Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/12/2023, 10:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mta2770.news.palmscaribbean.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://mta2770.news.palmscaribbean.com
Resource
win10v2004-20231215-en
General
-
Target
http://mta2770.news.palmscaribbean.com
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{183C82A1-9F21-11EE-AC0C-EAAD54D9E991} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409229367" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000c64bc583274175c872438376b3c8d81ce943d965177a94bf763149863efa82d000000000e80000000020000200000000c55084dbc1394509cc3a8743352cf8cc909696cb76fe3fda00c5db645e4c01920000000f369258dcdcaaf3ba65f274ea6ca9815c8508cc366540b23e7c704739df7c0f3400000000470c20f081c93193165f3e8e8ae6358521d8b120b2190b8e0f1ba5b1deb8d21c68d19b93fe7a2cc410c670a01dfa0a02825130d7ded8dfe1b663e126d43f6f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006c5f062e33da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2680 2848 iexplore.exe 28 PID 2848 wrote to memory of 2680 2848 iexplore.exe 28 PID 2848 wrote to memory of 2680 2848 iexplore.exe 28 PID 2848 wrote to memory of 2680 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://mta2770.news.palmscaribbean.com1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e0e50ad915589881b8318bac5fe094a
SHA1305a10b2962b2ad7fb7f658962fd3416c1aac897
SHA25641e5abb5a01372612aea46730510a2cc7b69d223f778f711f356f667df87c222
SHA512f9197b87c0cba834615435996fc1e5379dfa9657b100af9ae9c3a9f08511a5555680e079cf3073872f64466192c7e3fc0f2af170ca046bda06b155879f8368b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca13326cf454ec9cd8cc7dbc88665291
SHA159b40c6671785858fe7e71c91d67a2d0a886e30a
SHA256a5ff839df4a5c1874803c32f998b1c19e11d2a939e81e6bb6d859ce972ced807
SHA512015f934be9802c7b9128e8b1841a032185fdee54f50bebfd6407b852c8238c1147630c262181cc466fb93322794cc3918b6a23ae7f96c61718ce540992240bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f828d5b7ef4e683b30de61dc0d4b5fd
SHA11b2eabcebe6a0d3be48bba0f82343274fa46405a
SHA2560d21c10d521ce388bfe2afb0e9c5c25b450d3d71b660bc8a2cd68e7401d2a2de
SHA512d902b1233a6207cd47169691c91563488ab22088d53df739782818def0cc42b92a75fb153443dce570c8926085f1f26048262251bbdaf0782bedf0bd821becf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a09d194eab41c11700c6b5ac3f004925
SHA1abddcd695a19d2833b6080da6c0cc582e7e35ed3
SHA2568010eba252629e5c86dd546334bc375f38c89881a354c5f8d3b6607c3f2405bb
SHA51245b859d266621ea10c48c1d7f091618ea652fd9b2bf51fc5302f7651c7d19055e038445f496216e758d4e18d361f2866a1212d28ed931923b5076148785c5669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5645d7f2092d4403c8312c970ba86affb
SHA198a5d66349c695466944ee69574c927d9639a5f2
SHA25671ab9acf6ec4320432415c205eef786f16564be5d95f8df1f78b83d156286932
SHA51294445befdb1c56af62a4c6397fbb33c16c29777d16bc185958bdcc35a536fb541619a1198d600f72c7d71f75fb05b66d6f2d2d23f5e90a9901904169edb2aabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d6c71119ff13c58a273985ae1e1709e
SHA1881b484135516bc2dff3f2ad6f2fc9815f905f7a
SHA256dbefb0a13e7df6638a17fe58aac3110bc2b485eda9d6031c619f98c20613db22
SHA51235f084a5ba24b439a9ffe6e67b59f8aba6748c9bca1191003bff8f76c8da8c61907b5c951da7376c6ea2eb01b579f35e6d0b91545541e104f2c5ff3f1bdb2818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d270a54f76bfdde4ca76a50fb69235
SHA1b9b1fe088cf9eaa500cf0442ac1b75a6038c27d5
SHA256f7920bce2b72548616618741ada4ca254a00e41bc4a02da1239088c296b24762
SHA512259fe414b22e9f9df7c14581b8720a8ad6949a012bf4da007a98cdb216ae962a9a79f37fbbff716bb7a3454ab4cee9e93485f4c03acc95904d061c3d0399c39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dee8b3a8f2fce4e99a473d7e1f344d0
SHA16e02012c0716e41bce30f25d3b265f874c8657d0
SHA2562da75b2c9e27004c9794b13bf30794f5073e22fc182acfb61f2962082522aeb9
SHA5128cf8e421700e55434545cad443185bab77ca71c04eba0e53d5aa5d8570a9dfe806866e6a2b899d23298defd72fa82cd2886b8ce92a10ab3bbcc13f9b1f8a0f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdeecd0053303898b1b47ff81e8412ba
SHA1930031ee324701dca2d3f9d0d48ca840f6ee866b
SHA25684c459c8291d134f2c8433b562dd07c608e06b91a2974e0f48f58564f30b0e52
SHA512c19266ea457515a5c683211cf8e3c18b10a8c72557b4071df0898cea530f59855e1243fccd1c9ee6ece5cf3c9b6de9cb74d06886a97c5d3e31685cea75750d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523a2e0630f61848fb0b0128b15609d55
SHA175fa0479a27a806b8646ff51e6698721229295bc
SHA2568a25bdb3a35e5c9af02fb48dd8404286dda698ffe6aef9ab8fd5b2ca387c9bc8
SHA512ce0bc3aae130e0bab8e380303a3cd83e33155597763c5c6d22682747128c7cca9d4750368e2f7c1227ce59d5edc01543d9a3f33aa78a387e115a8c8db6ef00e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589c96c52eee42cf1c6cbfa2d29957e5a
SHA1a91ddc4be30ac0f9dfb6627a9ae35f2dcee94bba
SHA256c475c5ea1872616c7596f61f314749590649f07045e68f5aaef957265ba80a0c
SHA512547a8bc7463e3f2090566d8e0ee544be9881a20dd180e2e880512afdc809c8baddf368788a948f698a643ebdea028652d676459e8d52790e10ff524c003eb5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c046672f1a69a49a8688f0d98b0a5ef2
SHA13700387092b8eb566a4af3934cddd03ad3a07fbf
SHA2564d3a68f196c51013c3dc4a7362e73308d93173d9eb3c28e4dddc161a916b2413
SHA51234ed86e981ee84853cacf0cc87519b6f1942ec2edefbdc19b1a54e47c494a10b4d9c8e169b1289f81fb95edad62a023cf9f74bd7f438a3a2c4e76d77cf05471d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570de082eb48cbfb26cb458fb55afb8c9
SHA194a108f1b80f6300881c2c11a8339d38a4891867
SHA2567c8232b7b28d32712774fe64472590c21e874593b6329fca259e4a5b0e3e4e9e
SHA512e171c53731d147551b13a6976951cb04978803a11810f3d9e505fddcd2401da763150aeb7449bb23df9c656cb6004b4c4325715bb5428f89d12a263f52ac423b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528b13b7726546a65cdb4e7b305aca2fb
SHA1326576271d198d8870c851a88d67560dfeda2ca9
SHA2566b35002856cbbefae17496abc3821ad156cf3e48c53a3bb3956def7b44df73f6
SHA5120611a6d5a60330dec4624dc396eec82434342ce78841f00b769b59212337e80afbf7e48836a01f3b7b55eba489908830e559419784ad80bb169bfb3a718f3b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ff5cb26c80ee410ce37c71619e97fd8
SHA157d5a96c0621946ea4b95f0cf8b6e18f1b6f99af
SHA256de34bc565b42d4524370eb1dc522ca543440d5dab92674917e51ab71317497e9
SHA512f95ca6892d9a6d95c0ee813c9264cdd6b9c496dcdcdef4496a6fb03db9e5c57411735d7fa0dcc7ea4a6bdfacda20ce49a85133260b51aa5c4c40ab3216e806f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b4fd0c35b70a81c43242860ac4f2c07
SHA17362c4e41c523e511584fa369b528a544bf704bb
SHA256153da3e1f608404753304eb13fcb922a496eccb182e9ad7a4661740ba36548c0
SHA512a967640266387af59575701a9b03699950593c16104911ab10d914cc2146702303ed1e1e3a184e0f284918441c70d0af50cbe3e9a2f0d5a258e77ae511422412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5018eb925fc5ac88cb9a0b8530ec63b1e
SHA16f7eddece1fb4f4c2760342d80a9542caee9fc35
SHA25651b2e1c1ccf33c26a05480bc66859a5edb4f690f3591909833a53d60a049e868
SHA512cfe238650693f7686d2e2ba8c1910cfd257a74ded8f23a07d2237b48193b50324afce6563b9e2dc726a12104239d055b2225d6d6ea58fdf75147e4ab951d9a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54db79fff8dc8f54eff9e90a638542c21
SHA1cffcdf5f90617ef8e83ff994dda613378c484e96
SHA2564fbdb64bad28792a7bcce784a9f69ebb8ac63c5436a11832846d3012d494c3f4
SHA512d20824de0ba7d6d238ea8ec1a0f5477289117616c546abbb0c1019efc841b79855916d8db377b6c897b30c0a7184526de7f702cbfc4c17cd0f2b43d3de2a022a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9dd9c6df91ab33671255b63aa2d8304
SHA1368ae47df767c4eb0b4823fb2103f5da7908f3c6
SHA256c9815d9a58e09cd50c97e6436cdbfd679345de37797bc7f863af1e93bcd845ce
SHA512c265c9e38f1dd2457a8115eb8218f7ed9d526e835eecc809857bb4e00d58ae3f6051466e7cceac7d5649f29300f42c2cd2b0e9d414e0d5658fe32d8044750373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be53fb307f55c9764d02d42acc50059c
SHA1b37f5f686e75e8f7bc580774afcbd0179bea4e32
SHA256c765df61979efe7933b52eea02da9e33bea2711630fc2ade01e28ef82ad01823
SHA512e6b8ee36eb90c2f881b6727a587fa9dffa55c0d1a4bcf480e7c2554e9414e7e281fc59093afb75a5c69170e7d2ecf849019bd1ba236247330c6073521347eacf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06