Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
10/12/2023, 19:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.movable-ink-6437.com/p/rp/23862d605ea37302/urlWspcBe8� :ex|[email protected]
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
https://www.movable-ink-6437.com/p/rp/23862d605ea37302/urlWspcBe8� :ex|[email protected]
Resource
win10v2004-20231127-en
General
-
Target
https://www.movable-ink-6437.com/p/rp/23862d605ea37302/urlWspcBe8� :ex|[email protected]
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008d5ea254cbc3cc499365b391a5fd669200000000020000000000106600000001000020000000a00624f75cbec1a3a1e7dfe4c6b2ac0c10b7b41bd16c7901b05cf996da6813eb000000000e80000000020000200000005594862974db16f23991f3b73a0695cfd28aa8c8b1c7e52798e42353661108a420000000e6117ad36264c4b6aad82749cf524be223c371f275c24c961645f0ebd348b30e400000006c9ce347fee45baa9b94919d69fb4e983a84ffb0ae38b1ef427652af750726695d0b287298df3234fa6d54bf5917e4d0ec7067ed5795a06d2c3ac22f5559f8f7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADA5E0D1-9796-11EE-A695-FA0DBFC6BDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40375989a32bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "408400270" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2648 2764 iexplore.exe 28 PID 2764 wrote to memory of 2648 2764 iexplore.exe 28 PID 2764 wrote to memory of 2648 2764 iexplore.exe 28 PID 2764 wrote to memory of 2648 2764 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.movable-ink-6437.com/p/rp/23862d605ea37302/urlWspcBe8� :ex|[email protected]"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c0eca24bc75cb13388eb4b26570c3018
SHA1fefe0fc574674eb22dbc185d9af9d03104314810
SHA2566541aa1ae1b95ed8fa0574f5de49e5735cb30d2f1cee2721818452fc7a167737
SHA512e372dd18833e03822bf1672a638ab108a213b7a74542455d23b486bc1d6117617e9bed31b1e4920b9948e10cf3c4687c8d42fab70403337c671c6d32a573800a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afeb54f73e3cc724eb2ba8c641aef5f2
SHA1efc1a10d6bd14df66d3ced4b68c55ef6048984d1
SHA256c66b64bf22e766545806dcb9a748896b65d55bc2375e4d8897f4b59718b4928c
SHA512ac85a3443025919cfe9e0ac9e3df9f5e8bd17e6c532e452a3f15f84ade8082a095eb1215c53a1f72cefa73c784c2b0314c29e40074ab768bac41732f205f4b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbe6f54fc0c2a4bb622a6ee1294e398b
SHA197ed7b724706c29ee2e830749a07379e7e5dafea
SHA25648f268739aae377788724beba4278c2f3cf9ce11e9066ba2144f65ef64f64439
SHA51296569157be7e1968c04478d33903320a08335a3331a5cbd1b9aa7fc4ce17fe894c06a075e10b4ff9e7b239cb0c28119e3c1549c0f77e27a82c5c1ca926f31b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc70d258b9e6a475b89dbc051b4dd546
SHA15b5c288cabab232325732320cd5e78a10218ffcb
SHA25665f719d903577dd1f7018d559f2eb836b4d905d0ec301c07ea65a79769dc316d
SHA51294e6c53c1e3b3314e3736c3fa890425cd466844ba975399bd8e3ee1d20b7eb37f807891139b146a809de66c1ae7f73165f762c17f06428d487b33ae84e63965f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799b3f004190e85497be6e3d71d5bfe7
SHA1986fe0f2c9254fac88daa7026ff3c08990a0a5ca
SHA25693d957365079fa2e0ba7e8891566bb07e143407b8cb9aeca5fc6f4910cc6eb00
SHA512c21b9c5858cec8827a264ab02b788d6a93c1c89793a67e06584aa760fcb7e884eecb7a579b3652116445e07a41fb5d4f5712fb9b996d1a6d424284750a72bd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585042dc482b7e04e4ab1ab37bbe55e35
SHA1155cccffc96bdff9405ca62bea3dae4132d9ec9f
SHA256113297da5944f45ce8ef4cbe79c6e6851d249b86ec0e4f9cfea616a636ad72bf
SHA5120e8a397927beea5900a8b067b800b853812640d486e6ffac7005cb7ec4d027f1d57e7adf8a67d73bb240a232b0ec3894e339dd42bdf5715aedb333ae75f40737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d17d256b97bb13a3432b504e3399f39
SHA12146b5c63bafa806162af5d050555575ca7dfaa3
SHA2564df81d5e93e3f5958f264cff32b8fa03415b708cfcc51192b3b3fc06e4b7c577
SHA51296e0724085a67fc1aafb12947607b837b8e47144ad64a0bd7b650200d4c3f4ae988740b6d090232a897064b50704bead404341e9848555c127163f703cb6ac8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac622e3b63cdc6985e14892164f46949
SHA168e0d9d21fad6e6bd9107f8a71afd096d18a6666
SHA256c78cb399a8a8641c9202f0c4a41b4594fdc759eaf0f6c133b57383eed1dbf159
SHA512aac361fc34f011b19389d8164d176438ee521b5184db62223a58e5d285feae3cd385919102a5f8f8f86e6f5371e0a09d7912660de47c9e1c09b8436c3cf50fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed1dc9f208d0fad22c331cbd0ebf03cb
SHA1b97207f9e1d4f286990272bf9671545a2a592248
SHA256443383632a6d699f3f8b90064e9ef5f95f9b39cb2ac40d2a403c9c0b5edf36e2
SHA512ec3cb6d64cfe01f3d9569c93b1cee2d4112b2662314210ca5d885e933a9913bb08afa23d3882d1cf2d210018d7c2e5b94ff148faafe98fe85e2ec63575cc95b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a729eab5fabefa69cadbabf8f0fca1e7
SHA1d70f4839145cb3ee1a68404240012b5579660fc1
SHA25639a1bbdf004ce6822f91008558857d340d93d672d6782dbdc1b76c95aa70edd4
SHA512f96c22aa7f076fb993724377c2f667c0a9c2b23c75a5c035dec5e84880718d06743ebdeb3884019449e4b9827e4c4b404e37c891a73703b237baeace4ec61d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a493db6f9681b2b510fdd4f8e0ca5b17
SHA17f3d546b30d23f31f5ebfc400178f0d1d7695b1f
SHA25646c68f5518f54f131a776fbaa5d0da7b6e72b2f2c343eea6614f3b6cc10de1d6
SHA512693ad4e21bd57eeaff4661f10adc1d5d21ac5c29c2651498907385c5290e1ffcf92fdd919f77bcc652802a4a8f3e2858aedd5058ebecdf5696b895dfa2e1987d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550d83b3e0f5071b52307eb202b0dd654
SHA1d9847a0016da7050b3d247aab1bb17027447f1b6
SHA256893f9ac9c55bc899c9432274650b5f68f93a369c4ab1be117ad027ded4e66128
SHA512f95220c2ca92e842ea111c404babc898875b641ed4c0a95d369a7744d58578f8943dac9a80cc56ef6f4ad4dc1ef0f30ded3f55f3f093667899db6f31dc0f5440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf784c59423ba5c7f2251f7f4f97f2de
SHA1037101fe5adbeeb8a4304df08c32fcc177cfe227
SHA256353b9dbdb4c6bee863f103366d48c0fcfe99e2967fc2fc73adeefc57fa1c46e6
SHA512c07e169328de2f6970f1995d148fdc04ed5ac824e53ec00d7a6ea989b12ef8fc7a650d17eaa48fc3f5c1d4a56b5b409ff9a11261ceba2389487c9582c8338c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54853954f5038aed34588b103f72e4218
SHA14087e19c88ab87ee2427c99053f39dc13de533fe
SHA2569d7a007f0c0897f3d75080ed07e8038e17188c8619eab656b378b8b0a11eeb73
SHA51223f592c5d1f056b10e7e0592d7e7964e95917d6a9a1301f38bebee87f511f7535516aca0a30c7f26265b0edc4c6cb934e4c1791f4437ec8d51e600f4a6cf3440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac50eeacae3ead1f540c28017d15fb3c
SHA1a078e5274f9882dd895f11ee9b7319023ae9ea86
SHA2566592de995390d7520276f9d93ae50d1591c060151f06a8ce5ff633f0f0edda1d
SHA512219c4f406e2b1d6708620ecb5efdf6ca157e23ae7b2c8c811208291cab22170efdc0d68e5ac987de5009d6d9f03eb392e945e0d4de39437462e38978f1abd480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584e3aec0c51689ed2fc0ad621874ff73
SHA16287f091eabcb900c64a686b5998e86644b90974
SHA256841ea5b2d032fa00c953db3fd4c77908e36756345b3023bf1a8814cbf2cde067
SHA512c45e59692a4969e138d8962bcd448888df3c988af9ebd0bf090e8ae8df2cf22b29e2c776a40375a159ebe6fc0080cda36edccde935c21c7f48c9a6033c46cd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD598a4466f23010aeee41396682ffb253a
SHA1239675a9932dea0c7a33d1873256d5b6fb5905bb
SHA2562e9307390b25d036b1831d6bdb6a98e4b3c2d5f6176a8af390c841c568030306
SHA5125e3cfa2adf9d4f27447791a43e4084f6e72348e106bfa79532053ba1d0a474f5f7423a3281389555f3906abbbed30c95366d26ca1010f914dc69078a01accac4
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06