Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
182s -
max time network
219s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:57
Behavioral task
behavioral1
Sample
094348446fad0262203ff0bb16da2752.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
094348446fad0262203ff0bb16da2752.exe
Resource
win10v2004-20231215-en
General
-
Target
094348446fad0262203ff0bb16da2752.exe
-
Size
13KB
-
MD5
094348446fad0262203ff0bb16da2752
-
SHA1
c6d8abb4b136920c67d3843d4a64625922299e55
-
SHA256
778be93c9aca8686e18c738c54f364fb05039d7599f1bac5249f64da46578b00
-
SHA512
70ae28257590d497745def201ac529cc99d9597e63802e9f35c02bd840f23d932da16ce8b51ca2b9310348f8ab36d15ad0e60f0c46c9750349934562902994c1
-
SSDEEP
192:LFOeihIRV2lwv7E6fPlKr9ZCspE+TMwrRmK+vhOrKZ:TRVp7NfPFeM4mtZ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2024-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2024-2-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2024-3-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2024-4-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4AC1A571-A76E-11EE-8097-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702c6f257b3bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000bb62f1d9c35a198e0d1a1a548b0d944af4c9e07ba8800783b2c1594e657a830d000000000e80000000020000200000002d1d69c48da50a0900a9f9694e9e259b72ec79733cccf7c4e6e9f743fc16d23320000000bfe4f8e09853a91dba1f74cb567b2faadb83e3da5f93d94df4778bad0e421af9400000008d82a4a804cd20bc863478fe23de7026401da9dff7606a60ab2fce2c14304f3c88c1147d354321e46f775fd650eae2c8996db38ba037339bdf33064131e72da7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410142146" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2024 094348446fad0262203ff0bb16da2752.exe 1624 iexplore.exe 1624 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1624 2024 094348446fad0262203ff0bb16da2752.exe 29 PID 2024 wrote to memory of 1624 2024 094348446fad0262203ff0bb16da2752.exe 29 PID 2024 wrote to memory of 1624 2024 094348446fad0262203ff0bb16da2752.exe 29 PID 2024 wrote to memory of 1624 2024 094348446fad0262203ff0bb16da2752.exe 29 PID 1624 wrote to memory of 268 1624 iexplore.exe 31 PID 1624 wrote to memory of 268 1624 iexplore.exe 31 PID 1624 wrote to memory of 268 1624 iexplore.exe 31 PID 1624 wrote to memory of 268 1624 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\094348446fad0262203ff0bb16da2752.exe"C:\Users\Admin\AppData\Local\Temp\094348446fad0262203ff0bb16da2752.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=432⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5468a132f1b2eda90ad1797f4b5122eac
SHA143a3b62ef04fda0bc9ee6852ec073ac6e47d9d4c
SHA256f87f85600f7bfcd2ed6ee74cf461995ed46dfcef866c6f27834342e5e6f84d2a
SHA51203efa4fb51db7d3e461133974eee0185ee4d971af7ac8d3c765d0824c3955b1059769c93ffb2b5caa5ac00e042a742979ee8589c0c625cdb41ae955be8372797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0cadb3af5d2539073839b21ae35cbd5
SHA13c1aa3bd0d7e7cc305b2c4d0ce12b20acfb7d566
SHA256351289e3540563133370c97a67568d4ee289cf1c85e07ca3d5cfe30179006fb1
SHA5122b86d83bb8688ce97f318805479f488650d7b870afc88aa1f515232e1c1a56e18c106d155915e29f94981303429b56a940037cceda0e3713a5f25d0ad7347d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5595589a7b0fd5c7733af09e5df530f0a
SHA1f10983f66a2ce4055804abbcc1265a3d498b4110
SHA256d66c53b6dc92005efd37eb0aefed50e4be420ad8bddf11fe7f7fbd9b567cd666
SHA512baee30c231cb4965f24a74596a971462a2dea569e43f6039fda0fe11e9f140d3815b00bc0900a27438962a9933a8c3935b61c30a0e7f614a8143b80ebe94b257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f229ebc17fb59078706a85b03c2aea0f
SHA1aa1009c3b6d9479e6792d5ae4ad9da13546849f8
SHA256c3bbe4669ba121309583ae5438857a1728d397940b44b4584475b45b75ebab0b
SHA512e67498038ea9970cc8ee9cc2df462b12e42da39dcf1c21babc64423f3650a5a1258119106fe9455382d7df1653002896350c959b62b003f45d0e2a736a6873d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5703d7cdc5734f589f4fe69d1eab559e8
SHA1b228722acfed4faba20753d78b380279f4ea1930
SHA25658b20f79f00c8c83e01064ca4a27b6fb8354531f39ab9b40198f02749aca4d6a
SHA5122f8e88368196f2b1bca7fad34993c0347ab97ca2e124c3a7f58db208b6596fb1d67edeb4992d1f29d5aa99d6df74fba04538fc27bc7859ee03fcef491704612b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b93759036d41c0e08f49f01ac1554dd
SHA11c53f21c3ad0f9ca603fa37e7b0562ed5bcb14b8
SHA25625f2fbedbed4257ddc275ec8de2acadb2e5fb05f93156d98a5ccb3d4bc818fbf
SHA512fc31f8c89e3904091863118aef1e22081cf2c5650ec20d59d3f341eb24f352a68d725c527676ba0ab66635acff37fcb751484563bce95880f0e38efc63fd550d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d96a790820d3a55313580cc1257a5914
SHA1f0bfeeea7c6674ebce89e0de335935e35af9f2c4
SHA256f48cc80855a59becf7ccd83fe848b86a27b1c3d6a6502176b2a137508258685a
SHA512164d330bb459f4d86fbd122ad4006e06f42bf0e6bbab26b86514655a1d29af9a48ae393a958fefb79ae2c1ef7ec8efa95a6ba680ffc0bb2205afa181405c2e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5848639c492bcbc96b5200fce380d289a
SHA19ac3ea8a46235a02d8d48778669d6c99dd0041d7
SHA25655b6c023052df51170374f5dd9e761872d7e497323c94ef78422ad6fd7139bd0
SHA512f2a2b1e52dacee0f851b72fa903e119d93e89728bcadbf662222171c2c0b642e9a0745df09c41ea733ae0fa3c635ebe14384d71834afa8ae268fdf69a2b99513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d139384c29f87afbd0329efff89126c
SHA1344a1771720df7898e3e6a0fb11998f0147e297f
SHA2565d0385f26c43c68ce00c0c0a8a5c7facd56cfcb983440aacc03f188aaf52365f
SHA5129d1e5f4b4a0ed5ccd5f8556729a597909668bce5cc1d920887fba6822b528a5fdd3e27ca05069c15ca80076c5c00f75b8e50bad4df7387af6e0298aeb0da5a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9225c885a23025ff76386c4abbc8f94
SHA161849d08a0ef3b37ed71e9bbe7aec7935248cd1d
SHA25656fe6bfd064574ecebca9ce5d6f5ae3e2ee336a88a479ee802f3085efb761459
SHA512ca9f7422c3e1328804f0c8df3e544848f6f40f1cec93538b0e1808099eb8d3ae7019d35a74dbc1e3968a4826b0ead4171cbe03760e68b50f86084a05316be0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ab97cde0e49f6b8281a96d1b59ae715
SHA1fae764b92f79c91b90a806ee08eb182fa4c6e402
SHA256e9740e3278666a71abaa2cd30ed105045c615c075a7066766439f84de147b614
SHA512061e0cd0d4a7a8c36bc76124f67493f7ccb5345ab4eefa3595182053970f5c7322ef94f40df772793322f02b557e248d5b07fa38938bd2a0bd20af0278867c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564cae8b723e835e6049d9cf53f712865
SHA144a6ad0ddaf8b839f9089fb9ef4ea740d22613bf
SHA256d38c1d207bb0b12ee9dddf2433e8869aab7fa11957ac0d0f2aa32aa88a1d6b3e
SHA512ed356402b91a393100074a8244bbd11ef56911281d56fc3d22022b3ce6db3498eb31cd8c6dd65fee540ffaaa0826c1acd90f192663ed6719e5020873efcbfade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ecec5f57419ea363fcaa2a136153b97
SHA1a49b0b9a542348534eaa253be2ed43effc416e0f
SHA256fc2a7fb1fbd5a719c1cdf0f80d0fe51e4ca12509ea1f56bca8035c5f9eb4d352
SHA512bf725b764e07455b5cc7544e6575f652f85ac83d92c84644030e13be24e43e817cd73e825eb1e2f67da71bb26d61707736014db39d962afe9ab513f63c5ab05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5485426abb544c6cafa2489c4f968982d
SHA187007ecd6c878ee340fc2382fbdf24665a1b1311
SHA2564e7a60c05a7e87d8d208355eb6d7b5ba694ff71fc35a5592e96d54355aa116b6
SHA512d80eb3d332c4cf758def50ff5d9a247c1874a23a773fb534b7fff28300d9aa260b1e927cd3b0dc55910da42f9872ad5da41f61b5b6ceea4e9e9e38c79c837a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc9e6991019ee4667900c1deded4edd
SHA1e697f5fe11f37444a85e40e30b3f3d23788cf33d
SHA256ebfde0e2779f85737bbbacafbad48f46cc2ee94be944843ea73a1c59fea886d9
SHA5121c0dee9c6f7741563b0692a1d0fff29ce7907cb8240049e68c1a5b341d328583c0ee9c8a521b02cde40c2be921bf971511ba45f0d9dc8f2cc283805c20cc2c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a2668b160d86a7d3435d1597ea72f85
SHA1ada839dbd80ca7c754b0c9557c35c6c1d3d8f84f
SHA25629d2678407038801acc2915af4e11311bc74fff6dafd74b3ec2bcbaaa406f3ca
SHA5125bd02a32527c0b18749b16cd2f6a43acb702d35a2d20888d2f4815b7c5cea7f3374868a628ea48a4872ad0d81a6cf0ebaff9515ad9abcccd7deee5d528013575
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06