Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
195s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 14:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://special.beatifulllhistory.com
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
http://special.beatifulllhistory.com
Resource
win10v2004-20231127-en
General
-
Target
http://special.beatifulllhistory.com
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd500000000020000000000106600000001000020000000b76d1fdb40b7c559a07687c71dce370d85be151e23ccb82239fbecff298c85bc000000000e8000000002000020000000650ce2372bb9595b3e0a8255c1216b35575c8d6e9f53fc5199a3d56862c81c87200000003a7b6d122ac132b3105a3551291ee968366bdd9e6c1561e7f68955b2f5a424a440000000d7f8040ef0389fb67dd03da580badbfb5f05e26f85d19053d39bed230d59e03cf62c1fb1f3e8d454b99c2892e183a5ecde7566d0969f2003a491e8fed1297237 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "408465883" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78B49EE1-982F-11EE-85FE-D66708FBED06} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a8474e3c2cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1400 2356 iexplore.exe 28 PID 2356 wrote to memory of 1400 2356 iexplore.exe 28 PID 2356 wrote to memory of 1400 2356 iexplore.exe 28 PID 2356 wrote to memory of 1400 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://special.beatifulllhistory.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aecfe98681c7bf175ba95ed86baa505
SHA1a842e6c79f0ef79d339a570c6a219300a252dd46
SHA256d9109e1c1d0fffaf9282dddb0e18c32e95602b293fe2f69b19859e3aea84084b
SHA51245377888aa2c6ea102715d890c2977cbbe288c3b908cbbabc1dfedb5298e48dcce665cb9fde186a7fd80569745d86dc899e3650b27a558c8285bfbb82555f9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa18a8a9aa3b02a31163858b9ff80064
SHA1a0d7e8e7610564f3a69d590118bac7765b62e6ab
SHA2562e96e96d88886025db5ceeda3c830c36ef46b426829393f9ec91e355091e645b
SHA5128cc1ab33a78bd02f26f8d795f2bc18a7623bbe5a7d5bd8febdf7cfe3a3449eb128a87208b58cd6b25848cc5ecd82a3f49096d545ada7175cc381799a27643d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fbf55f251b335250836bff877161ce6
SHA1cd34234b75888a461e913b8bdd20bb486543c7b7
SHA25655c547c155c75233a5962be0de41db1bea07c55dc79375a71365512bd0b9451a
SHA512b74f3025abc305090bf4174c8bbce499e12213c980a964202eb744882301521a166dd934fa5dd80a6b3315031aa56a19cbf2b959317cf8487a1d3faf3cafe4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1c413505041aef455eb8c6ab9a9f83c
SHA11c0272f0459fbc9b1c75e08f97dd7352040e04dc
SHA256fc427b8e5d6573df8f394ae861b404ba798d6f6c4f2c85c630f075e4a08da2a2
SHA5126c53d9877bebf58d5352be79cf0310fced3d2097e831b405e4636723ca77ed3002eeb75557e288ac0631d674e218fe9eee7b61bf22c22283ecc1fb7c476d02bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d9c7bd9c1c9dc6864730ab7b748e11b
SHA1f5e6bcd692604e46ec5776cba23934c2729a1757
SHA256d5f239d2ba58e84f808c9b0f466e090c9c6c87e9c275d38034d807cfb61f04f8
SHA5124fd62239f7aa04a25321b680950e3ffbe8688941e232090bf145e97f96890455aae6ca35872563a889460d7f861ad0fd97a68276a944abf0522a5260b0ea3f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595714cd6a056c9ab43358c87319173c0
SHA1611916bab0c5de59a3d60d090a0c72c18c99a20e
SHA256994a1950e64eeb29e577419d51b233e339f8bf4a53094f3eb395204698d61a80
SHA51264b5e27a43e8498803b6ca747f21f5ca24cb4a9328a0c247bf8282312a9c41c9ab798d756740d38296793ce00adcf345a9db41fcc83b91f3b4031f241f3759dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5521bc714d80ee91d3675e88403165ba9
SHA1421fb52857d7a5f79c440e914e308384efd75cdf
SHA25608294e3b5641358b13779e84473e97efa9d9154f79882324d1b269503138edeb
SHA512eb8c69da50fa6106b9e5f61ff09495dc77b2c611a523a1e2e85e70906e8245edbf6446bddb2e5ffb4d91f75895118f61e8d90fee35a2f298aaf7918a3be6f343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d04d42cc43130b665c316ab5e0dd9a6
SHA1887d9f8af56e03da6c678ea671deca91585df412
SHA256d28c81d98a0956a0a8a2731cf251c7aa8034da7caaedb36183932f641b09212c
SHA5127f57bc4d7af8ab4a7e02bf419f818a390909683ef5ed749b576238b11e09f405e95d33746f487a3d3dc283bdb7ccf6cc3435aaf92f00ec546d6803ce5dd5e97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5587809d2cd15aaa83e0c9101a4d2a665
SHA1c0f9e0ff40df2ae42681e20e254a4fc37e582e43
SHA25668fb0a7a827fc9efde74dcf19d3d082cf7ba011ab8c5aaa58eda7e163b26ada5
SHA512d6e2370be449396da7abba008e0179fdfd8619e4d52b07e1828a9e201345740b6801978dab16adf531c8ab4b7f059f7c025556ab9e885008bfb0802956218fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7232784681dee5296a5dadd1aad07e
SHA19b9366af38d3346ba0a53fd04956585516e8ed04
SHA256de0f5aea48eed57901e64b62461ee7972d9069ed281122ff51e92d5967b0d994
SHA512b71fd07dcb76b1c571060b2d0b6c60b5c814d40b8f7e8ce8f3c55426e75f10202ab645837beb8f92c4135f914684e68e09c7a037f0896189516a316ee2ca1bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f652cd51930a4eb91bac4deee1c0eac
SHA152fa0ac8cf1027f3ff063eae5024b064251568af
SHA256161fa2c5a16c52a96a941ecbdbf531dd2857a9e34ab4ee572b87aba992b12a5c
SHA512b8969d7569670c609933b62931ca7439b7ca8ce2aa017f7b332bd96f9fd8079842e019e3b6eb976c6a4c0c9e86e3b272d22ed0548d0c0546b93affcd5f011d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c83f36b0f6e4045f07be878857d415d
SHA1e67077549775594716e6bdd70feb0939ff8421aa
SHA256f9f4534ae64e1c887dc10a915c1cdf180e23803d00349c0197d0063f265a85f7
SHA512f62e1640f55a53ea0bbf9ffc5d0cdcffc21271364e73185dd425983e9191c13da7781f9cfe6b2b42fe985ba7478bfdf784e83731dae785d5c53f1bb6add3f6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a57b9ae555c173678d576e39b93fe856
SHA171ec61a4b1fe5ac6594dc3edfa96b7b43df2eda6
SHA256a8e6f8781bdd41603950bbd5391944709e3b09e60c1319e517c9fa7247f0e265
SHA512f87cbd4b4eb62606ff5d4d87aa473dd15f0d462d0813e5b31cd828c2755026f7331bab3f350827e99ed0375f7773138773e36b16cc2dd86ad666e4ee6970d9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f67c18bf71f72c9b12b6c286f72142a9
SHA1ddce6d8e3efc3cb237e41a131b8e7bc981e3febd
SHA2560ecde0f849349e42900713deb751eb86b9a3231cf1884b1ca837821c25ffae21
SHA5128e788557d04c1a34fcc0402fad7744f43f92d9e6906b7dfdf81039e5a3883187972974a21b29bce0e77ed39124d56e9e13d34c1d476615b06ee4951c49e75ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e6252680fe218b4d1c72509d69ba2b8
SHA1c5f8b5173f37cc66f96a3f2ac66207af8f0a26a4
SHA256fe8e0aefd1c3bdbaef4be772c5a1b8b4130fbd1730a44b3ac02630cca4a87b5d
SHA5120750a5be7ea526c94aada2a2202696b142d00b3c38e86b959fa8f82520dd9a31d17d0b7ae5da61a0fe6ad51aee3f1019b3bddfdd9397ce94a2e0f5398dda4626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e05495893363cfe9ac3324e613b377b0
SHA16c59e81d41813e45dd52116ce200f13f93104232
SHA25654a624cfe5003eca8bc7cbddcdf3617b34e9b1773f358f7e83ed1403cdd43aff
SHA5121d21489710f438242c2cef52250d32f310d89b97453e2f0def22193b2fd1b8d3253ba0be7234500ea7824752cb5cbc85bac4b34ebed71ad5bf7b39613ddece3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5375450174dde34a1ee7b125ac6ca632c
SHA1f2c635965478417c69720160774b480b559515e4
SHA2567902cfedafd24c09f598225bbe28d74a4a709b7f70204c7f1ce35b01079c4c1d
SHA5125d1c248872cbde94da74101ae30cb04c2538f066953a0537b08b7f044600a7e4b710396c33202bbe1436d70f8e2cd0ab5e42ccd3fffddd0bfacdb254f0feb2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5796381ec0056bdfbba55c845dfbd0867
SHA1677fb46f49a43943038963461c45d1f7c52217dd
SHA2566846323e935a10d5644feb6abf68806f5f3f4ce2d8b11104db350cc308c3e867
SHA5124f4830b34b89a2d80683e017c2d55e2a07fcaa8f1350943c694aeec0e7f1d9e783452e52fd663577b0c8cceab58c2867e7e1461e8b9231548654b4976f6933f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2391d33be6804e7cacf389a2f2be213
SHA17bd3090359615d1d7cb73de930dd76fc1278c063
SHA25669e1063b00adf794c87f482eca73482c61347ad9b1bede03f914d48328807ee7
SHA5124f0315f6b6c9ef2444b95812c426c7b5f545a071fe7ae5f1dc008989fa6dcb3d41e95f2aec1d8f0262b9fca300bf9c5123abb779f679e9e526979904b25e9474
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06