Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
f261f786bfc33143dcb47db99a67bd66b947d74710b1f79018a400afaabc7a20.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
f261f786bfc33143dcb47db99a67bd66b947d74710b1f79018a400afaabc7a20.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
license.htm
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
license.htm
Resource
win10v2004-20230915-en
General
-
Target
license.htm
-
Size
3KB
-
MD5
c77bc50146a58d1ce71339780b360330
-
SHA1
fae6c9bf1a426f79d5bda554d921857e3f7f6e06
-
SHA256
e5549ec498f538123de08dd10210a91a1275ef0ffdbcd9cd695575bd35015ed9
-
SHA512
a4d471e8d133a3849ebba032e3c33ed5b5830f63fff64ab8ca886d304207d1cb7543756a20cb0c4da4cc9a81cee2f73d2929c47c7f605c842030c18866bbd069
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b000000000200000000001066000000010000200000006af11b155cd38f1443a206a89742b229001ad681d724bcc1be8cb81c4b15fd0d000000000e80000000020000200000005ed4bdfaee6d0369d0f0d323f5f77bc8e46db38450be7d45b353c116c11dbf302000000075f33921279b4b2bb0851f0a21e2315e3b2c14cd1be9bec8bbcb9ff8c3a21ab540000000f181f357d8e4163c72356ec205f36e7f4c5589cd1218262c8c5c9cdee48ce2694608aefc4a32672b716205f7ba860c91d188b361d1669a032b856d3e9ce0bc2f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1032df7d8bf9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402892380" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A647A571-657E-11EE-949E-462CFFDA645F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2548 2080 iexplore.exe 28 PID 2080 wrote to memory of 2548 2080 iexplore.exe 28 PID 2080 wrote to memory of 2548 2080 iexplore.exe 28 PID 2080 wrote to memory of 2548 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD513467659e0991478e6c109c02e452c15
SHA1ec6eb4cba993a8aaa90c058fa114159e642aac45
SHA256bfffe18ba05b5853eb5a4dc53856243c0eba180a2743fad513d65fe966b9900f
SHA51259ff32141c747ac3e506fc7233de3e6f7d3cc2c2d517925aa6af2992c6cee8c45dedc7711f6242f95b7d3926b61bec7de32dc01cfb94eee3590368d0d2a5b1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe09d00184e5e490828ac36fb7c1d947
SHA1e535f5f6c212de2d56d1cd21c609fe5410f5e2cb
SHA2564e48bdc4e065d1620177ea9e0db72d624be7b20b52e9cc73189bc61738bbc264
SHA5123ead2ee46977ba8d82d2d13187e9f4c35484cdd49da0e03e5b4aaf256e303733050ff7dbddf3e3623c86fc3f748008f13edc62c26dde4c6f4b1a03146c8bfcd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56bafb57226e0f51e01f7e4bfc9a30488
SHA162550501327a368c73d05b6f495945d98ffe0782
SHA256cc719a481a88842a92b1884d92ccec9e4e8dcf0e4b64035ec3ee2e76ef249cce
SHA5122e5242f7ba6a5ceaf8a270d711cccc6e74b0e8f4dac2dd284e815b7b36e497e3437c248575808ca7d812a3f740df5dec9f7d76a36d2c1a75a0f7d2a09e98a438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bdcb151f2c379494d34a55277ccc35ad
SHA1351d6ec741d0512ee356aa5077315daddb4c3c94
SHA256890591c5dc53860af6ebeea65dcd863d02eec094ceb192c4fc8dc510e26a1470
SHA51212092b665c3bbcf2e582f59a370fcacd8e8a73a428889ec0edce43bcb8c3686601514338b39700f77f6b3b1212dcaf2a3b9dd0d6dcf32adaa0ac9790aff8051b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d8d38613233699e123db9941490afed5
SHA1d4dbbfe4c119c157896a99d4d9dcd1ffc0044207
SHA25685351b7a9995bfce919a55e303e9871893209221f8ffdc446303404e81c0d5a7
SHA51233ddfc3e1bdb4d6370cfa32b2beb6ec9a4db85ca37a2d6885303f3c9d01d625c0ae0ce9f81c73cf215872901d5fa291ae3953bda8c71ebac8cd728f67e508b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54ae9af883166b8a444fe70e6da643d0b
SHA15b9168c586228c7602596c1ce208bb58f0f4e65c
SHA256afa688eea663944d1612299dc3ca21e0e519e1d34829dbfa9054f52763b65358
SHA512d2c41e2f2a2949592740fcc6644a2241c289ee7cefe83627de106d9dbf7595511cafb55f40ca7c0440c430a8bab1edf7472a616660000098a1cd8e5a5c0f5148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6fc4809418befb066bc0fa4947677c6
SHA1c71e3929c72e491a77a2fbecd7bd09ce8a447094
SHA25692e548c0c4314a29a57ad1189cdd4a2c438e746bc35216100b937aa3b3fa131b
SHA51205cad8918de72e9101abbbc583b183587ee5079593c46270e3a5e361062b1a909df961ead846a3a51165cef506d7c6fde5ef6c1225068f0b5484fd2faba897c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545db8a574770d552a049ef2409712ecd
