Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
1Static
static
1app.js
windows7-x64
1app.js
windows10-2004-x64
1background.js
windows7-x64
1background.js
windows10-2004-x64
1changelog.html
windows7-x64
1changelog.html
windows10-2004-x64
1js/alertif...min.js
windows7-x64
1js/alertif...min.js
windows10-2004-x64
1js/angular...min.js
windows7-x64
1js/angular...min.js
windows10-2004-x64
1js/bigscre...min.js
windows7-x64
1js/bigscre...min.js
windows10-2004-x64
1js/bootstr...min.js
windows7-x64
1js/bootstr...min.js
windows10-2004-x64
1js/jquery-...min.js
windows7-x64
1js/jquery-...min.js
windows10-2004-x64
1js/libjass...min.js
windows7-x64
1js/libjass...min.js
windows10-2004-x64
1js/undersc...min.js
windows7-x64
1js/undersc...min.js
windows10-2004-x64
1naclh265_arm.nexe
debian-9-armhf
1naclh265_x86_32.nexe
ubuntu-18.04-amd64
1naclh265_x86_64.nexe
ubuntu-18.04-amd64
1window.html
windows7-x64
1window.html
windows10-2004-x64
1Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
app.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
app.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
background.js
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
background.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
changelog.html
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
changelog.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
js/alertify-0.4.0rc1.min.js
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
js/alertify-0.4.0rc1.min.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
js/angular-1.1.5.min.js
Resource
win7-20231025-en
Behavioral task
behavioral10
Sample
js/angular-1.1.5.min.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
js/bigscreen-2.0.4.min.js
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
js/bigscreen-2.0.4.min.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
js/bootstrap-2.3.2.min.js
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
js/bootstrap-2.3.2.min.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
js/jquery-1.10.2.min.js
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
js/jquery-1.10.2.min.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
js/libjass-0.10.0.min.js
Resource
win7-20231025-en
Behavioral task
behavioral18
Sample
js/libjass-0.10.0.min.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
js/underscore-1.7.0.min.js
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
js/underscore-1.7.0.min.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
naclh265_arm.nexe
Resource
debian9-armhf-20231026-en
Behavioral task
behavioral22
Sample
naclh265_x86_32.nexe
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral23
Sample
naclh265_x86_64.nexe
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral24
Sample
window.html
Resource
win7-20231020-en
Behavioral task
behavioral25
Sample
window.html
Resource
win10v2004-20231020-en
General
-
Target
changelog.html
-
Size
1KB
-
MD5
d037d1ecf12de230844665c2367933d8
-
SHA1
abfec742d1b2563070ac375993da9ee530218f64
-
SHA256
ef27fe26e1e355bc3661c764c9293928e25793e74d52f4c350fd93bc86ef3f8e
-
SHA512
776617ef2a4d7295c13c863bf79d56002f119ad120431dbb29ed1126e831998e40675050f3b43039dbf790aeddfa764d030d0e3cd5e7252ac39eee378d0a7b47
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CEA0BA1-784E-11EE-9E89-5E9DF4B4F3C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2428 2148 iexplore.exe 28 PID 2148 wrote to memory of 2428 2148 iexplore.exe 28 PID 2148 wrote to memory of 2428 2148 iexplore.exe 28 PID 2148 wrote to memory of 2428 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\changelog.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5981bcc4a8dde284db097e39c50147436
SHA17cf2b04192f58d6989acc9d9e47acde8418bc549
SHA2566805facb90242be90b177f956eb8bc3b7fe282489a2367ef64c8e0814e1d7254
SHA5122f107f63e5ef45c3e02939c05c1f605926786805f17217134f8bfa047c34c979fa65971589fa89f5e723b71da66ea24dd35d601f788a3186ad4fa9bea72c8582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57efec044b2f0ae859bccfc22dc9a5bfb
SHA1de847e37e024606b93935ee7538e279fcd912825
SHA2567e4fdf3ffe07a77cadf246a0f2ed6285c56c3d146171dd5f47152709864276ac
SHA5123feb32bb10d7e5aac1b81ffe33470b8650edbae8a45d7d383ebb93bc4254ce96179b63c0b0074a3fbfa1831a2a33408afd19f5e52e8aa6c2df26efa8411c284c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d692c93d1b2e9139d30e7872acdd5ed
SHA1931d1ed268352bc7df139542b61c8ae197e61e4e
SHA25692526ecc2de07aa545598d999aac42964dcdef344662d6df4ed77eb22ceb2055
SHA51285d32d205b8206d4bb142a14d914d40e7e59e59259346fd33d9ed5a8447235421931f39cbac1828504a930db332dc2ace01587a53af24d9453568de0f0f85d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cfaafc13b3d89b8e0e34cc811aaee5a
SHA1fa4f524667b2a6230abef5695442fdcde53521c4
SHA256f7e13b33d043174f747cf4e010753c97ed640e1425016a0f6e0b310602f58838
SHA512abec8c03c379a664fa786e3440bf90864a6a902dce6dee04812ce3872165daa9a06057f0ef2a7133a8affd7e409c2312d768a3fe2b84936296b071e02d1d155d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50811bdd3508f1b47a7b32c2f95a8365e
SHA1c96f33b673087bc3788bd349b3e04ce5020b8fb3
SHA25668b3cc2cf1b05b3f7ec43bf88e6e4ab419dff6080d4e0dcbf21e62ef30468209
SHA5124356815a12269fd56e5f24bfdc11b84dbf9f6c97b91140024c73fe5798083c9e5232b18f8d3fe94d66773291ce3c6556d7a0d664cd17d92c8fe1273b3b898424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd699986b6537577a93d8050e5ff9ee0
SHA114f4de97474337cbbfc2c932d8e4091b771b4442
SHA256360c23a9547cbe55309da57d37b98fddfe6e4cf84fdb56c07f579977d09e1805
SHA512c27942cbce43d2afad50d89afb155c8d3748e34d6447ce211e5adf5a2f8d987fc7bf354395d1c885a56bc6d1b6d736e49f963ee9818cfbd2c19d95b492b1625d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f29d3e2752f210705fc5b9e59205f6c
SHA10da4243f9087cbdffef544befd4326a94f2413db
SHA256a666f5f6f62d06b1aa38962830fc1ab1bc5474b3d618f1ede41a9a817cba53db
SHA512c482a05a4b299b1bc1df212f87c5732598ab4cffc57422cbbfa433a8e5134f0f72621d6989277bfddcff7fc32d7ae60428449fb626c37f256cd02a83e3e51b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e11f7a4c8bc92aac0a52ac240d31cf9
SHA1fb209e6f5b013d85dffadcecb71242c3559d4a42
SHA256c5a22932ad719935470848e6d5df60fb4a82d1f6a7975cf58c117c6d87477551
SHA512c4b3dfc3bbe4c8b8c64cdc5399afab52a409ec0d7a55e60e474ba89ef19a65398abf89db82fd2c589d90dc0b481cbffcb9552a809bd6784a6cf9c2d9e313b031
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf