Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 04:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://https:/go.mercurygate.com/e/55572/ex-utm-content-Rate-Management/n47gd7/1562141198/h/vYmLbE-A2sB-fCogeWBuMCau4bL6ouoIqNxWfkHWJAI__;!!D1sDotPi8BGI9gw!kyJ09ofE4m-8IFoVSU7oLxS0g1K74IxprOB_-j6SR_nzTAh1jLSx_T47K3LiPXiQkZe43uNN0-TRrSC6LUuktA$
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://https:/go.mercurygate.com/e/55572/ex-utm-content-Rate-Management/n47gd7/1562141198/h/vYmLbE-A2sB-fCogeWBuMCau4bL6ouoIqNxWfkHWJAI__;!!D1sDotPi8BGI9gw!kyJ09ofE4m-8IFoVSU7oLxS0g1K74IxprOB_-j6SR_nzTAh1jLSx_T47K3LiPXiQkZe43uNN0-TRrSC6LUuktA$
Resource
win10v2004-20231215-en
General
-
Target
http://https:/go.mercurygate.com/e/55572/ex-utm-content-Rate-Management/n47gd7/1562141198/h/vYmLbE-A2sB-fCogeWBuMCau4bL6ouoIqNxWfkHWJAI__;!!D1sDotPi8BGI9gw!kyJ09ofE4m-8IFoVSU7oLxS0g1K74IxprOB_-j6SR_nzTAh1jLSx_T47K3LiPXiQkZe43uNN0-TRrSC6LUuktA$
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411111012" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0062ffc4a44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{249288A1-B03E-11EE-B59C-EE5B2FF970AA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000777fa963b23375e9a382d965d669de85dfc3dc8b94cf085af0496a431396b41d000000000e8000000002000020000000954fa14c87251d0feeb6e5a9245ba137c9aa29c8cead7de03508ecbc3fb7aaa5200000000b9240bea33a8033adca56429ba9db16fd58b5a864d8d526c2a6819d927028d340000000f0d98937fbade2314ee397071d682fd85d7aa2302aa626966fc47f5b01973eab677f75e3015321266d8f218f796a9bc2b877bee02d5a1fdef7bcfc2cbb4d09b0 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 1456 IEXPLORE.EXE 1456 IEXPLORE.EXE 1456 IEXPLORE.EXE 1456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1456 2088 iexplore.exe 28 PID 2088 wrote to memory of 1456 2088 iexplore.exe 28 PID 2088 wrote to memory of 1456 2088 iexplore.exe 28 PID 2088 wrote to memory of 1456 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://https:/go.mercurygate.com/e/55572/ex-utm-content-Rate-Management/n47gd7/1562141198/h/vYmLbE-A2sB-fCogeWBuMCau4bL6ouoIqNxWfkHWJAI__;!!D1sDotPi8BGI9gw!kyJ09ofE4m-8IFoVSU7oLxS0g1K74IxprOB_-j6SR_nzTAh1jLSx_T47K3LiPXiQkZe43uNN0-TRrSC6LUuktA$1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575492f42925b98db6a71c19fc91786b0
SHA1df4e1e801199fb3963e7477051da1926ada6eb79
SHA256d05cee4adc6a6f4ffd4654976bc6a8dd20cd060c3f6af39a3f37abc9585c0b1e
SHA512b390e7a26b8cb781cff0f6544a9619ad81d895558145391dbfb3df0f78e792be8810944115c99c9151b87b7dbccb69063f757646848d13097eaa94890f84b205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cf872af591e3022f4514f1ae6e359c2
SHA19571c2187ec4656de5a124ec80fbf248970ca784
SHA2565085811116a9ef208fe4ead9fad09c176e1eafa78f911c642d8b621e31b73734
SHA512376aea5cd350620aabff77bf785d96c732ff2478734c1fbc7fd28db9aa74eee5294f57b92c1fb193e55a4939c915a5040aaa90bc5a812353c106d4011f547b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5185f959aaba2b485ff2cc23bfc1d0580
SHA18a985f5256049aaac0cc874df05714518ea23166
SHA256666ced24c45eca84ca533b14d2afe3769e603ae6bb53efd630c8782e9745744a
SHA512aa7e8119283754d7c20b5366fd735f4b0df8c98defa3b156f242dc87299f75bbdd49b85d07648fd81ceee9d08cd16584b9752579765ce60cb57105f9abca26d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff43e0036f2c2ea8d2f972fcbf8cb634
SHA19741cd42f36f1698394ebafa1996e9183082b0bd
SHA25667d98355ca530c49ace2bea071d997fe3861d2af4e74748718a206c5814c0832
SHA5124e93542254106cb87040d5bd5627a27874a107aabb7f16bb0b9b61e3d61c6652bcc2b1b9311eb5f67b3955dd0801892214a4615c0615e05d54a6ae27d6f0512b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54949d190737478dea3a0d5048e91e907
SHA1435557e0c0979653968286bc6bd7eda8344bfa18
SHA25662f60c289dd09c0ebccb296982ff6c18d471b898da555e370181654fa04410f4
SHA512db0880624db315742db762c901080e0af5cdbb9c0841365fe26e6679743170c508d5783e9ca4941a15aa6283c3e2d277e07f3a9e3942cbfe250b9e71f70bfc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e72a319784586b184c91ae6a375a02f
SHA1b0b71802ca864c57250791b7af02a09c3f6db30e
SHA256a7db9e419f1b2d59376226bc92e9b89f48256f3d3a6792f77817a21765126117
SHA512b8e535027d99eb8cde19729fc40fcdc89fa4d459253de513cd8bca4ff166b5e047dd601c2df848a514334c0d6f0b19ac550b93be55843ef2fde68e1ede82f238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dc656dbbe787ae4af26edb2d431be7d
SHA12d382a9432454926e5b7ac3043d513df549d085e
SHA25659b99b38f5cf490d7c094d8b17b314881e7675f044866a8614b6e0162654656a
SHA512159f87b8a86411745bacc08dd91fbd68071d18ca2cd9144d9a1572308b43973096030e0b658590d17786ffb6512bfb1a361ebc8810733d1fe9cca3d193f90752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b41a844180ca3b28aaf7ffabbd1dd1b2
SHA12133b3a20ed06365e701dc966b4336983529d186
SHA25670557beb492a710af08fcc3c977344d33d4c87b59e7e42f16bf3220afe78f5ba
SHA512fd02e398554601b525df171bafe36158bd060a23213f067ab8989d3acae6ecfdc9c517b8e29279addac8d3b81851b95c4abca2bb293865e5611a42cdb5b463a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c67cfbe692e041787a9e84f3891a841e
SHA14ac28318bf83704ace53380356a763f1ca826b0c
SHA2569a762667645e98a184b269a9ba160e49c64e07b7a886ae197677c4bf07ee6837
SHA5129ed4ccfdeed8d78a7b5ecefd4a104b44b03f97a1e8b21cad560e4d1d133a6f99ff3ad9cbd2b883c81ce472abfe73acc33dc6e6850bf5bc6b6b5ac62cea7f34fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588dbeb8dc07ee77e36bf6ac48b10c9e0
SHA187267a9b0542096b3322db1960af3063789c7af7
SHA256c02a55f3715f4118b5645f6a233e779590ee145cb1aacd72e5070f60d6c9a4eb
SHA5120853037f97562223c080fe49fbf726cd69b16bf8ab41bce57cc7dd66108edaa9955847721fc4f1187a6e56a877944c7d853924e99851edc44bd2968d9bf285e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb057741a2de9fc934e69a006d528670
SHA1cb7537d0ddcc4c432e5d6f15e803b54164f35f68
SHA256a45cba84e5ed347b6a26713f087536f0c89a4d3f1bc4766f4ab6d85fac87c032
SHA51263d71fe262ffd1bbc6e8e7d2993b3fee3c5b2953a86eb4adc806e54f71efb18cc5fcc141bb1a508a7a826029b0805007818f88c2607398522e7ecb42b520c2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfc65c093392938ae3eb7bfd6b6d9d6c
SHA1654ce2d14aea45e54107c3f4c3e53450ddde4506
SHA256e2465d99094f26b6d537c16cf0262be2d6c0d252513388a67243454710fea7f5
SHA51278b13955f9e679b604ccfaf2e04b23edc40f28ef1585c8dca005d6d58f7b5100a07cb36eb64281208de717ebc04a084b0f0c7807679ed1d7317536da5fc1e387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5992f9c66f25aa8fcca5f687639bdd48a
SHA1124f6a847c888cc953cd35cf3a1981d71351b954
SHA256b37c82edbeba14590408b7ceff6c02c11f5fb5edc2ee96f3b15c087662fc6283
SHA512738420d43a75ad1808a8c60114fbccbb6fb05da00a4010dd476d27c548162b0a0b6bb914a720cacca6704daee57e4df1a8415e195a4b38235e21a41646743323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e53a422d9818aeaeab240d180d80ba40
SHA166fc52e71c0f1746b5399fb785e2c3a7d4e92fb5
SHA256d2612e757954f8b014267ac0618f57b28a426e6ca7159dfa7c186b0d8b564f13
SHA512a13405c3ab0eb1309c6e456cb334a307823471004d5176767554aaba7c93c7afcb16bbc1deeb17a04804639f1ed68e04d96f9ed2c2869e6a1a155e7606759d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ca7901864bf17a7958714f48bcd7447
SHA151eeed7bf62525b4858662ca0223d5e8e39c136b
SHA25673dac494431b88fe80db6e4f1e498b55abac9c31c1575223c30f62d447c5978a
SHA512c86c9eb7df0b94cb9ee05fd95903b056cfb6bbcc2eb69b75a5d7d14b53dbcd992c5d2dbf74824d015ff1000193203017fd1f89ad44211422ff52430d5237a93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6f04bd1021f58410a63515fbb0a53d2
SHA1e97a2032517b372dfcc9da82c020e9dea906b9fd
SHA25665be4d8ddbe4a0462b3636a49c9840b7e59c22da9691cd35bfc4f69ee22f025a
SHA5129346305d28d9317e5587d78c15e7e1e1d33cd8e957cc39801e56c841753093ab7e93035f3e1d52bf38faa400ea4d022b2d7f1a0cbd8ea14c8d5d2a6f6bdae8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8e541c8250c571cca8906625c944071
SHA1aebdc2e0fffb44a21e376eb65a09c042afffe146
SHA256c63732933de00a195c81403e34276640b06a3c0e0dfc5ba3c8854c9dc76d482f
SHA512fa308bd0bbae7344f197c29248593bfeec88b8591754fc71501b1959a80a17aaa667ee9c0db0af5da1edc4b9fd1d4f761fc61151301ca782846553bcb18c21ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567f0c8bf124202f7e79aef672365eac0
SHA1fdc198747edea0678af7bc7ba000c161e93b887f
SHA256360c242b95c6a31ecde265fbb3df248ff6ed1b17fb76bffd1071a0144fdb3acd
SHA5122db146c3e6ebbaf3ecd6efcf54a63a48f05253cb9ce76d3bf7c578ba58ecd360aa48497ffd479383ea338e8d3c523b5ad3a217fc1e82c9f40ddb36b66b366fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53033e9168c80b167fb0e5ded922d8722
SHA1c9df18aedc623f2d78cc358e8e2362742e6d6361
SHA256ff773f2feef1f15433ef78b1fc0c818d6f9d641d34d6c6c5be67f20c7b26f4ac
SHA51251b0787f553b3fedb7e4d6f8802497cbee1147995a01ecb6f67f5f86dc190029ccb444edd1363ec8bc9ffba9adb33da8923327cabea1e2c05dc3692b3e7c407a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06