Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 08:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://nl.arjo.com/unsubscribe/u/925983/4bb4c02d46e70910936bcbab1d3d8327577c11139e69712b2ee26b56c5d5fa6f/675779350
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://nl.arjo.com/unsubscribe/u/925983/4bb4c02d46e70910936bcbab1d3d8327577c11139e69712b2ee26b56c5d5fa6f/675779350
Resource
win10v2004-20231222-en
General
-
Target
https://nl.arjo.com/unsubscribe/u/925983/4bb4c02d46e70910936bcbab1d3d8327577c11139e69712b2ee26b56c5d5fa6f/675779350
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000035e3c82b4aa1f4158bb09d92422212b6b8b5a41995aa73683701cdba63226b52000000000e80000000020000200000006812c71ed8270030a35ad89571b1e037b79934984cb14022f73629b048fbe77120000000ce5acba5568e6c1d931bc19ce2710d492a5f12c2f4b3b4659bc8324433ff484c400000003a18cd348e5bcca05a2e694b5372df20230a268864024723579c3df8f326ae480e4e2d84784e52f0aa0e8fbd08e01b61879c697513f790f9dfb3046a0dc8ec01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A18AF91-A946-11EE-9BAD-F2B23B8A8DD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e076c774533dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410345004" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1048 iexplore.exe 1048 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2816 1048 iexplore.exe 28 PID 1048 wrote to memory of 2816 1048 iexplore.exe 28 PID 1048 wrote to memory of 2816 1048 iexplore.exe 28 PID 1048 wrote to memory of 2816 1048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://nl.arjo.com/unsubscribe/u/925983/4bb4c02d46e70910936bcbab1d3d8327577c11139e69712b2ee26b56c5d5fa6f/6757793501⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bde65951c78f9df7b0bdfce0657a9be
SHA1f3aa7328113edc693aa1b515cfe98715cc5af220
SHA256ee7eda79786d60b880b570d2a298e0ec6514877098062d682be55c42dfc6a3e8
SHA512229469dff9d5906671f67ae14affa8c2e1d3dae691326f0cb664e4d3375c08c7c2a14532239f9ff8acf83c780bd5d0b1a00989528e73fb027d0c8f2e47d4886f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ba99646c9b41da0cfff1412d260c26b
SHA10044d6f1358cb4740a673a9c24f50550a3914af0
SHA25630ee554ae43cfd2605176b4c7436b345119e72b84ebc877cbbfbb777ffe8d8a2
SHA5128cacd9bfcdbad94b1264fbf5200bc1ad53fee9a905241f1cb12e742788d626ffd4d60ccc3fc819a3799cd47083fba01419a33f55d05331368a0cf689ffa6448a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3d78d2392165bc58bd8b9c462729f2c
SHA19a36c237da8c2d3572d1ea92eb4d10657e52984b
SHA256eb129e39523b404f5c5b7c6c1d848cbaacb97f0f8a2a3a56a9f2693853bc53f4
SHA512e4e8ae88bd719030660a626de06fd62f48d12201127683870cd7023b9e2580d80d732844b5fc678303082f7ab2bab94d7f9fb409f8eaf1d8d469ec002f078d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ad99ca0de2e50423a5cd78e5fa6b34b
SHA140565d09055f1b14f802fa0abf876411fe4503ba
SHA256c2172240e085674650fe1743d73bf7d06daf168e3e7cf613fd7e772a028ac5d7
SHA512a99ac9a1613bf3df944f0b984340029a87fe941a980812acddaab17b0dee04e3ac7ca2ae549f2a74cdbe7517d30032d75504cb6464644ebc2bdf590f2367c753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a81a43a24415075229d5d1b0fcdbcaa
SHA1226768903412028c9aeced4fa1b376ead3d0e7b8
SHA256d5893dd47282312cb85cf456c4ba5cf4718686763504f7d3ca1321c5a7240b7c
SHA5125facdc206ecd464420d0097381011f7292a26161bca8d6c439821892d1227f574a6e74c5c4088c0139f0772946d94b9601f1563ab8eae26cb05f63c60526684f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435ae41cb2ce189f17c1f4eef335d461
SHA14d3e6cba2b3e8d8aefbfbee1870926ba470d0fb4
SHA2565ff1c79ef6bd09b65681a7e79e2025cafd480196aad9dd7b469355bef16f75ee
SHA5126f8e43558b8a035d8f955926f91b5c2265172b5a1b1ce09542723623bedb64f43a530d6652c63cf3ba6a9c32e8ab5181c6578b62b1c1ac8dddccbcb81f6a10db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b80e4d42ad364b8c1c7be7d1cfdc7b8
SHA12c498e1a366112c5861df8a45e91b68c2b73f123
SHA2562df9efaf41ca9e68f2809faf80e10aab62aeaa140bd139096cfc6396f4b5e802
SHA5128180f1d7a8e3398818306cb870c0e409e4c20798e288729f3dc70a1cefaf2bf799c9bec0ead1bb98f07f740b763ae97fdbbf9926505afc5dc744409c8d59881c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06