Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3BINDInstall.exe
windows7-x64
1BINDInstall.exe
windows10-2004-x64
1Bv9ARM.ch01.html
windows7-x64
1Bv9ARM.ch01.html
windows10-2004-x64
1Bv9ARM.ch02.html
windows7-x64
1Bv9ARM.ch02.html
windows10-2004-x64
1Bv9ARM.ch03.html
windows7-x64
1Bv9ARM.ch03.html
windows10-2004-x64
1Bv9ARM.ch04.html
windows7-x64
1Bv9ARM.ch04.html
windows10-2004-x64
1Bv9ARM.ch05.html
windows7-x64
1Bv9ARM.ch05.html
windows10-2004-x64
1Bv9ARM.ch06.html
windows7-x64
1Bv9ARM.ch06.html
windows10-2004-x64
1Bv9ARM.ch07.html
windows7-x64
1Bv9ARM.ch07.html
windows10-2004-x64
1Bv9ARM.ch08.html
windows7-x64
1Bv9ARM.ch08.html
windows10-2004-x64
1Bv9ARM.ch09.html
windows7-x64
1Bv9ARM.ch09.html
windows10-2004-x64
1Bv9ARM.ch10.html
windows7-x64
1Bv9ARM.ch10.html
windows10-2004-x64
1Bv9ARM.ch11.html
windows7-x64
1Bv9ARM.ch11.html
windows10-2004-x64
1Bv9ARM.ch12.html
windows7-x64
1Bv9ARM.ch12.html
windows10-2004-x64
1Bv9ARM.ch13.html
windows7-x64
1Bv9ARM.ch13.html
windows10-2004-x64
1Bv9ARM.html
windows7-x64
1Bv9ARM.html
windows10-2004-x64
1Bv9ARM.pdf
windows7-x64
1Bv9ARM.pdf
windows10-2004-x64
1Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 13:57
Behavioral task
behavioral1
Sample
BINDInstall.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
BINDInstall.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Bv9ARM.ch01.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bv9ARM.ch01.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Bv9ARM.ch02.html
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Bv9ARM.ch02.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Bv9ARM.ch03.html
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Bv9ARM.ch03.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Bv9ARM.ch04.html
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
Bv9ARM.ch04.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Bv9ARM.ch05.html
Resource
win7-20231025-en
Behavioral task
behavioral12
Sample
Bv9ARM.ch05.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral13
Sample
Bv9ARM.ch06.html
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Bv9ARM.ch06.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Bv9ARM.ch07.html
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Bv9ARM.ch07.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
Bv9ARM.ch08.html
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
Bv9ARM.ch08.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
Bv9ARM.ch09.html
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
Bv9ARM.ch09.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Bv9ARM.ch10.html
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Bv9ARM.ch10.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Bv9ARM.ch11.html
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Bv9ARM.ch11.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
Bv9ARM.ch12.html
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
Bv9ARM.ch12.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
Bv9ARM.ch13.html
Resource
win7-20231025-en
Behavioral task
behavioral28
Sample
Bv9ARM.ch13.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
Bv9ARM.html
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
Bv9ARM.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
Bv9ARM.pdf
Resource
win7-20231025-en
Behavioral task
behavioral32
Sample
Bv9ARM.pdf
Resource
win10v2004-20231023-en
General
-
Target
Bv9ARM.html
-
Size
27KB
-
MD5
9fb43d596a1c9b5b4b102904dbeb9b51
-
SHA1
929f0a62873d1e43d6b3c428dc01c95c477f11ec
-
SHA256
65d3e0aa7ada34f484c6c64b2a97037dcb7db50a343dcdfb70e2c9cb391cc98c
-
SHA512
b02c284d136ad138b9b6cfe2cdcdb16a2a31b82a9471aa054620aa12fe384c267b6856dcc216b7b8f97abca44526e69e72324461ac8ba4d65228f95c4104f7d0
-
SSDEEP
192:nyvOH6HpNSpAw+IGWG9jj/r+jDQYeElupe5EQ0CalfqLTHFVn6DNgANma1dy8DHi:nyvOaJYH+IfGtV1ej0zHTy8DHa3J
