Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
4Static
static
4BINDInstall.exe
windows7-x64
1BINDInstall.exe
windows10-2004-x64
1Bv9ARM.ch01.html
windows7-x64
1Bv9ARM.ch01.html
windows10-2004-x64
1Bv9ARM.ch02.html
windows7-x64
1Bv9ARM.ch02.html
windows10-2004-x64
1Bv9ARM.ch03.html
windows7-x64
1Bv9ARM.ch03.html
windows10-2004-x64
1Bv9ARM.ch04.html
windows7-x64
1Bv9ARM.ch04.html
windows10-2004-x64
1Bv9ARM.ch05.html
windows7-x64
1Bv9ARM.ch05.html
windows10-2004-x64
1Bv9ARM.ch06.html
windows7-x64
1Bv9ARM.ch06.html
windows10-2004-x64
1Bv9ARM.ch07.html
windows7-x64
1Bv9ARM.ch07.html
windows10-2004-x64
1Bv9ARM.ch08.html
windows7-x64
1Bv9ARM.ch08.html
windows10-2004-x64
1Bv9ARM.ch09.html
windows7-x64
1Bv9ARM.ch09.html
windows10-2004-x64
1Bv9ARM.html
windows7-x64
1Bv9ARM.html
windows10-2004-x64
1Bv9ARM.pdf
windows7-x64
1Bv9ARM.pdf
windows10-2004-x64
1CHANGES.ps1
windows7-x64
1CHANGES.ps1
windows10-2004-x64
1bindevt.dll
windows7-x64
1bindevt.dll
windows10-2004-x64
1dig.exe
windows7-x64
1dig.exe
windows10-2004-x64
1dig.html
windows7-x64
1dig.html
windows10-2004-x64
1Analysis
-
max time kernel
168s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 14:18
Behavioral task
behavioral1
Sample
BINDInstall.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
BINDInstall.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Bv9ARM.ch01.html
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Bv9ARM.ch01.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Bv9ARM.ch02.html
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Bv9ARM.ch02.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Bv9ARM.ch03.html
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Bv9ARM.ch03.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Bv9ARM.ch04.html
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
Bv9ARM.ch04.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Bv9ARM.ch05.html
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
Bv9ARM.ch05.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
Bv9ARM.ch06.html
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Bv9ARM.ch06.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Bv9ARM.ch07.html
Resource
win7-20231025-en
Behavioral task
behavioral16
Sample
Bv9ARM.ch07.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Bv9ARM.ch08.html
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Bv9ARM.ch08.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Bv9ARM.ch09.html
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Bv9ARM.ch09.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Bv9ARM.html
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Bv9ARM.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Bv9ARM.pdf
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
Bv9ARM.pdf
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
CHANGES.ps1
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
CHANGES.ps1
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
bindevt.dll
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
bindevt.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
dig.exe
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
dig.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
dig.html
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
dig.html
Resource
win10v2004-20231020-en
General
-
Target
Bv9ARM.ch08.html
-
Size
6KB
-
MD5
d09e894a02358f84c3387593d1ce68cc
-
SHA1
8cb8a1ddcb3f4b046794f63a1d84b8aa06ef8313
-
SHA256
7d90151a4f4feba25b5e598074af6357a614693b504315ba40d7c9eb9e31d40e
-
SHA512
fa45ca9ac329e2c7b6c77c906be372a9c937cea76ce6746eac6aef5bd0d5df7d0572388c17befab595e6b51fe173101209701160e15d6fd0f3883a06faebab9e
-
SSDEEP
96:dAvOHe5yw4P0VVoIJNaLga+AK3fmeeX+7/16e6eTjeC2xhmwHwAeBA+nFPu2k969:WvOHyDJNSigAji+pFu2JxOivN80
