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5491a0f7be147828723fc6fb5e3488ad8
SHA1246851b1290c0b4376a7b9402b1c8fb18c48686e
SHA2565b8a8661d718bf08f4195e2d3bdcf06b77cd26f5203c5d957e0535d6c3a40c0b
SHA512a344ab12ba15270f4b8eb57821f2e41b2b085ec4caa7c77847c57d905e14eef25e9fdd08ef542f9f25a8f46b4c43bc49b01287711359bed3e758327cb2833e7c
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf