Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 09:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://extantjump.live/fafed0390d4aea373ad774b1c9d8111b
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://extantjump.live/fafed0390d4aea373ad774b1c9d8111b
Resource
win10v2004-20231215-en
General
-
Target
https://extantjump.live/fafed0390d4aea373ad774b1c9d8111b
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url3 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLs\url4 = "https://signin.ebay.com/ws/ebayisapi.dll" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url6 = 0000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410867241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLs\url5 = "https://login.live.com/" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url4 = 0000000000000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url5 = 0000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4008325e1342da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLs iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000006331c0d57ec252903c10b1741e1f2673453f9c063e622f328d0a95450efc4d01000000000e80000000020000200000003ed5dd56aa2dec6e9cf9d76411d8759e6348e813921742355cf3a372127632ba20000000905e42763e0089497ed78c44b1700bcec163fb6dcae67e3e9c688876d9c17b7c40000000a98941f7f76cee0494846aebfc098da9b7a98b5481bc05c3fc3e18e645ba5cb5bed83a106e11ae098ab476e87a5a1133220b3e422e4738db5019b7206cdcf867 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLs\url2 = "https://www.facebook.com/" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "http://extantjump.live/fafed0390d4aea373ad774b1c9d8111b" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLs\url3 = "https://login.aliexpress.com/" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLsTime iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url1 = 204a1a5e1342da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url2 = 0000000000000000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TypedURLs\url6 = "https://twitter.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F4B8CD1-AE06-11EE-B3A3-EEC5CD00071E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2656 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2832 2656 iexplore.exe 28 PID 2656 wrote to memory of 2832 2656 iexplore.exe 28 PID 2656 wrote to memory of 2832 2656 iexplore.exe 28 PID 2656 wrote to memory of 2832 2656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://extantjump.live/fafed0390d4aea373ad774b1c9d8111b1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c479006da0f3ca18e96076362ada9e1
SHA11e3be327913dc9df0b274ccb290b74a17a8b2e1e
SHA256a2dc94396a5c3b2d3567dc7b1ebda0d0f207717d5faab2fecb42c0ea786b9f7b
SHA512e55c93e34c800d1183e4cce1aa2a10568e6a4e23a2ba80bb8ab4554201ce81104edb142e551886cba79e602907944dff827e4c995fc5f3a361f3b7e6251c5c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58adf196af4657c7c70dbabc4043df756
SHA19422f413c24f8ece6774fcec2b0edb8cf5ff7f3b
SHA25685d4517c97db2f888dafa9646ac79989d6d8b58c3661fb25a36955dc8e6a6e08
SHA5122e0ccd0a484adafa81949dac9c92fce16b776ee431d6b0c6385b520a8caa81899846addf8dde50a0573fbb7514e41aa9390d3bab459cba9e6b1ab43525281fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576543218fb47dffdbcc7e2349a5d02d9
SHA1f24ab5e5dab45988f773eab77175763a07f74213
SHA2564e9b8ff60027c7a7ae51bff2e14cde3ef03e320b0e215ec8df79c62f67e1a646
SHA5128d76d37075002c63480310ae12823a27617a348718f531f84fee4a8a2513403a45c0a6032a089229595610e1e988f08714b40cfa3972d4ff02d0aac4a74698d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a64425ce413da2de2bb758e063caa1
SHA18be6a53402b2bb2bece2f5a72cca87fb930bf58c
SHA256b1d997c25d759ae269b6ae5dd14ef70e6d7afea59cc00767fb6a4bd22df23633
SHA512912300a293c79716d10ec61d2a87a64b0a06075b1784713e609c0ace33362248977eb66fcb00acdf9ab700daf6cb483e83588c25ba99db9ecd0ad1b31f15b160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c14f758aef6bd5dc828011ef47acb3b0
SHA1caf1236d3970a33fb471644d0ffb69a25d375206
SHA256ee9b3f4f2c7dca058c3b6a212374f11974ef2dfa4352fee3581b3237efb15874
SHA512790164148b66fb81d3aca54ea444e87e2c800e71f80720144e7b0b3f630fc54ff9ae70b3ae20b75e0afe11194411d01705a44ce58b45e35c942eadf246ece703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51373d2b8cd379b3493e38b4df436b42f
SHA1e7e9c9488266427cdf07eed50cbaddb2ab8dafd9
SHA256fe3c8877e2d58c4e6c72b2655c71b052222595d9ea7af7dd36a742cde3d7eae7
SHA512088980d5f7ac08a53dde76d768ba918c6f1a2a270caf49b17a44fd1a8883fbf823682f54cb78de81f0048bde7eab28653cfa4a98fd391f38ae4f933afa7f2f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bedc9d8bfaa15efb3f74a7b066724536
SHA1057127441d231a02fad47f0c9816a993511475d0
SHA256aa9674bca8a8c8e2855f41732ae0be40dd280b90a33a52aa6b2d606bf843ee19
SHA512a7a84e81f7d5aa525bf7a87d9b75694354401a7162ecd9227562e27649f7ae39ba3938025d2ed763172698768150a1973ebdd6507f1df77a8512db6138aed419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d0101f4a2c6587dbf7f0b8c03961aea
SHA1bb5439edee992f4e3a07996c0037e0d14be4a828
SHA2562a698a27b89c997ebb8ba37d6c1a279cff6d2c71ccb9946dab65893a7bfbece9
SHA5122015f7e63ffe335f6bfa2a8fe928cd0e0c7408a484634ff0766d306e6493843ea18fb27e8dbdd66c5a037e44897b48ff84c3e70128b5859a38fbb9135a4164fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7252caaef6452efba27a0af5eb2543c
SHA129f91afa992f8ba05c4a8a691a3c7d4d31295cf2
SHA2568502f7f6d70182db75ad6fb62e80ad8ef325a8540de3814ddecb4a7ab6059b49
SHA5129137205c977daa722ab3c69a1eb62e98ce1b8ad2fda1fe543f5d80f07eef689783d3d43cea407f704494b29f9ebbf6b11d066104ab8739cb39b18748ef700f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f5af9a897115ecdde6cd63e01e79c7
SHA1e80a24735308bc66128ac6511d3bafe71a43c0cd
SHA256c0bbcc108ee7699924bda9fd3421c5fcde1a725bc9cff3338475154f0ea5f13c
SHA512e2178b3a4de5e4e20e091587a64b0cd71033ad67292fa16dbff59213d4d0c68ccf60c2e8bde098322c3b6d376cc33ef27e29806d798ae12f81ce352d6c3c4861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca38e6e454fd961d8f3478ec64b5ffc
SHA1ff4916b0faa3e7955e48863c0034a524839f2ae7
SHA2563318098518f4f6854e9f6efdf80969bcdde8e7cbc9b30f6dc6fbbc3bac2009e5
SHA5127252da9b289f9439c1e814e26812f1387a488650cabd507ff6e5bc27b2f5f5bcb59c922651b65f15627546d2dc1f3a3f60134080d2156aedc7ca0c28932ad3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a27a5719cce263520e67fd8f90a57373
SHA1a89eb63a4a63fd22126c5647cbf6d14e2c600729
SHA256f5870528bce28cd5afd08ce5fdc28754cd7a74ca783461f79df51da22fc026e4
SHA512702925a73e9f014d71aa4a138f567d5892a79ddfdfce9fed49f8f17b4b2de882b68702db4890cc45586d9d8ff9f4922c6c57be01bce4d31708deebe5d55aadee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7da083a71f2a236866ab452f9df5551
SHA17a8b579d15cb18e17490bcc2474d1d995eddd11a
SHA256d2446ddd0d931a2fad95760ba918c0239b35d2e10f7bfb2410b71d9b3fe42d50
SHA5126c58d99ff450eb6246d1a0d76d8df793def1b05fbeb754092312a861ee10905d41f4dc3f7a06e1b0ff3e122fd98b60c2929f1094e5e0b2d2c81b195ae8ee6454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541f83d2c07bbe47f898ce1bec38cf811
SHA182f7d02917c2f1dc9dadf758194d603b578d9399
SHA256a736c995b6811b37faaf180041b27790fdff715ee4d6f1d3c12961a3186f80b1
SHA512d3ae52459f3fc3be3a9f10bbbf1e17a8d121c72331be5204faefd92c32547bfa90688eb701fe573cba909c3a9967d46e50e748c87c4bf87403af8bea05a249c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548476afc66687cf911a15e65d2ec0cf2
SHA16100ed19bb8450db193530d8d16064c38fb378fb
SHA25640cb6dd8426de2f80ee72aea3fabed170b390368f67a1af6d5892b5dc4f51da6
SHA5122d6bb123f85905d2e3ae5e609fddb12a3042afc08c0ca748820cdbdeaf635615b38f87dd5e816b18bb70875e9469161dd3b49f6821924737dbb553d603d8a578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55949b96e89d25584d16458cde495a6d1
SHA1cf500a2ec81923f7c32d7d6e9b956f673eacd9eb
SHA256de100c1b68f7d9bcd71939e2dd29e1858c547337a6cba0e4005b3f42c42b91cf
SHA512516a65cbdb5be88c969090b30cf72604147ee6a7eb9b454bbb915dc38813ae1bfeaceefc2c7e720029b9b930be759f28a9d12b733e9100369378bc100cfe97e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06