Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 20:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://x.com/therealbuni/status/1744578620352237975?t=pzO57Ld5BHL3-kBzXUpcSA&s=09
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://x.com/therealbuni/status/1744578620352237975?t=pzO57Ld5BHL3-kBzXUpcSA&s=09
Resource
win10v2004-20231222-en
General
-
Target
https://x.com/therealbuni/status/1744578620352237975?t=pzO57Ld5BHL3-kBzXUpcSA&s=09
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C2F1871-AF2B-11EE-8D15-FA7CD17678B7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2176 1736 iexplore.exe 16 PID 1736 wrote to memory of 2176 1736 iexplore.exe 16 PID 1736 wrote to memory of 2176 1736 iexplore.exe 16 PID 1736 wrote to memory of 2176 1736 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://x.com/therealbuni/status/1744578620352237975?t=pzO57Ld5BHL3-kBzXUpcSA&s=091⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
8KB
MD5f46d5b2423f00fb92e97c2e859ad2791
SHA1a37363995cb234152d576482a9b900007f6551e4
SHA25610ff9c13f9d7aa186f9d09e010640455569e86dbd9e1b34fb811011c0ed34c92
SHA512697886fa43e72ea31dadc5a7358ce895b5a29d7ed57a3d6d892e581f446a0a748547d6976b7e241719ccc84bd7c90906e45ed5b743f68f767fe7c39e3522cd71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58d0c0a132d211998fdb616d7698ef505
SHA18a1e3b4e35e8679368974fa4e0262f2dadd27dc6
SHA2565ad3fc7a307659b17148b1a9cbbec65d6dfc784f9e5ba9432d90a853cf70c439
SHA512dd7a5604961bfcd994d25ca1df7e1f46d1f213574dd4659d000405804db2e174f823dea3189c57e5e9988c82d3e4952bae2a75ccbd96ab11e3fc0d007862158d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c64341a439c365557fa24db476921f1
SHA10bdb9f9d969ebf9604507897969459053cb44cde
SHA2564deea1e38ddde0c1b4f6f28a69a64bd4ab1ed8b598a744a3bc8a0a84762f726d
SHA5129890765f5c158629b56b55723f4abcae6400f7e91607f25ae0f4597d7ed66b8178fd8c89d7397ece07e141e28ff3f136ba88f9d3853d364fac9700fed907f4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7d81d61bf69455dc662a57045826ad6
SHA16ba5abebed0d288fcceab8a87ad53bc42b2392ab
SHA256fd940f6fb78f6153d2392b1e938d040f670e8c4b77cb9e4883e19913114724d3
SHA512f895cb912e1b230981d5d66564392342ba5033adf4f595cfb0b657676fd297e3214cc6b46be10afa7ec2b6b8681f8ef01474cf0672400c5bd223430588600f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53c569d03b7dab223393404952b8172ca
SHA10cd2931c5cef55d8ad7c04e612fc3f3a43d5e82d
SHA256ba2fd390432b7836dcb2e6e57d285361e6562b781ae1ba795ff8e5a0022b1474
SHA51239c50589c2064577ee5348e407dd542c265a81645eeeecb7c0d0ce740253f1453e81f24cb4aa02a55654c64956d071f6e2232132ea9e70cd87e32577bc4c5c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e