Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3More/Audio.htm
windows7-x64
1More/Audio.htm
windows10-2004-x64
1More/Business.htm
windows7-x64
1More/Business.htm
windows10-2004-x64
1More/Desktop.htm
windows7-x64
1More/Desktop.htm
windows10-2004-x64
1More/Excellence.htm
windows7-x64
1More/Excellence.htm
windows10-2004-x64
1More/Game.htm
windows7-x64
1More/Game.htm
windows10-2004-x64
1More/Internet.htm
windows7-x64
1More/Internet.htm
windows10-2004-x64
1More/Multimedia.htm
windows7-x64
1More/Multimedia.htm
windows10-2004-x64
1More/NewLive.htm
windows7-x64
1More/NewLive.htm
windows10-2004-x64
1More/Utilities.htm
windows7-x64
1More/Utilities.htm
windows10-2004-x64
1More/WebDeveloper.htm
windows7-x64
1More/WebDeveloper.htm
windows10-2004-x64
1More/allfixer.htm
windows7-x64
1More/allfixer.htm
windows10-2004-x64
1More/avifixer.htm
windows7-x64
1More/avifixer.htm
windows10-2004-x64
1More/image...1.html
windows7-x64
1More/image...1.html
windows10-2004-x64
1More/more.htm
windows7-x64
1More/more.htm
windows10-2004-x64
1d3d8thk.dll
windows7-x64
1d3d8thk.dll
windows10-2004-x64
1keygen.exe
windows7-x64
1keygen.exe
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
More/Audio.htm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
More/Audio.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
More/Business.htm
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
More/Business.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
More/Desktop.htm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
More/Desktop.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
More/Excellence.htm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
More/Excellence.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
More/Game.htm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
More/Game.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
More/Internet.htm
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
More/Internet.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
More/Multimedia.htm
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
More/Multimedia.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
More/NewLive.htm
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
More/NewLive.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
More/Utilities.htm
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
More/Utilities.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
More/WebDeveloper.htm
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
More/WebDeveloper.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
More/allfixer.htm
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
More/allfixer.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
More/avifixer.htm
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
More/avifixer.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
More/images/style1.html
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
More/images/style1.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
More/more.htm
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
More/more.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
d3d8thk.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
d3d8thk.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
keygen.exe
Resource
win10v2004-20231222-en
General
-
Target
More/WebDeveloper.htm
-
Size
6KB
-
MD5
c3559e2df8186eb4da5ee04d73c688bf
-
SHA1
09e164078769306749ffc8987971b486854b22d8
-
SHA256
4de2696ed42e08a6e86138c63351fb6b9707be03bc2b66ce581ae764f7b0a394
-
SHA512
a66cb81fa11b3af0ed9b4a89b960a8f41e1ee8d19e9bc3f49a6769e80d2631e7d509eeea952a0a5283a18686f6a3b17ef0613fda4e2f6fdb71ae507ce1f024e7
-
SSDEEP
