Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
1360.cmd
windows7-x64
4360.cmd
windows10-2004-x64
4360SE.vbs
windows7-x64
3360SE.vbs
windows10-2004-x64
7361.cmd
windows7-x64
1361.cmd
windows10-2004-x64
136OSE.vbs
windows7-x64
636OSE.vbs
windows10-2004-x64
736O安全�... 3.lnk
windows7-x64
336O安全�... 3.lnk
windows10-2004-x64
336O安全�...�3.lnk
windows7-x64
336O安全�...�3.lnk
windows10-2004-x64
3Internet Exploror.lnk
windows7-x64
3Internet Exploror.lnk
windows10-2004-x64
3copy.cmd
windows7-x64
8copy.cmd
windows10-2004-x64
8cpa.cmd
windows7-x64
7cpa.cmd
windows10-2004-x64
1ha.vbs
windows7-x64
3ha.vbs
windows10-2004-x64
8is.cmd
windows7-x64
1is.cmd
windows10-2004-x64
1runonce.cmd
windows7-x64
8runonce.cmd
windows10-2004-x64
8tool.cmd
windows7-x64
7tool.cmd
windows10-2004-x64
7winare.vbs
windows7-x64
1winare.vbs
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
360.cmd
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
360.cmd
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
360SE.vbs
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
360SE.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
361.cmd
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
361.cmd
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
36OSE.vbs
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
36OSE.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
36O安全刘览器 3.lnk
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
36O安全刘览器 3.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
36O安全刘览器3.lnk
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
36O安全刘览器3.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Internet Exploror.lnk
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Internet Exploror.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
copy.cmd
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
copy.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
cpa.cmd
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
cpa.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
ha.vbs
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
ha.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
is.cmd
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
is.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
runonce.cmd
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
runonce.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
tool.cmd
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
tool.cmd
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
winare.vbs
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
winare.vbs
Resource
win10v2004-20231215-en
General
-
Target
ha.vbs
-
Size
1KB
-
MD5
97b8dddd4361596cdeb6851a0639d834
-
SHA1
7f35a8018d53777c449b9703a867c0f41b542e62
-
SHA256
fa554b0be47bc18d0992bf700e8495ad29237d88413faac60cc1850a51dedb80
-
SHA512
d3103e2bd9c5e272ae7f80e27c62ca70ee06adb6b6c85b2c60f34e781ed54f140caa1cb4f0787256e4e66cd47dd4047cee0bb50a13bac581a05f47d904009f4b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000c58b1c882c552946d695f67e20dd6c6278dad6665fb12b5cacc2a2481c351b14000000000e80000000020000200000006368dbecc1d364c5a8758c0a03c975157b5d939e2865e129754867c560cf6e31200000001e17377cb9a6004074df8cfd74f294c028094da2649631ab889bdab828e00b5f40000000c40895b3f08bdaf50a54bc7589f1d4d0b660612eb3aff49d3b7ba979db69a9616d1a8518e40cb1d6c87d3f519a1f2ac8c6773076f5deffc5c48fc889bb922e29 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409613058" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CCB9D81-A29E-11EE-B279-56B3956C75C7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d5fd42ab36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 660 wrote to memory of 1468 660 WScript.exe 30 PID 660 wrote to memory of 1468 660 WScript.exe 30 PID 660 wrote to memory of 1468 660 WScript.exe 30 PID 1468 wrote to memory of 2700 1468 cmd.exe 31 PID 1468 wrote to memory of 2700 1468 cmd.exe 31 PID 1468 wrote to memory of 2700 1468 cmd.exe 31 PID 2700 wrote to memory of 2880 2700 iexplore.exe 32 PID 2700 wrote to memory of 2880 2700 iexplore.exe 32 PID 2700 wrote to memory of 2880 2700 iexplore.exe 32 PID 2700 wrote to memory of 2880 2700 iexplore.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ha.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C start /min iexplore http://www.dao666.com/index2.html?cn2⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.dao666.com/index2.html?cn3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505185882b0f70c817db9213c7e9ea85b