SHA1452229898f7c37a30f1f585cc31a94d07a20629c
SHA256e49788d0baff64e80b50500b9c74f5cd0196276e46886a2f7b6797bcd791bec7
SHA512ef84a1e9c6921e6ea5dc3d1cd673abdfb602704b1e305066ef001863f344cbc08ee8d82e4208e7ef1b3bd08b1d4b0a29e09d54761f2aebace652331bd449b89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec2f331f993002a9bcf194929b28ed6b
SHA1d03c230b72498cee346dac5aafe56c3e3354a95e
SHA256ae3fbccdae93ed9356de59d3477d48a30b2b26358e64b04ac2158a45d44372b0
SHA512ce2476922bab59d790c3327ba9e009d0444b3035ead3aaa30f63cfb0ede021cc8517575c7c05502caf284914976d520156c2e576c31d892edd96d5875c27b174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e8ad552cdfaf303d47e2e9f1a0578d9
SHA1277f287511bbc012889b28c073b7a528e1c2be9c
SHA256f32ab4de787f5db2ead2e423aa92f53713969a2b31bfa075f5ff487d8961fa58
SHA5126f16098a57bad9e8dca9f17b247c61090464b5ec680004221fec9722c1de33387efae01f67ed1d89fc67d7d3992a8cd6e1faf9f10b44c3d439ad47679470bc86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f127514dfbd2bbb6251db4c006c07e7b
SHA16310dfac0970e786336f63a30adbf4849ec15086
SHA256797a320db883bae0b299a178608d777bab2f92da122a9cdc1db0c5eeb397738b
SHA5122a5fc826787f80da7fd27d2695a40c47283242e1b516ae2a515e8188d0ab706a24ae753decfd62ef1746b50e38098bfcbc055ab63068f1884e1d4d0992aa6d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f0ffd14c57bec0847744519097737c16
SHA15521c5d954b7b5836c66be0f2bec4dba8aaad96e
SHA2564469e7508b44228cc3cc3aed89959543d408c545a57c87a3d0cc2f7a1e2b07db
SHA512392a8cec229ceb18e092aa9a44bde2c672d64d9db672f8423d8208324e1196f5e776829a7f89c069e626975571b4a4d846253be108c8bacf7dc18bdaf3bd8c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56c64b0404e4545bf3382abd908280e21
SHA1474f245a2669f15e62dd2e26996864a5e3296a01
SHA25628c0dd7fa35d313964ef6780152ee8108e4ef211c1728da309e4f9b7a96877c2
SHA512c35dbc1a9f61bb83350489fd725a694e0cadefb453b343e84b758289a40729d5e1bf86100e800f63c185643d8a92889599666223c1d869f266f9874c715ee0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe3e41c21ca8647b17c9ad27a6e528e0
SHA1726216df151247f4f0da56a1a7e23a59e8fa7772
SHA2569b8e2a1f545b7299dd3067839e66dbfbe34472c9fe2788fb9bd0d7f6fbc5e7ab
SHA51231c99bc64b89a79858167b8e871ccf83533b49aa0b082d833b17685b1525ef47767b7c947cb0734212bf43db8a6a2b5b98aa2a8da9e7922b2bd41f4ae1b94d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc5e47e4a4ad51053796756a58027dde
SHA16d9d8273a77dd693f2b129e6c76ec7fc8b7fdb7a
SHA2565a8f483fd76ff1e7f20b465777c64853e02b855162734fe7a9c89985835e033d
SHA5121f84a1bed5a5d32295b6f82fc7917d3a61733275758603afb2877f201cea416b6a7ea27c8c206ae623ee48bfac8fbdf66c8c7f390c258e5a7f5c2b749de2d5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55400dd43e541423acd0ae875a0a7234c
SHA1d20caf4e23504d0a2ef3aa9c54f23c6c491ba71b
SHA2563a04ad64510a906c4982a2e8a3f31b8904f677eb0ad44772f7c1a990771667c8
SHA512b9878e93bb2db07abab42a3a7acb2b7baa748614e9cc02d2f5d9954ab686ded44edad3a38987cb0759be95c1035e1e918274e2b9c025b90fc79044caa11feca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511f17069c0d6acb43e645299be8b82cc
SHA14db0e3a9c5a17ffe1cf8d6ab3df9b4d39ba5b807
SHA2566015936eb8526753d65aeb4ad6527744ae4b472751c4684686b557e883d6aa56
SHA51297c4f5ed26fc5988b9a01d87063c566d707182ff8960819f55f650afa69a8f0e39714b742f3e9828179926a734c5a4c85e717608eccd86ae10eb957426f9b342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5210c42888b5499c2e2dcd1a38c669643
SHA1227f639aa0b0045830f320def24c1c1a5ef07ddd
SHA256e1fbaf95a06fff611e73d0356338331a32abe9c3c8bb5c0967eccf448e7c4d34
SHA5125aa34853fa723b5cf8575afcc732fd16f63e32ba22ee05692d5915efb22fd55ee09dc092d6b42b8e74469c7cf4591a38bb46b6d089cdda35b3a26e0b8167504d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f8757313a0a17c7d35dfaf34de49e5d
SHA12ba0ab419fc4287d483052c9dc6bc3b9ad2a1dfb
SHA256735e91764b20fb2843a3ee5efc83ff577b4aaf3e16cba81b60f3aab3d10f266c
SHA51211f72502d9459b6c1025698028c416115a072fed7538113883758a4f0709bb2de1d2ea6d37050987f9d5ada3d6599167a0afdea58a18830ff10fe441e072827f
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf