Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/12/2023, 17:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tinyurl.com/z9525kcd
Resource
win7-20231215-en
General
-
Target
http://tinyurl.com/z9525kcd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DOMStorage\mediafire.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DOMStorage\mediafire.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000d82ccd19af7e20cf672b884b556bfc210760a2dc3ea9d4a25674120050c1383e000000000e800000000200002000000062645f7060a62280913f468e345654ba61ef5db1ee6af2d4142ad7820e0ad8d8200000009097cd6f0e77651d09f9550f8925e3263123c529503292ce0a1587d65cc19836400000003503353c0dcff72429af6240b408e76ca5f821bbcf17be592b02c8e965f1580a31fb8e2bd676fefcdcb0bb1ab5570ab41c1edc6e5271c71a047a3a258104fa54 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{885D9A01-A1BB-11EE-8CED-6A1079A24C90} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409515611" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307c5673c835da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1704 2532 iexplore.exe 39 PID 2532 wrote to memory of 1704 2532 iexplore.exe 39 PID 2532 wrote to memory of 1704 2532 iexplore.exe 39 PID 2532 wrote to memory of 1704 2532 iexplore.exe 39
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tinyurl.com/z9525kcd1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3588 --field-trial-handle=1220,i,10589487561675509935,4810998361050299564,131072 /prefetch:81⤵PID:2416
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --mojo-platform-channel-handle=3648 --field-trial-handle=1220,i,10589487561675509935,4810998361050299564,131072 /prefetch:11⤵PID:920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=4164 --field-trial-handle=1220,i,10589487561675509935,4810998361050299564,131072 /prefetch:11⤵PID:2508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=1900 --field-trial-handle=1220,i,10589487561675509935,4810998361050299564,131072 /prefetch:11⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5997bdd12acec355d416c0bfd528406de
SHA1f4032b306562f2046f85be981ae65d3c15d1da71
SHA2563c528ebad5f5398305b8decc14994582a3da9b2a2a2187b2d465871381af1a7d
SHA51225e70a4a755b6bab101c16e150ca18e6648f36bd2d7553f451a954d66852175aad9e237f25315d8445d5c3985e6f8655dc70ae77082160982d7d92dfccac6ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55019e3009ec3d5a1cbfd75d31c0705c4
SHA103bcf2879ee1acd2c6d43b9f4f985fa8a5a3395e
SHA256b4f002bda67f29e199637dd7654d6c2d9f08922989a402eff5199fa178006d02
SHA5126baf10aeee379910d1e96476a707a793b240b3ea872cf9c5779374bb2f67d3f9868cdc6bfd67ca8a7402b1e13daed2f52035093d3fd5c55d926f19f6c1b424fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dac7d3fb1ff5e66b381dd2e381f81181
SHA1c347365dacd88750da4de7bcf79ffd3e92008e9d
SHA25665319f7e85460997f8a5194dd7aabcfeb9ea1cb8f54781f0e977cc1a4d9dfca2
SHA512406798eadcbc4bbc944835cb610adb201945ba1b880465af8f5d46ed5479c468b5f07d0107122c6384fbfa8f25d9357ae44fe61e5628a17496e4522867ccbd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5981692883bb838d2d73c2be65afd2fb7
SHA1cc3fcb8420a5cb8b58d54133ece9aa5196f0deeb
SHA256ed8e5bd0dfcfff775ac46d384fa49d58fcfd99e4049a4fc8997fec3b6a347192
SHA5126f1863dbe006926a91d3e71075717095f30b5960168b40c3036a57ba56a9a366b2b9fec6349140130817b46140c6801dddaa2bb10e1a7007c5f40c14ecd9c1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e3cd075b126f5cf41f805f76d5ebed5
SHA17dacef39dad47f49685d4ccd847f96f474ca27d4
SHA256dd57266f1447ff3eb1d516d10a0fbc6284948061b1d85da20b1f3ad5d6bbc399
SHA512888943cc5b969cc9cf3912d9ffd2eac8692f37a2da1ba246bd8fc57a9c689b4a5f979f564519f26c600a8b878fd70e380b1ef64aac7bbe21922c95f006cd4b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53242791ca392ca445bdae7d974afbb38
SHA131f3fe7fc5224f09b1e9ac04b9c0820c52da4bf3
SHA2569dc1f1456ec30860c1509e3ab818e1eaf1fdc159904ab0a6da59d22ba2ad27a6
SHA512d6fe4bf82b1d2e8ebef8b3d3d4fe7eaf999b62420043fd9fe5b463470908b94df26e34624861e93a58bc21b7c41f2db9b400806e22697d0628a696e8f5e3a235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5372f16efa515455816e7fc09995d05d0
SHA1754b4bf4652530cef7a13069829b9c31be264a58
SHA256bc6041a848c42844367c5bd6438dc289354ea689f3f81ba40e861650bfe9f177
SHA512d9fbb7bebd9b22de7606b91d99975acd52ed0028831ea24c851d2cbe6e6f6afeb41749e521fed2b97361779537812adce977f26c05fb1c196e8c3be72333a2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5770cac5cdc6b1f7d64e29957d1af806c
SHA100cb13076d1f82ffd29293dcf1921ead9cf75e7a
SHA25619a4f69b515aaf2f3e09449f0be154256aad87a1da10870972c3905fca237608
SHA51266e9faca4903dbe833d98e732a2d2e5dedb9376015cfb055f4f45f170f5f70da87fde5316e80a0b41caead857d70ee4d65249988ab8c8d16b21159980c8797ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fa8ff4f132f36a3f27ca3d243684a1d
SHA175c0bee8bfd9e8778006556666911ddb21bfd5ba
SHA25626a962a4337936bc17e20a573a7cb472c0cfa283214a4d9207799dd552b63b7b
SHA512fcb48449221d7862eb1068b6a28334a51ac6829685ac0f672ec30c304c9952d7f838689e414557beb739ffaecc007f99869215deb11487959cba27fdba7087f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ee7b9523c0655a5e7c9f13cafe210e8
SHA13b589c8719fb928f683bca06becafd42b8254566
SHA256e99fd5b5f8d27991be77b96c74a15f1fec57ce91fd317103ff3e3f8d5de5ba52
SHA512f7b09ddd1dae41766729667bb60af87a2eb3d018265eb4b4e5fd1e65ff740f08df51e3d31e43bec31c1d399c7d0303b26c8543b8cdc07e2f02c055329cf84cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586643378acda4b0f69653bb91d9e033f
SHA123a48884ccbf353d08e75054814cf97fbf44439f
SHA2563295770d7bdd63df9750d896db72c3f87956067c66804c1a5dab3e668eed0638
SHA51250a078110f35bcd68e471aac07a675cd5282fcfb12bf645db46af984056a416cfa392bdff75cd9e182c3620eaca95b52728bdf8b6dc1d418f5c3f9021763dec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56339406c35628c59009bffd2cb2b2816
SHA1ba3640c4640c310caea3e0d549d3ee7aefdd2bf2
SHA256fc89c14fb00b46dacfbfe63b01fc754df99024efc93c1c09f1d79f9363a3174e
SHA512ba544dcfe76bf437b6e4fa0f11ab202622c6c00080a475a6a7aedb3e92595a945a538061ac6d735a39798c090dfa656e9c8d8f9477234da91a84e36166bfc558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d4c7aa31a075378454f72a71633a080
SHA1fc415c64d47003452931a393ed571bceac44fb40
SHA25654b4be7ca1be9594243abf7d7b8a219d542d767a42f4832fb46d91017de6cd8c
SHA512906403814d2a97006584654973f93c860035e45128788cdbd9716829a95e371be17a5b718cb77e605b6cffb1dddd452937bfdd0feba37791e1593d543c467871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7d7ba02a3b7adc1508bdf13406c0359
SHA1ed62fdca608c586613192bd055e0d719c2df9ab0
SHA256d73900110b835862922ac65ae252836479bba2ff6c3e6fbbe10181faf32dc563
SHA512337054b7038695c9de02eb01300919908f2fa3f1333eb8b2281ea9ffff8fc268eb4505255607467edbdc86f81548bbe7e6e48e7231a847a06222231e888a2e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59150bda61d6f0fd3eb1ecf3f70d54f47
SHA117ddf92ccb417c9f397d78b032b66113fc75103e
SHA2563261e9b4320c3c1aa9e873c76edfc18d38259ee5935ae9b33e5b685ca747cca4
SHA512e6f929b1e4ec95f7e15295df888e15a364f5c606bbf1ca183c2bb339fc2c03d9e64738e7c47632e8fc0bbe0b8938d57275860d320a25c2b5af96ac34208f394c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54132caa9bca8b5362de48ddc7dcd9d5e
SHA19c9166b95fa0a67073e07221696db50766aa1347
SHA2560832d01b216d34297629725e8cfeb9d4424011a61bce63c9654045bfce8d751b
SHA51278f83758762f731d5384950ec17c1fcdc5113c9b67006d37a61e3b814838f368c6e21bc5dee14a768ba7df01febe58ff137265c3049990483718e167e2b3a372
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1YVWL6AI\main[1].js
Filesize7KB
MD549f886926d8b7503c14e69da111a34fc
SHA1ec8baba46d5342a0c1936d0b7f0559717ad31798
SHA256f88705e2620b5982dca4d2b31cc11045f98599b28874f8c160e4332789cd11bd
SHA51201880279c396be3bce493980321319f1897cc04a8e32d3aadf09c5cc11b157bbe5c25680c6deb6e9dcf5d23d3d45775d004a33abf61fcbf92ea3c3d62efdea37
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06