Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/01/2024, 15:15
240109-sm8ygsdacn 1Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 15:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://linkingroutes5.com/?a=4374&oc=19722&c=53376&p=r&m=3&s1=&umid=BCF85FA4-0E81-0706-A229-6E15829EDD27&auth=8f3b079e48d090dabfdbad44b8980c97bb425824-d9546caa6c993574f3e4f850900c417f52201476
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://linkingroutes5.com/?a=4374&oc=19722&c=53376&p=r&m=3&s1=&umid=BCF85FA4-0E81-0706-A229-6E15829EDD27&auth=8f3b079e48d090dabfdbad44b8980c97bb425824-d9546caa6c993574f3e4f850900c417f52201476
Resource
win10v2004-20231215-en
General
-
Target
https://linkingroutes5.com/?a=4374&oc=19722&c=53376&p=r&m=3&s1=&umid=BCF85FA4-0E81-0706-A229-6E15829EDD27&auth=8f3b079e48d090dabfdbad44b8980c97bb425824-d9546caa6c993574f3e4f850900c417f52201476
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d4aed10e43da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410975254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d300000000002000000000010660000000100002000000019ea5fcfbdddee01cebf81d873a053690f765608300566fd5a8a44e19d6646ee000000000e8000000002000020000000de999105290cd3322f755967a939a5da2362a193aae9d3d7fef645edd9f32bd020000000f8b08e9d00cae42db923b15a943c464ba4a7a5c6f03e714ede0038791d07aa6440000000dc32330d11d1b3e750b86d3f848cad2bbd85bd6aff91fbf0e983df3d48c8032cfa50b5093323e9b74572b32d6661f2c02428addb8c6767daef96a4a93f87179d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9B569A1-AF01-11EE-92C4-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1944 iexplore.exe 1944 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2420 1944 iexplore.exe 28 PID 1944 wrote to memory of 2420 1944 iexplore.exe 28 PID 1944 wrote to memory of 2420 1944 iexplore.exe 28 PID 1944 wrote to memory of 2420 1944 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://linkingroutes5.com/?a=4374&oc=19722&c=53376&p=r&m=3&s1=&umid=BCF85FA4-0E81-0706-A229-6E15829EDD27&auth=8f3b079e48d090dabfdbad44b8980c97bb425824-d9546caa6c993574f3e4f850900c417f522014761⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1dda5c93ef3f6b1ed96e7b167cfcc2b
SHA14afea9dc789f651dc63b381f9491fa64ddac272c
SHA256184680eb28589b0f47831fe09331d27f9962f09a68608bfd78a56958a969976b
SHA5129337d92e1a178c99e73e814c113b8aa8d59ce168bac572d8dda87f21f28665616e79c499da4ae15d11fd305b1625232353e644918dd35b03a6199e248df18758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d468853c9b7a488cf8fce83af2f3f60
SHA14ea0613752e697fce78b0cebbed3016d844da7f0
SHA2564b736e5b287710fb0c29e39b8fc26788f464836247a0e4db47e83ba2daec22a0
SHA5120c1e7f2256b3ce3f6f0e867662ae3eda3033bcb70f362ba9943b59150e5a951c075e96bc28231804d08b6b777ae7b32c82604dcd10c8f4fe7288d7ef6af4a6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c838f4465bdd0e0aa0da845eab407701
SHA1bd761aeb04bc0a08c1e62112758b45a2e8668a2e
SHA256c5bdcba62aeebb7141eb8261fc480e7530d37f6f51730322c57b8157822fcff1
SHA5128bc14b6cd86003b03b45f8e6b4b67b1d9b643917a04bf13fd1f7dbaa26a9c26302b6f399f52ce0579a93fc26a3a3d9efe13d45d2f368741c9030880dfd8abcc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f8c00b038dafbe14ab47cffca13e4b8
SHA1be9627cb7cacdf8c796c83879f61487ebb370e58
SHA2568909df72923f05fedeae21af5cecadd37dbba7ea384304990f9f86cc09cc0fff
SHA512cb49d08508159038359cdf944969e12980822535adf6b9669dfa45fc579c94f9560e81dd5ec1f6d14b9074d924c8b99ea1b762397162d3acc2c33d3b829c3221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a990c953aa9cb7d6aaa00b4b4f2dadf
SHA1460dd73abee71bc2906140e4c6dfbd502e74a224
SHA25653a95acec138c15572594beb7effa77eba7a5c78479c119ea445c243c5358c37
SHA512a56a2a3ab60aacbc7bf2a3fbc963d9b841dfc647e0b10f400f5517a24fee09848863ad6576c05ea4792ba4c8d7bc318cacc0454014d4a03ddac9242aaab302e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595510eecc7aeb6a232491e5c887be58f
SHA191bf09d022aac720cf5436267ec033094348af39
SHA25668f30b9285f9b7a78e509a63874a0602e454dd565e97b21c38db6437b3d9895d
SHA512e6a96c74d42ebf80f64ac79fb98c5ac08e66917a6df9fa19eb3f833550bc3e1c8ecf6f4ddb53d7c36a1e42fae13fc7e93c81e7a1851b2e547574c12fe58ad5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a038eb306b91324e2cd5e58b010be5
SHA10836a0d0ae9421ba4a856b0a631b763620aa1894
SHA25690bad8841c9f38362bace93d04940344b775b333fd945b20e2d8200ae7061e5f
SHA512649f0ae55384b538c8d78c291aee586c200a5f65f23e86b24dac4a2c46d83833e66994d3b3c30a59f3e80d10f5790b39adf4e66d0e8e53ad978f8d18108f05a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37d3e573e6623ea73a0bc6f7806aaac
SHA1c05607e2674000fa4db94285cf639d440b73a3c0
SHA25644a897b1c801c39406d7e68360fd0187f98a8764b6a9f24e0a2d7ba6003a5f73
SHA512eadcd2293b017bb6e7f4631beef629fb0116d578332e31e5a04882cbe89543e0cf49e2c0a6b32b2d046a8dc1aee140c55118afb21066f5573d8bc832a90c069d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595ea836be45c951ca98debefd31c8ec7
SHA1cf86188dc58042ae241248df9c7e2939bdb225df
SHA2561587dc28c6d5f5ec4575d3efc2f59da59a9b3b626c0fba6f87ac2e5c04df6524
SHA51217ea3823cf108b16bc2e011eda3b89c5c37c7474934b59c89f9583b8ae234b5d7c8a975f59828b13c11eb11fe34f7396601c98f9ffa4601e4f67beb9fca72039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a3a4c1023e7fdb449ed792da4f369bf
SHA13832905542d7d145f5ea84f0eee861f66875db18
SHA256107e2ad8942b74f7e6b82b7d7854bc7e83530e217fff9c562878ba20fba2612d
SHA51295277661810c7810702c7bda02d8192a6778f4150e6ad60dada8c224780a7000e884ba0747264ba6683012d8b67726a11e016076320d8be1284a312f602991c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4d76f079e419ac0b6b58adafc6d47e1
SHA18044351a1aa4c8da23c199bf7ffef2cf4f1f16f1
SHA256858b364327be78723486145d9dbe3af375f5aefa5b19af1571df214ea7f1bb76
SHA5121264539f8ad5262752c2adb95929342f9a1d37c66a1c39f5ce7fcbd3ff9f66b36bcff177976388cec1e4e1c7e9d8e9523405fb5b75cf9dc15088d4790a767783
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06