Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 01:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion
Resource
win10v2004-20231215-en
General
-
Target
http://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000ab5a163ff264138ae6bc31fec347a6ca55ffdf3a76586f2e31af051c1cf65ad9000000000e8000000002000020000000e40925c8927c7348b8ee530a22d595160d0caccc7fdaa45fc1ec9d25af9e1950200000008b31a6002227eb00026c60543a9bb2a4928397fe220b6f00e1d08b26efcc78e940000000d887bce99c1e6f6e94fc17a31716150d78ac20f4cd9ffa8535fbd72868df647257d8a8106745a261ffbd677767bbd77adba275306f03a39194f6cfac947946de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E94BCC71-AB6A-11EE-AD90-6A1079A24C90} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b442bb773fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410580487" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2808 2712 iexplore.exe 29 PID 2712 wrote to memory of 2808 2712 iexplore.exe 29 PID 2712 wrote to memory of 2808 2712 iexplore.exe 29 PID 2712 wrote to memory of 2808 2712 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b7ea49f86ac04c8dc0ab0d5fcdadb4b
SHA19c4db72a9b5584a768db18cecdcb81b5e6d876ca
SHA256e312a72a108bd5c699366dd605d5d3a2d2fe27c5e422b7bdda2f27777f03c2a2
SHA5129097050f1f6b04cb22ba1de285a9f0295b38f377f73eab43e87808071404b36311c3e5f1265294f2aabe24b46ad60def87d4b158ff80fe366757f4baab37681d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b561a597aa41edd4974594521dd57677
SHA110e4ecbf10aaa43395359d0844653f1643d0188d
SHA256387bbeed1f6d9fe625db152a865ab344a0efb0ac2af6172e1c91ba36fdcb0a2a
SHA5125d77f30181023de2f9bdb6de099f2023659dfb6fc09692abc2c06cccfd20942077f9d174e95ff95d0c08d09843c3a2d113b9fb74589d158b8829263207077aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539cd9aaeb23d052c494ac09514c7d161
SHA179973415cec71df78643c5d03e2162bccd0e61d1
SHA256a4f9220466c3c2fe0d4c838d639ce8701f8d3f6bafd6470a419f1ad6e9f4a911
SHA512fe1e7511a3467eec16297f2b6574108b6dd8f2153b94f89d8fb7a9502b2ac3e6759307fb3f9c6d463d923bf031e77d0bc0a97ae1e6239006ae5c3b0961a273e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fc9bc044e3b38d758d203ec58d639d8
SHA1d2002dc6bf1e2354f23a42faca7cd1af739421be
SHA25625509675528b19a8fcfcff9ef4aa52c6bec408f01f596ee3ca6c066c2ed3edb7
SHA51266479e36cca3b5ab323c6b472a4ce237c996dc11d8783f876bfbd928211feb730a2ab815bcc4ab4a2c5ae661981089c0353d55ea61ce14f977a3a1ea3ec2f34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52078dcda426c503e1f12f6133e49d8d9
SHA13df4d618276f6dad95bb6833b6251f8e85de63d6
SHA256e13f46b8a2fc711dd78e9f530b7b6f3e60a1c14333fec2843ede0ec9d8d6fc7e
SHA51249b8bd34c25801b05ad4e12af40d9b50e8f3079ee8ba6c1a76b358c85dba505048b62ce928aa84eed71a69bcd500aad4e49821e6a85a29dc290d141fda069eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be31aac35e1b4e4600e6042ecb23f44
SHA1532424fa48415a8a98f9315819d91241fe0dd869
SHA256b3c13bdf35064e5af8b1ac7b1532ae9bbe395e46514d37038150d9909cee0b2f
SHA5125d04dedae691cb7050b1f8de76e21810230efb44bfce56df0bcd3ea69b5bca473b1e51448323693fbe9b1500ee0b11dc2f52dc48d4a60eed20067f3168c6c557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d3428aa469c001fbfce4ab03705530
SHA1a28d707de6ca0af6bf8159c0817a5a3660eb4802
SHA256fa3adff5a076971a5b94f44fb6032dc29307880a30b0ec4c4a18c9217722c8c7
SHA5128d303a46e18afea45809635c6ad8498d52ce6e518109c57995fbaacae358b8660dc39a35894b9386995ff8f29c959cb3e5bad70a2afbc76abea837af92224ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5298b2dc6fa2f8d708f54934c15ed6578
SHA12dc65a8af70d4a41253cd7ad8b628a8185c979b2
SHA256fc566f0cd0e82760ebfc5ae9fcaa3e2f51e3771abcf260209b9524e67cbeb9ea
SHA512c438e62525a49273daec32140e6832ab82b42a78237ff39dcddc81fb9798ab02989e77ca2523eaa98c0878882884b8d5ea3576c307b12dcf609070cce173fe92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5854bd82ce93a97606210e83d1ef2a365
SHA1ef5611aa39b396e8bb9bfe1762a5dbb76a119829
SHA256207bc5c9f80f3ff57268d723b6a3aa5799976dbc2ff8db2db56a5923090e07bc
SHA512befe13f26a0174e2969022fb3291e395a3e9aaa122233b74b98aae558b168e2871e77a42d17ba48cbc1b781c2c1c58fd95ffafc10af0fd448e74c14ca2b3f5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e86ffd031ea1100f15651ee724dae325
SHA1123f1ec1764554752475fc0b6eb3c279bf832cb2
SHA256947214c9057fa75b908e2f18a38002d36fe1ec6fd7dfeed4d619052e9da67613
SHA51251d5e86cd882fd2edae8b5d63af9ff01d05a5ed80d7d14c4c62847df7ea3380a222b03679b1f966feab79b5c6d462ed7bfcfee9a5310a66116a76b8a9f7695d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555f6ca51ce5bbef1cb19d6630f6046aa
SHA1c5527e5f1221d2a6150086c6ab41e30b27b633fd
SHA256286d650d0f0d966f210d20756e4db37b2c5d376d34542565057f890f863a7627
SHA51248c3ade268112630519ad675bfbb4205d8b1bf2190a940219fad9f19300ee75038c82b8c826ea972badd7453a8bd660e8814fd4e239115fecfdedad62ca316d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526a8da32e978ed49755c88b6fe26becc
SHA16b1571a1d32457923044324544f3f712fdc272d3
SHA2562bbc67bfda08edc21ef5eb2b2794106f6d9a8a516be2ed8921aa23436b92047c
SHA5127d8eee1cf4a02b11ab6e0befa103c04ec0538fb1ae7b848c1cf82b70e907bf12a04379420e4a0116ee3b884a57efff89b8b043f6be732860eb2a93fbdc50a419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5689dd204ce5c2b0a4376803eab46e1d6
SHA15012b471004177375bb17ef5e1dc9a0e9276b5f5
SHA256034d21bc94bc95fdf612495f72a3e007055221248534869b4c20ba226b8d8b49
SHA512abd7e25487c8440b7f606db7227fe9e73e71311758ec034537262e332d2baee5c25a05a3f02ba4adee9573b0b523fbee92c271e3ca9e60f094adffde65b7cfdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e88996b4bcbcf6de22e694a3e659ba
SHA1500d28f575204bfd4d5e1dd0e6cb3fe412a4786f
SHA256904fb118b4b81c2c1d6aaa42bfc841a44c9d161e72b89b3fe94b9579e23c6cd7
SHA512a9af13573b68961f04fb59de7816c1bec2c5a57cd44a626d94edaf1cfe91edf49f187e95775a9eec6025f4e09f261a07caa5fc4420c7c8a3e7e9faca10a72d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540ba23affc3058138ca574df42a3f3d4
SHA161deec493ece29758a20c6bfaafef5ea0537abf2
SHA25608e9f6ac8e22760b9a4f576534dd441fcfe4ec14547b4ac327c875147f993bcc
SHA5121f3132a2117d4460441fec9fa92202491b0644cabc9e4e5114a469ab37f51e476526a89398a15fe1f63ae270b33e3c50041ab00a3d6f3d1a0982f35573fc562c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5200355c5918fadb3f9baf9ecb49707e0
SHA1f9de76786311bb23b937b87a597ff2da8d02d67f
SHA256c96afcc9fb014a988ab4eedcd2281c2d0b1ac5ed1efbdb5db96cdd15351d0585
SHA512bf22e6ea1af6515a003afb8f5fa5851356051b0fab8656e476f493e6269f7b992df5f1cd0114bffa442dd93c05abd10ed3d1d1a83e02b3dcf229a4a54311c964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9422416baf4abe6b90b34cedb47667
SHA13b264c5e4603a963b04ef95fbe1079facf3fd44b
SHA2568f1249c11ad9c2c519dd46ef36e79a3edc7753ebf7bcb445aa430de23e94cef7
SHA512edf5714a9f29728abf4b18309d969c9bad2ff4b2e9e4c821e9d8dd2ba31e04d14dd1a5b44ab9029c7970641752aeb2b6a5f9c8b5eb0a310f1d5216d67267372d
-
Filesize
3KB
MD580dd4b1206ee196b16b7dfdbf83f5297
SHA1c7245e4a6cb7b265072d99538fd01e39694dd4cf
SHA256efe29e7fda730a4dd92069a6c8e0383e92a04351c1e87d999a7e4b68b508b99e
SHA51256aa2f85d1facc6cd1273e329926902c60a6d0d733f8167b22c1bf4c0e115438cbf3758b503699c51830109e267b1282b2141dda9fef6fce218098f71e64f1e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\favicon[1].ico
Filesize2KB
MD50a362a1a0cf4cc6bc56d65db8049dd6f
SHA1ebfd1b824377525e1588719e935bf4b06349cddf
SHA256d994f806b1e4225b50be5ab681b2cecf845cc216a19a432d878cea3cb815bafd
SHA5129bc3349815f97884a92965f5936a7abc4ee937232f305148bd6d791de0d0199c51c5a314e6f4f5efbcac925a860c8da4da6e94472471f36db7725caf4b49ac8b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06