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e9000000000200000000001066000000010000200000006cb2915229d0f461f027f3ee51117d829e18b9d64d66e94950d81c442884278c000000000e800000000200002000000028c580ea888dcd125d4dec6518716630cda284fc84362692245ceebb85424cec20000000fe77e3bd414df84dcde575326d5b904f48cc89a9bb3ff04051c96feaed2c20e540000000025e27ac7c22d06463ecdac0a9f24b00604beb185125625c7e7a67cb735dffdb6996beb42820351b179e66d79c6a0bda2c20e623b839595b4b2a1cd6afe30956 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405583631" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AAD24B31-7DF8-11EE-BEC1-76871049679A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08cc0800512da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2452 2624 iexplore.exe 30 PID 2624 wrote to memory of 2452 2624 iexplore.exe 30 PID 2624 wrote to memory of 2452 2624 iexplore.exe 30 PID 2624 wrote to memory of 2452 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.ch08.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5540dcbbb5505e4aab8a672a3a7539080
SHA17a192f35321945a07aa074ff5413bbd165c8364e
SHA256839025db86c3a1a01bcdc32ff81e3db6206b82234284e3c3b5b2b4f9fc18eaf8
SHA512783ba5078e5d2e99c06d246a7cfe0f14b415810fe9a3bc8147ced13d027958aff04975bb14ec4647b327df5c765b77cc232268c3243000a3d76bdfcb2550d1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5769d3ce3203e3bbcc576a3f6bb4353dc
SHA110f479b39eefec8f906f568edda0830abfafa042
SHA256f224c21275a6d52bf89ce566225638ad5e8c0e3a535557123f0a4e07b72587d6
SHA512d740f9222a07bd20c50bc5fa01ad5d9c8ee30e16a044fb8babc90309f34363e3f2970c559b0499e29701568820cc9269c65eb5b6bf3b97c164b2c43e0947d085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e29a2bdebe6be51082ce81fe6e802c
SHA199ebfefc4c0647e01a7526d85451b5c4265b7d22
SHA256a8ec7585a942e548857b2081928ee0f9ac43a6436ec3e8fa8992f45389904c48
SHA5127b0556b9a893a4e5d05ba32cd3eae70157856925628c018961b06c9f8d8dff2db86954037f2472216e6dac802775bd0b948172685518e82ab6d4fcd30a9c5e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f821f908ec1a3b21ece11f64b90d3756
SHA158f8504a7a7940e0150154346408a5f3b33b3266
SHA2563f93ed69a31e396c1b8a126cc99a2d337c98447a73e25ec38964195daf4d2d66
SHA512699a11c14ffe4d13fcc341dbe981d82ad3b4e10d22a8c8f1f0e04ac5a3f55b858fe75803e517dc01233939fc461abbb44450dabb87fbf968345def05b0e441e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5576c5a8572e92288699d619743f4301a
SHA15dd04418887468996b5c9484a3e08131a2e4e955
SHA256bc04536cb5f7e491465d9b1c5bd5457445eaf2b4efeb753e08bac75b74ea556b
SHA5121bc03fb31a74e552bcdaa0f21367ea701fe5dce6a617f9989a471a0b9858a792173c8c8bda8dee2ad75bf6471fee83f720bb667c0ef425dead158baccd7d9283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674e7b493b823adb81d784f7b0f1c1b0
SHA1e0e1f8c6495acc98184504801dc45069d2ae1a26
SHA25648c0743e7ffa25d0fcd5a7b9f461208a2fc8ae7a4c2185df9861850cfe21d6c4
SHA5125f4e7ecdc9ed1a7041a6eec8f48601019ac8545ae51324c5e1e5f5dc269ac6c77f5f9c4f21240d71ddf468aaec7a41153ce675b53b2640751b257d0591859459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccdea84bfda74ce96e73ac67bb1b6016
SHA167a367936f3a79ac9ee7f9a36786aa4a1a8a79e3
SHA2567c932b4a6929d91dd84e4b5d6ef90d87917457c11001347623e9b51e7f88a594
SHA512200880990f7326cfc03d046acb996a763044caf122d0e55a3164783a9aeabebd06807ef9a920fe7773ed6b77e63804a04e338821ed74e5a6ebb08535f0a45202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54231a18b48cb6cf3e7322d3d77e6b79f
SHA127e3d413b566a237e2274261f57e0d2778c4032c
SHA25610b45b6ea3959d03cd60510f2e00c472ad5e460839fd9b1e7ce20b60d20a3a9c
SHA51239a7debc1e2f332ba186f85576f4a3408e60fa9b869ce75a9256eb73be5bd43d5b5338960bbc9d5af3982479b96efe76d7baf6e46471597e723801d16e8e521a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52442c044ebcdfca1a307493ee07a4ddb
SHA141d82d6872581636b2de5f9794714c960df2872b
SHA256fc4e6726b69e3dc828c902aa0739929ad1cd2929efd0bf522a0fe3e0f71308f5
SHA512ed8de0aa2a36a779f198677f8f678bd4a65a0505730a7b0e5552c2d468fc9bc33e125cc2d6fc40e0f2ac9286ecd914bdc5dd68cec4606c1f36594a18fe02b15c
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf