Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
hoplite-installer-1.0.9.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
hoplite-installer-1.0.9.exe
Resource
win10v2004-20231020-en
General
-
Target
hoplite-installer-1.0.9.exe
-
Size
5.9MB
-
MD5
3f18a99e372302985faf8948d246304d
-
SHA1
534708c9d565039417f855a8ed617eb09380237a
-
SHA256
5f407bb095071cb12ba4937eee642d209cd8504947c992f3cd9eacfc122a6a56
-
SHA512
031a6f5a68d1acccbf92ee481a3c0f5bd077d720f31d8382b62d72f261455096d4323baf343151732271195248c84bbb1bc50279b079057bd7fafd13b8f726d1
-
SSDEEP
98304:IhIQhosO00tCc0rg21bCv0LFByOVmU2Uo8Yu8WACpKZB2qI7fr+Q5QqzxWCM:AIQU00tArLfLFoOV2l8FlA8KZB2qI7fs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D19BCE31-71BE-11EE-B4A5-7E3CB4A050D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3056 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2216 1696 hoplite-installer-1.0.9.exe 28 PID 1696 wrote to memory of 2216 1696 hoplite-installer-1.0.9.exe 28 PID 1696 wrote to memory of 2216 1696 hoplite-installer-1.0.9.exe 28 PID 1696 wrote to memory of 2216 1696 hoplite-installer-1.0.9.exe 28 PID 2216 wrote to memory of 3056 2216 iexplore.exe 30 PID 2216 wrote to memory of 3056 2216 iexplore.exe 30 PID 2216 wrote to memory of 3056 2216 iexplore.exe 30 PID 2216 wrote to memory of 3056 2216 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\hoplite-installer-1.0.9.exe"C:\Users\Admin\AppData\Local\Temp\hoplite-installer-1.0.9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://fabricmc.net/wiki/player:tutorials:java:windows2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547a96c03986b803f6d25fc4589e17ca6
SHA1c439dfc237946de772049423c7bd70b3327064ae
SHA25691fe7a194d58b9d5b7e4ae1e35711ad0e87f538383e2d1e7a437a7a0ad42d1a8
SHA512fa1196b4477c65d699dae2ee25d521159674c1c53bf8800e131c468617685d8ff0d833c246308277ea81e84df7bf4146166285ea9a1bc06d4e55fffebc998e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e19a56f81633fa5787ca9b6cc2a5766b
SHA11d347a3e3390584e35088d9b198e76b39144cdd8
SHA256ad404eb01d6ce2bcdf46395589c082f920da1c8a0e4253852a7f89ce6fdf564c
SHA512ac83972683b133a6b6c2ed56514b86f3f0a30faf85c44bade6c90a0d6600062de786ad15041c1d2aa6637e5ca51e2ade620d5fed0458c41028e990b4ce713f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5647a0b28446a0b265fbe350a3733832f
SHA134e6d7117fe0f6402cfabbe4b28eba7139811bbc
SHA2560b77f8a1445144e00c4f49f8e54ab8135030d55be24f0dd4c8dfbf06fa864aa0
SHA51231aa6a1f0f56f14f0e20160f63fee304873b4d0d76d7ae19ddca15480d30d2b417417541ec8e4db8d5c3e3b9771072d2e0a9a65c2245632619a7c135dc5de7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5647a0b28446a0b265fbe350a3733832f
SHA134e6d7117fe0f6402cfabbe4b28eba7139811bbc
SHA2560b77f8a1445144e00c4f49f8e54ab8135030d55be24f0dd4c8dfbf06fa864aa0
SHA51231aa6a1f0f56f14f0e20160f63fee304873b4d0d76d7ae19ddca15480d30d2b417417541ec8e4db8d5c3e3b9771072d2e0a9a65c2245632619a7c135dc5de7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc88c9ba89cc26ac5d6b1802be89afa
SHA1668898456b697af90b4a6af63386305cd8e9f115
SHA256ad824d317099fbbff5e901bb5af01938753cc083b0892bcd447027c80846416c
SHA51268339e660a79db2bc2c0bd05f3e52899e2ad71a8218821d1d00b8c0b62df8c80cec539810dce9cf113c3976d3ceaf065a363dba32831f5ec0053323a41c7acdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c42c709c3d014f1120fb2de7e9575cb
SHA1d343b0c266ac85225e5220778da3bf1b81549e28
SHA2560138d460ee0783e02b20f09fa3f39b4aeef8ec1ad1c38208176b839ba09ca4c6
SHA51256a33490cb11c0267a807018eca4b463122fd188a8ea89b01cda98efa5ebdaed357f52519ff230828e79a15b17bf980b7e0c82247fbcd9bab7cdc37d528a95f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7f46c87e11adb857d20381d56acd5a