SHA1dcb23aeb03d61e9080e1267821e24e8ff86a85a7
SHA25653e50893476b63f353b379ac200c38516a8c3d3302ea077b25c8caca0123ea61
SHA5126e94ff3f88b6dc12661891add0528d08fd0b139363bbd08e006b7902464e416a8f39afe22bd27f5080163f337fa80842a37585a81d3f61b67fc80c139ac732d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff04635c0c97270c912b20db1d229cc9
SHA142c2e0638c563bcb4db7cc4c437ac2f10766303f
SHA256c02f587f7a0ce24764fe60feb30382fca72cc5806cb63a258246cfc32f48ae7b
SHA512e8eb3b39351798eb628a6b221ea179ec1dbec661415b7f00400914a9f1d31e1a4d3db060f5e82460dc34125dd437899fae362258a1642cc51edd0735d862f6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5472cdf9c53288bda22bf489f700ec044
SHA14a96c56e4f55d795810a51dd74327b583654f908
SHA256b66153a98ea4826a153a68359fd4c253c806dc3544560d294b3682be20bed8d3
SHA51232bf2848a08b4a85c8f27e399f179e7d17892f5b47a98c2c6a5146dcc51c5d74b5acfff67597c9b0f80c68cc13b73b7ad72cbc0871eeb28c61414261c43c1e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228076ed19bdd7aa3b0fc22767a27db4
SHA1217925ee68f281ba868f692cde87e258a1d61e52
SHA2566f2d0f63e40d0b45c7cd8ed00d0ad80d14557d69ee093e94d07d7fc2628e3e73
SHA512ab0559a6191000ee63806e058ae0df28930d1901e47e9cce9f552f9a48cc4a5f5150d1f6ddd00decb7160846b373c3b465c3df7f4ce86929a31bf39bd046b304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574f2424c52d19be8b3cedd5d4d67c8d0
SHA14942c162c1363ac9222f713d7bc02240e3ca32ba
SHA256c2ada3ced016356cf2004dccfb7cf5bd7b7f6851c3d29ee401af3a2345a6a25f
SHA5126f6afb9d8ce0e65581f9cc3bc23c65d06405b339c951140d21b8a971d8ce472765350e9cc630483688cf05bc8dfb4b6f055ca67456c68ccb06ada283748c3c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef096e8ec67da593913049bd85ba9dfe
SHA1824f296cf4b311fd7a891f91adef6662d9db096c
SHA256e5fa09e30a7ca7ec390e94b360fc4cffd77b569bda4e59b9521fd4dece7fe3fe
SHA512a720c26137f493e0ebb653ea7cd04659ca1e99dcff226bcb350d075655cd745e7c3333ddaa116666b9781f1628615d5e71b59268d3d41cd1f883060c7786ae40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b0b63af5dce2c12fc6f265c2a8bbcfe
SHA1f5357e9ff15fa70fda5649a590f2c93a624f21ce
SHA2562e16a07714fc360b49a5596e3a1df102200dfe72f963fd00d176190a4119b5ab
SHA51247b6e0f902b4bc2dc6b4b1387d2b72dd43ec8ba7d210134f77174d3980b041366fa5183b1cfd22512ad223d479be77a186ebd44ecd71c34c1cdf853e00ddd587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588385a93f553320e191912c789659ec6
SHA1d84d7f4907b05520944726c55853e911d2aa9a06
SHA256b8ff1262845742bff1a6b92d438d3dad64b18012239191d7e56c9e20ce0aa7fd
SHA5120e0a09d437518eb116462379a753d46b7a376f562972e5fec26a171a7ffdb890ce397deb37f79c5a123fd4af71fe3c8e4ee2e835fc1a44d0016083584ff51ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124955a0a60065679c3a28a32111eae9
SHA1397c6aaba3df4fc613de6a18c0bb1bc0373d5de8
SHA2563dd05a2ad07b243a3c3c4bccb220742230a3dad4438b14ff133dbbb29c9b442c
SHA512615f46a3ff8b3447c2472374c77560fd865ef79a39c1d8f8df0e02149cabbcad4a922b847a1e6c58129c04ea4d122bfce2194976c6f2c6edff3c3a4ad3e44ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dfcbf318fd8c366a944d9ef98d9095c
SHA10cdfa043ee0e4ac00269d98c4360c03561ef6c17
SHA256317edebe0779dd033136a5d4b8df9b195938e0b49e026a0d5eccffa6604aa1cf
SHA5126271271207ac5484fd7119b3246f458388a0d1feb064c4ca098bccd2dfbcde4686423496339977bb35f4257fdddd069b9a320441c716c173c100498182a66856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5efa8dda0eea96e2653d93b9db89845
SHA17241e7871c48388b37753685f8053885bf9d1d5f
SHA25680795b539c181329b70289477425410765ded7425f123e567e573be4c3beb380
SHA5126bcec287b2b86595515064e802ab56f4d58d7c655b0ae8ebbba408df36a8b41b7ce1306fbbd540db68b5cf4a6b9fb3357e1d3edc575cc4f237489ddaa047cc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6fe62bab608ebd4049df4640df2ebb7
SHA12a5cffc9dab84ce7b73e722140cf0e419514a2b0
SHA2565f641b59f0dab4d447ca2df20eba7a95e007c1906454ccc78076e390c5228407
SHA512ab5ddea10ecd67a35f04819311cdd224ecf23e70f0146119ae2d23eea82235947b83b2aeed45ddcba009c2057355a124d04d8472a4bc5d8ee221abe64cc0a14b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06