48:bpIE8S2+bS9/L+ZotqjldAzhQabMgokeXCAmu3xTcx9MoGH+RYxIVW9MkBLsDryq:IShShIkeXCupC1C+RHIEd8ul/8uqAhv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000007d55e15be4cd7183ea65d5a4c18f5b672e9c0d95a586fbb0b2fb660906f057c6000000000e800000000200002000000071309d87fde4bef19221d5f80ad014b131b768418ce66d64d8b0e1cdd3c41f68200000003df7855115522cf5ddb8c703f1cfc13becad1897a86a5905552ba7d20e339fa840000000efe51847a4450603c717ffcb610ee310ad8be83b421119f695460a52fdfdebcd1d5cbd98fc0eb1a4d374398461cff673d320a9f348d2c19abd27f34f53623052 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3325A51-AB1C-11EE-9A90-DECE4B73D784} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1091a3b7293fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410546978" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2264 1568 iexplore.exe 28 PID 1568 wrote to memory of 2264 1568 iexplore.exe 28 PID 1568 wrote to memory of 2264 1568 iexplore.exe 28 PID 1568 wrote to memory of 2264 1568 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\More\WebDeveloper.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ba0dd17ee8220fd0eaef21b35fdb5e4
SHA1dcfae34fd52075d6f6012376f8ef509847acdb96
SHA25666ec50617b3551e5ba3dc1dd110f130b6fffb517eeb1f202fd9f502945f1bb0b
SHA512236ffac17ab5fd9acea239356f4f38bc7b25df887895dc3c7efbf7f8e466efdaaf6a95e7f42412ee0cd298c8db7531a71ccd9502ce0bb858ec1937bb38528a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e8abbb8907cdbe3b3c28e30c3b21e93
SHA1cc731088df9715a481caa626400ee2c6bcf7d4ef
SHA2560208abe377ad935288427b6d129370963bd578a6c930f06814c5eb66f8f8e25e
SHA512727aa5564a18c56958b0a66cd6b98f0a4cc6f4af89ac324f931c3e8910fee68cc77ece19969002c299f6cf90cc851f160c0dead556f8fa43f5174868f97036f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314fe1c5e4e262229718046a41ca816a
SHA1cf5e25cfc2748e09316fe4e15478f4a72c334207
SHA256b3410f8be16372c66d62afb8c77f258044d9b4dbe40c855ecc2c0afcc0a5366c
SHA512bf8d51d94030c8218811a64227d78a26c94e1004e1bebbca3c6923adbf9bfb16286c71f07e73e07e295e4a9cb980484c005d0f11add7bf1bbf92a176fc16adea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5820d6ef1355bcf054a60cf259e4184ea
SHA1ac293f84a58bbe3034a4c426eeb63549df79c828
SHA256726d70212c1a96d0b5db3650b73833dd81cd13c5bc60cee2c2eea42ce701c30e
SHA51246730aaf6e2d90514989eb82bc0be9fa9c737cfce67ccb9f1298f4f947e8c760bdd56daabd3eecd7ecdf16514931dbd49df56106432f5c40c786ae01c1195d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2b8e8e74be493d89cb571ddd5c1bdfa
SHA189b5f8ab15f9e96401c443bae89083a1e5331387
SHA2560028fb28a9508abb594c837af7bfc30063c48bc749221f358f870aa60c3382d2
SHA512ecbec7b8354e129ebc8c9e7dd4be4efc8cb36c71c8ae80731bb383836e9bfea256863aafce3f5e452a963d4b8cfce4287ec01e89239dd7496a8c609b3e829d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d27366fd66b17ad3020ed158e74e39
SHA1a9997f970647d9de165e08593ce663063ed887f7
SHA256d15254b8f95deea880c8f83dc8f6bf40a8838f5f304e31a448a419ed0f227f2c
SHA512b4efb0fa723117aa4d4e0e58143945ed2fc332da3c653ed92225f9cb457352805e06516b44eeb05adac8ace8be8813cf20f0ce0093b16571e6dfae5f7db4e511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a062a7e0c5967d589e7b65f80427b93
SHA1033612c5a4b9de8f0a9f6848efd9c8cfec1b65c0
SHA256ff064ff6106d1a9f955cb7a13286119915b29bb7916d1c0d0e4286c9ebc663e2
SHA512f29e4f3edc5ff4fc5536baf8ae47a1de46b2b56d19af0c704536608dea30e30bda1e7dcacc1e315546e2aa6b4b47643fa325c8b539bbb02d6bc8f3de84d73b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b727b6c81883496d667f76388faff77f
SHA16ab71d95a0d6def87a8537d8ae6f0a3fa0707e6e
SHA256152873b80fc62da7309cf3809bd300a0d7595c02555d3889df7ac71e4ca2de80
SHA5127b158e245251dcbf74cec884ca2cdddb338ace37f8b650907b68786de536dad234a7485b75328da298e365598168bbe06700934ca06918ecd550cd8b4d25fddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5798f16f8cec4452a933e2b61d2426625
SHA136fb824e02741f93c79c0f2ed6ec1a4e34be2d93
SHA256403ed34d9c33e59c9a8aba76c6b6e5aa5b9536767735b208cb2e0184e459020b
SHA512ab466984bc13732624632205bcdd15bfd8c3056367f006760af02c70bf52dafd1c5fc7adc149f35b448c86461cf3839df3461799abdf8422e404963f96d394f2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06