SHA1310c22c3e0854e318e49279563cd41dc2c571eb0
SHA256c110fa5e3bfa8a25925baa2e55a267424225ba8e3c772d3973a89f397e9ee0be
SHA512287cd0ab22b4a07d52e1cf3475e96c78d0ab67cba3fcf89d917cfa74bc8b6fd79581d785b463c746ed67e9f010e54ba6dc09b9f9dd4678f776bf08e542983e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae7c767ff14eb6a7509f072d3af4ef7e
SHA12c2ff681fbf5cc7e7ecb8e82db7e018a3694815d
SHA2566ef274d4c2890004dfa27a87d8897408538e0ca6e7218e475fcb26afeacb7965
SHA512c1d3151d56e48ae9c577c20ca88d8fe2c262aa1d28bd33a57e8ad26d6876c22313af8c4c44090c1bd05764403c85e956fa3a3e498ffc5b7a44f9f5c3f8bdc19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f65ca7c97e3998428a2f6c3b7e33f767
SHA13a74655ad55393095b874d777565631a62a15614
SHA2565815163ec41188ff18c0fd92f4f82c37c1918603eccd23d0864f2132c1bbd8d6
SHA51288fd684ec7f4512182a675a5f74d5f3948427e1fcd7b177af52862bffb188a69122536a49da0c84195bb9347c36ab82cb6a217dc84b6d933a73e9ccb9dede859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8df7cc1d10554e12f535ff11fe5988a
SHA19a477df17951a6e7b6e1ba2f242a7c3847613c3a
SHA25612b39588ccf8204e1fa974d23da49be0e9827d052012dc6c5031e54d1b5b0210
SHA5125cae8ce98cee6adabdd60ad2939bc2137e7f341c82185a609fc22fbd15cb303c12d61dcc40052373355dd6e8d34e581da1465a3815a6e7368ca6f6915010bab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a6f9a362f125d938fc954649e4cea5a
SHA1b229d02e4997dd2ef302443274b01d3e81b68b9d
SHA256be332bb473ca6b9b648991451e986f8a6af8d9077cd3a5261377d3432dbad97e
SHA512769bcd853693f437aedc935fc182e20bed4a549aef2ce368eb0acd4e7077dc9551b0659feba60c001ead08b8f3c38e918ea0d6ea1deb39437b2eca892ff8a975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e03dd3bc538bc57c7ba529839cb6d868
SHA1ddf566fc9e5cf6e08d0aad552e2c05f0258666e1
SHA2561907d946152efee3779534b3a9c26d99a23432730d2ea2516a00246dad8ee405
SHA512bf1be4770eb9e0a68ee5d221017a0170c9e66548f889989e139092002fade06da594b3c1f5ba668d3b1e8034679b7bf81dfb3f128cd9b77f1db8661efc90a2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d65613ff505892a6b0c7e072659d9eb2
SHA10262d8c5e9a79309d096ea27d77b599e3de2c101
SHA25618635a640f49db2a76fd64bd8eec12d323938532176e2b29df4485e24b2f105a
SHA5124a106584c5441a766e7fae5eb3f2425bf06f0eac63c13c64dab570ee15ce202353dd0ca8659ee3b953ab07f930c6bbba10f02f04b3b2c84671828d78b9ae29ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556ee2b2d17935a4cbec9ca1ae3dec6a6
SHA12c42db8da199709b6caf7b9860dcfe067e9d4fff
SHA256d6815d224de3d49fee7d42765582b8a475a81abfabc2cc9453125fc7d96c8b87
SHA5125a13856b00f58f29294fcafa33bca56a10a43d7e567f6879b5d0f20424bc4d1f606a1bfbe49c2bc93544a2be1c86ded76ff48a08ac05734cf655a9f20ae1a282
-
Filesize
99KB
MD544fc57f5916c526ab15f909c0774e711
SHA193dc2df939b217c2e42f44edf9b2d50280f9b499
SHA2567a4133b4c6e0cc45009653c8b0bbf7e5e640e79f1d692fe3c75aa57e0d3261fc
SHA51270c2ad4899849edeeb66ee1c760ea43afc952fc30b83c856a32cce20dff576d1a33dcbeb6a365afd48d2ea27cc126f31ea59846302f9ef4c9ff74a43209a744f
-
Filesize
99KB
MD544fc57f5916c526ab15f909c0774e711
SHA193dc2df939b217c2e42f44edf9b2d50280f9b499
SHA2567a4133b4c6e0cc45009653c8b0bbf7e5e640e79f1d692fe3c75aa57e0d3261fc
SHA51270c2ad4899849edeeb66ee1c760ea43afc952fc30b83c856a32cce20dff576d1a33dcbeb6a365afd48d2ea27cc126f31ea59846302f9ef4c9ff74a43209a744f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQ0O45XW\favicon[1].ico
Filesize98KB
MD594bed0e172b2d893f1a2e046ed9a9baf
SHA1050d1b4d6752dd973ddb31beca55815e300180b7
SHA256ad44b5a49faee0d955620c627d1710e662893688522e7051dfdae10b42984a27
SHA512515e21806859deee755e617bf1ddb28b363b34e65b4cb6853764e6f53014d405184b6fdf333ae33722d8e7a69b8c93f401c5cacce0e217013237ffa475994fd7
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf