Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3ajax.ps1
windows7-x64
1ajax.ps1
windows10-2004-x64
1api/index.htm
windows7-x64
1api/index.htm
windows10-2004-x64
1api/新云软件.url
windows7-x64
1api/新云软件.url
windows10-2004-x64
1attach/index.htm
windows7-x64
1attach/index.htm
windows10-2004-x64
1cache/index.htm
windows7-x64
1cache/index.htm
windows10-2004-x64
1class/archive.ps1
windows7-x64
1class/archive.ps1
windows10-2004-x64
1class/array2xml.js
windows7-x64
1class/array2xml.js
windows10-2004-x64
1class/cache.js
windows7-x64
1class/cache.js
windows10-2004-x64
1class/calendar.ps1
windows7-x64
1class/calendar.ps1
windows10-2004-x64
1class/cart.js
windows7-x64
1class/cart.js
windows10-2004-x64
1class/chinese.js
windows7-x64
1class/chinese.js
windows10-2004-x64
1class/clas...ler.js
windows7-x64
1class/clas...ler.js
windows10-2004-x64
1class/config.vbs
windows7-x64
1class/config.vbs
windows10-2004-x64
1class/db.mysql.js
windows7-x64
1class/db.mysql.js
windows10-2004-x64
1class/email.js
windows7-x64
1class/email.js
windows10-2004-x64
1class/excel.ps1
windows7-x64
1class/excel.ps1
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:17
Behavioral task
behavioral1
Sample
ajax.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ajax.ps1
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
api/index.htm
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
api/index.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
api/新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
api/新云软件.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
attach/index.htm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
attach/index.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
cache/index.htm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
cache/index.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
class/archive.ps1
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
class/archive.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
class/array2xml.js
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
class/array2xml.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
class/cache.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
class/cache.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
class/calendar.ps1
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
class/calendar.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
class/cart.js
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
class/cart.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
class/chinese.js
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
class/chinese.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
class/class.phpmailer.js
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
class/class.phpmailer.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
class/config.vbs
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
class/config.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
class/db.mysql.js
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
class/db.mysql.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
class/email.js
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
class/email.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
class/excel.ps1
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
class/excel.ps1
Resource
win10v2004-20231222-en
General
-
Target
cache/index.htm
-
Size
69B
-
MD5
b48f668d29cf52a6db9a95f56b3fb67e
-
SHA1
70d9a5412e54da30dc44868e21e1c00cabf04a15
-
SHA256
544503741cd48b65bf728ac517f8ed5b40961a7d8d359127b2d2fc24169cfb4d
-
SHA512
e30f600598f12bf6608a284eec1153720d1f8cc5e722a85928d02d2c3d53c533a1cebbda558066d4965b50d6c57ab06959b5003b622469c99db1d471a65b895b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c0000000002000000000010660000000100002000000059427786305b6a313ca483d81abfcd3d436e1d7be1c9f18b5a3ec81039d04221000000000e800000000200002000000080cbb563c9b72289823a5a2099a965ab0d6665aa1fbed38eafeeaf05375d59ff2000000015d06deea1b2afc73e3dfec34ed70f9ab3760e745cc186b7446f4dd339b0b7ef40000000d67fce50b00bdb029dae5a7f871bd25f11b557da069fe00fcae3443f9f775f5313c499bd18a2ecb0d1e96e5eca88c1b5c7e1457fac5daf61994b14c2a9f4f6fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D79C0461-A7B7-11EE-8B00-62DD1C0ECF51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410173751" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d074d4aac43bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2584 3012 iexplore.exe 30 PID 3012 wrote to memory of 2584 3012 iexplore.exe 30 PID 3012 wrote to memory of 2584 3012 iexplore.exe 30 PID 3012 wrote to memory of 2584 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cache\index.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543841dd1789307ea6fbbc329139f2fc7
SHA197d035270f76948793c152ac16e03bc66911baf8
SHA25688b98d42d76ef864ed7275b517411f68c6793ea53d7ba0b2ebbc98502394347c
SHA5123d58fe0610c3f010650c705caf098135d83aeed93740e861a9b452b64e69d8670d9ccc706bdc07656a0d788a3736484b693daaf4de60ea5cefb483358a2fd944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad3480613fa0eb741246bc7e66264d4
SHA159f88645b89556fa65078cec867254e52b1a5911
SHA256bc19fa290d71bcb1844184a44fc87f052edf92976a4391b9f5f6a75461bd18b5
SHA5126a847c056c08fa3d4cd5e52631f7369761696b99bdab267ac0014d58f96152ef496d2b721ab151adfce02218ada69c3aec2d36d4c5d3295e22a1248dd2f54fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5659c7a94d9854b07231b693e39d5e679
SHA1b0ccad67de9e8c89aa0072eb3397677f5e2553b6
SHA2567edf992d49ef16023e9baf95524d786a453b0899600e6408719a491ac1f2b591
SHA5127cd7a03f06d34ba2081b6695cff4fbcd061cec3a1ef8d3d28168b6938f0afb32373c608b16660e3dbde5aedf79ee071c0b45567aa1cdbaa6325fa7ebe5864aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dda690d223ff910beac2f4dbd89d2a2
SHA1d434e42220242ea8bc940bc936318cfccc9a795b
SHA2562825e6291ea754554919cb341d0c1ced507987cddeac7f0110d733ab86ccd29a
SHA5123e9732a0cec5b489f870e0c2c931b84b8ea47ba726403947e014da3a0f6115b90a6710f8de11d4b7b218c93827deba5b260d58328d7395388b20698554b81b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d50bcb972cc059bfed9e6e363847a29b
SHA11ff077c04074448079f1e0399df2dd80c4a39ee5
SHA256dbde0cb6fc7b5880b7ef82fec81c2bc5737301eb44488e1ea87287925e88b386
SHA512c83386b4a57a7ba1d56b40766684224027e8aace476031cf93788dcd31b2d410ed7071b4d502b93f05c6367ee4b428e56b2ba1c1b8049fe43b087d7e15487b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6e9276adf58ed5085d805424bc60faf
SHA14388ea46c80aefe679319e28295f597251c8745a
SHA256652827768359f88131e7b7881389c952fe653f4cf1d121263a6f2fa4a4715a52
SHA5121e4b8f419a2d8caff7e66672bce73c9e2efe8eab0f2111f8fe24509fa208b8814da204e35f684132ded30b358fdb264e1bb027613d0e242a8da8cd88e073fbbb
-
Filesize
1KB
MD551c9f4e20ee7069537a217a3fac01f15
SHA12f0450650d632b03c03ae26e5285dcae52b09f0b
SHA25614e2dd9699bd5e3598910da6e8e9b436509278c3f374dcde0398989f47cfd9e5
SHA512cffe5a857550945cc34240b2f28d9a185eb3b2b510a5f9727fdca2570ef130ef3e229bb4287fce6393e7c7e911fcca8dfe138445786220e19f6f40c0554b2d25
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M61DDFBK\favicon[1].ico
Filesize1KB
MD536023f9095bd20cc587ecf0d363d0375
SHA1717c014504d8f771327734531e672172da35efd9
SHA256893d5fcb463fc085f6b8f5a7d22fe35dc5de0418e35be89235b24bb832494a2b
SHA512d3f8db3f417861a52feb0dcb1701e79ae81134f54b8f9ac90a848868dc37f31d81c27be431e1547e594903541212372d8cc900f59241f74b745e7f8e9f90af91
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06