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07c1b5dbb11da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd500000000020000000000106600000001000020000000031b068c82b34e0c4a32e9914d6f6cffd29edca496920971971fb77ada794c44000000000e80000000020000200000004da050c54b3ca050d8021a8ad105f87ad4c9136380fcf7b02d48db111209560320000000a49f5af0fdd5d22ce514d23e06aa01fb98ae4da0fe06f55151c3d140c16fd34740000000eefadb5c62717b19a7623eb6e1102b66c622ed671692a0786d3f781f8193bac82f8c5f6ef5211c852276881cd5bbbc4a88da86e7486b7f348652b3f526d218e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86DC7381-7DAE-11EE-878F-C2BF5D661465} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405551773" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2720 2760 iexplore.exe 28 PID 2760 wrote to memory of 2720 2760 iexplore.exe 28 PID 2760 wrote to memory of 2720 2760 iexplore.exe 28 PID 2760 wrote to memory of 2720 2760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cccf1a3349fea65174ffc2ba05056ba4
SHA1c803443f99754394a933f357da6d05005fa28134
SHA2564129ed2bf57ceef2df5e62530af490732618d87f6f2176decc7931d76694bf22
SHA512d47342453733d4600144a9a5644003c5af4354694828c6c47e1ba8bbd811290197f190c2c8798b7ac457b8d0dcf301cb023510a53e9b8fc1f6389fb49adeb6f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f39028f730ec91418056f5450bac45b
SHA1c314ea64e12c46fdeefc5849a9ac8970e9284632
SHA256dfd2418039782eaae1b4b020751896f7aa655e9a1ca68eb971a341d1f4c13cf6
SHA5123c06916d658362a9302c8efedb6d0fcad01d6c786371ec62b02b4080dd3d444bd8af89ab3c703205380d2f54adcbf7fb3666f6c1ae7b27fc42105f344887c19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ec56b4d257a0efe639d2c74e5c84d4
SHA1801481451694e90d6cc1b06d31813ea3aaa992bc
SHA25663e2944c7d4a4bec701e91a97415649dda7ecadd8522dfeb83bebf5b9ff66ddf
SHA51272d88f3994584c02398f702151afc26fa49b05bf6539c43b5e2dbe240c2043335d6491d76c7b5806596297ef07c9de147f909f98c285f1a6edda1b1d132a6c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1052539fdc3ecd33d60e3542b816d72
SHA1e2d6344c5cc34e1b444fa0b4803611a70c9136c3
SHA25697de6545fe262d963c216f63cc052ba3fbfe3be8acf04083a15bb2bcf04f470c
SHA512d62135e7cf73f02fe2f2761216f46736cf2034804c8b232df5030dd1a4af814370e6ba98e4a8b016424d2e3891db9d7c74b512420d8f48f8e3f591661caca9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fd190be6279988bfd08f23e517531aa
SHA187a9b597df10e0c53b266a10e48b71260973c6c2
SHA25671d84c5e2418175775d19d0c67e73f7242d44c7df462a2054ce99a3910f081e3
SHA512f727e4fe92e36738463715a3e4710bb245959a2967f1d0b481a1da964570e547acf367d84a51d6c26c3f44b5a11bb87fce605b999a05b72ee26f1f17d95a7f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c67a42625ffea398b15993b1a88718e
SHA1ba94e35d6747162e4494ff64cab88a245a099e1f
SHA256a57f250bc244c32d9b0be594f401b94ab5619f5e7bde4fe4a18fb926151fbe3b
SHA512dcf18299e008a4f90c71e07026a236860c20a9c6f12e003ae8d7dff0d463e1b79fa87b4ca32dae665e3e39dd6c877f065b0b26becfc209c5f249892224f2a00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be5adda3c8f45a31ad5f3bbb098b43b5
SHA190de7c0b704c7f133c57093a6ebe8d3fa5c7677c
SHA2562c8e445577a23011968372899db3de206aca53939fbee6bcd53f71636cb87985
SHA512e334194758d934d7cf811c6de613907ea4762e154dad1b25db110f00f7b96f816b28d026fcac1ecb726081ac64a28d6a809dd2b4f9c07a11ef9e053fef85ec60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ac25910614864c5e65a3c1c01695db
SHA1ed9dbfe2e1545edf45746c975fd049458c7e835e
SHA256ed7c6408edbce97a4039c8b4ffcdb524a18aa9317b62607a7a0160654f949e97
SHA512d8f4ae3e791ae91c01ad71acb35aeb4dafe7b76471f8576ddfd1ae8a45879ce4388d29b9ac683e677be66ad2876d16e0420729f0e3867af0fa529888ce916044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac2e423da79bd4f44fd543e911b9136
SHA1caa02f05fc7b1f831a3db828ec1575b9d24f7d24
SHA256d2d895b2fb2d605d1dd95c091f012f406c26e2ca8bce1644a44ebcb8225a3262
SHA512a53a12fab05b2733d55f6426cb5f657c97fc0fae4369144b153255726d8cc7e1f40be2e5ef60292c39e28d72ae4836df0c1f5535176ce6089c6952dbc4d7a3cf
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf