Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Data/Astatix.url
windows7-x64
6Data/Astatix.url
windows10-2004-x64
3Data/CrazyTet.exe
windows7-x64
1Data/CrazyTet.exe
windows10-2004-x64
1Data/DGO.url
windows7-x64
6Data/DGO.url
windows10-2004-x64
3Data/Games.url
windows7-x64
6Data/Games.url
windows10-2004-x64
3Data/Help/...ng.chm
windows7-x64
1Data/Help/...ng.chm
windows10-2004-x64
1Data/Homepage.url
windows7-x64
6Data/Homepage.url
windows10-2004-x64
3Data/Regis...g.html
windows7-x64
1Data/Regis...g.html
windows10-2004-x64
1Data/Regis...s.html
windows7-x64
1Data/Regis...s.html
windows10-2004-x64
1Data/Top100.url
windows7-x64
6Data/Top100.url
windows10-2004-x64
3Presetup/Ungins.exe
windows7-x64
7Presetup/Ungins.exe
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 20:40
Behavioral task
behavioral1
Sample
Data/Astatix.url
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Data/Astatix.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Data/CrazyTet.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Data/CrazyTet.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Data/DGO.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Data/DGO.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Data/Games.url
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Data/Games.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Data/Help/Help_eng.chm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Data/Help/Help_eng.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Data/Homepage.url
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Data/Homepage.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Data/Registration/reg_eng.html
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Data/Registration/reg_eng.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Data/Registration/reg_rus.html
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Data/Registration/reg_rus.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
Data/Top100.url
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Data/Top100.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Presetup/Ungins.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Presetup/Ungins.exe
Resource
win10v2004-20231222-en
General
-
Target
Data/Registration/reg_rus.html
-
Size
2KB
-
MD5
70daf5fed66dda8114d3ce1cf175cecb
-
SHA1
208167002c5d8276a7ec3f6206f038428208e752
-
SHA256
5de7a44329b12e7fb4f931b969580876685a784328c6574fea630f3c88b1f38f
-
SHA512
67931a7740365ef0abb37d47d12947c7c1341f7ffc003fc72133e9bc2b88b533bd68b291cd4def41ea79da93d099db936d2ac685b4d2f3478b0e88d106dbba82
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31CEAAE1-A85E-11EE-B735-D6882E0F4692} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410245174" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000000e63d8ba28d3351419a19fda6ec4131b791fefc7cc3c5bd8bd3e88c0ec2cde4c000000000e80000000020000200000004a77752243d6e92a09461337e8a7ea5148273dd26841542790f0213f1cb93f292000000099c53e5daa4f71a0e22926a56cebddc7766d643797ae41a216b7070cee89e4fb400000005db314ee42a0675c0ece6c86f20cb42c7ead4f3dc7b1f13aa360e26c8f7d5391fbcb8a0418291555f78f82f203d8bce36d8da1a1ba316438690ff15c1121eb84 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b7d0066b3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2708 3032 iexplore.exe 28 PID 3032 wrote to memory of 2708 3032 iexplore.exe 28 PID 3032 wrote to memory of 2708 3032 iexplore.exe 28 PID 3032 wrote to memory of 2708 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Data\Registration\reg_rus.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a8e1982a170a88f3ce0bd4c7aa74ac
SHA1c355b255e3e825d87936f009f0c37ab011660702
SHA256c20d9c22adc7648b666ca52ea453cd942872fae60d5228a0366074514327ca47
SHA51263b719b537b37a3d0a43385e9b1e5d1b6c81852023540a649b8853f16cc92a2bc849832af4b920b2a5d08333069a95b77daeac134589e23c8556d7e51aa9dd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52796430c7c4b149eed47329289fc038e
SHA11cafd6ccb81651fb8a9f2ddf58aed630dc90dad3
SHA256dcd6da860cca1c7693672c3fb39649a1a745d040be8d4f14557c269eec853a85
SHA512d8602eba2d599a5e82b3191c33309b49d12401db3f121f76100c0e69b9b15823d3236f6ff95dff5bccbb2e5773c4ac91f26ff0002169671034700e6f01dbbbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f20a474d5ccd701b11c232b3a966a1
SHA1556b05f32b1c6d57e4988d006136fc4eb1a42653
SHA256e8835e1df44da53d4666aa2d6b4c156855aec0ce1e3bd7540f763de5a757549d
SHA51240c508c5b3dddb32f117a3a8fafd6c8aaec5ff9299f702a897d2aa8aa4860865be1c72b967b682f70b54b9fd1a597cf571dad07bb7fb587fb46247768991e28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa8ebb1d610310611919b52e69692906
SHA19ab4c3d82d460ab5aad735f06670043ad609c53f
SHA2561c144d8b01ccf6f31e246704bd59d66db6280ff965d1dea589ad04fe922ed070
SHA512ffc1472ca6df42aefbfa43819e0296727015c748ca3ee71910a80e99f1f037fb34301b50768da0c1b89b95883f2d7b0b27c080eb8ffc3a8bc7ad39da22c2a571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb11207e145e18244a92df3020da55e
SHA14d9b9ff632273bfdc101cba06a6b285da9434dab
SHA256d73cc0a117e08b93d3999e189bc082dea996852e8babe92723a2123524d4c13b
SHA5120d6e10eaf2a12c37ece7f32badb90440efeac5538e53d20683a1ce5d43df2f346a9d094b12b1ad81154c7c67e6812b6c4dc0cccadba9ee40fae03350d38c5519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ce4375c4f651a50e4e9d3c446efd0b
SHA1986a8c80a9d21e32bea323bcbca173f8b9aceb65
SHA256527040be745c96776f1d1c83a99a8afab24a2fba0aa770e4f95d69ba0689b2c8
SHA5126e6b73a84c6c31e3065a110580a957753361dd24b91d819e2c9ee54c3095cbdcee5686dd360feb9ac53017f87e0ad2db640f96bd2399b0fc99757ae4cc89ad42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cec53154fb4512e030f51f061f3fcae
SHA1ccc6704a29bae8a7225c9676b17f8743d0a84044
SHA25655c4e2b14b41bf833208e454a27d6be293f0d19665a366d12b93e5d9393745ce
SHA512c142ca81af5f6e8ef350203ca4ef5286ed431d7e16f63859d2697337ace663dcca421026f5d8c44eb62b1ca861cda4fad9ccf7cef196dd41b914f24c65318a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567eddfda24bb885d5c7f85d7031374b9
SHA1a920063f47d54c91d09ed825b3cdbbec7abfb9a6
SHA2566e287c69a107266c2452fa2dc0b7631df5e8c581b356e2909cdac80596f49573
SHA5125f52f9f20cea1f3c5d6a01fcde9da7b3121787a43526d849e42ca007d4adfdab63ac6be90dde266e1f8e9e196470f69d9f2f8608c8ac980c47130ca24fd7b9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f021b6831d7c42bd2ddc8af7da2c246
SHA14b94565c221978c958bc3f8f650776f2776d3e1a
SHA256283cc7c5867c3bfd0d885bdf8258da8ff3ce5b7e09225223ef82107671adb9be
SHA5126c05e5875d27f0081c3d18a68b53b3d8c0466303ef5eec1babc9baba73de0ccc4b744a2d31cf5681129cd9b6abaaa78e79296f5161f1e5ecd05aaab0380aa2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c69d9ff7eb92d9a30bcb9a2c0a836e
SHA19bf9153177c186d6ffb206fdbf97df7736431998
SHA256818de336cde2811c5dd4822661f02c137b267476a6e587a42b44bc470876cc74
SHA51286f65ee8b253b69fdda6694e899f2c8efd7ad24f15f5ea71366aa1009b3b54fd4f251fec3b7292de530ee813e5f217d0cda031b927026b59f58fa3d053af787a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a648c6f30f496997aec438bf936bd8
SHA13bc4f8f1213ca8f45ce1eb12da54929d1ec108e5
SHA2560cd6eb76656a103ba4acd2ba95524b3321a3b65f75318fe2c22518582fb33f1e
SHA5129bad40f8f1bb70f88b89c7420466f848dffbe44a2bad48cb7ffe949d44e5ea4e0badb4310ec607a6f17d3749c998c50d4b976f4003c528207917e34892ebc9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561f96c3d18816da35a9d47dfa8c6e897
SHA1f6df37326dae5dd17c6f9b947b39b5d0db5fc30a
SHA256da548bbd20a982771a56b7911569946d365a668f2f72d1769dcb9276e48a2d53
SHA5121d747ec3b7227a3b5e5ae5d4f22af64ff0f63fb88e1c1a3ca01f417fc7ca12ed43ebe8c660893d8fc80689b9449e71606a860979baa7521ad96ee48fdfae4ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515fe9550485f9075a53621ac1665ec35
SHA1ac9d7675197f5fa4ea0c7b9c73248531277a2e14
SHA256ed4a724e377df6d740433355b86cfce718b4b1c70ddfacaadbce606daca6d54b
SHA5123f523b77152e1f8c1979ea41ea86f6b32a22ab590e264cf3f5fac7362989e0c4ef77f9013a31681f1d3d4859c6eb6f3802ff4f0974f23c6bed0272db9a540534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cec7ec98b06f4feb1dab834d815d8cb
SHA11b4624be147d21d26d342e79646895da44075a1a
SHA25683c0dc0a162553507d943a396636b75c7e4a1583e1931f81e7dc2384caa79e75
SHA512ba2de716f42ad250448577fd6be0c16226af1fbd248d72c2cae796516fb40b974bb9747c98176bbec05754180b40489f17855df5023be987e75fc21012fa87eb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06