Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 04:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.rcmp-grc.gc.ca/on/cont/index-eng.htm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.rcmp-grc.gc.ca/on/cont/index-eng.htm
Resource
win10v2004-20231215-en
General
-
Target
https://www.rcmp-grc.gc.ca/on/cont/index-eng.htm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000007eea4eac2092ae6add93e08cce3c577fabf82a77275dd3c4de05dcca6452b07f000000000e8000000002000020000000ea08eaefa96d873ffd972f0b8ed43b097d3164c767e7cf776e4ae589e4b30f6f2000000020c5b87da1c95c730864d7c1c349a0389dbf61bcea6d1a67f9028abdc2b3d60e40000000b166f66528fbc17ae8ae85470d14d5201f9b7f3e59076b49a094a52d031d5800f2605c6227ca3c76bf255aad74d46e9374aaa27afa8fca0e68513934e2e055f3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0008e684b84dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF760E81-B9AB-11EE-8495-CEEF1DCBEAFA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412147623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2364 2204 iexplore.exe 28 PID 2204 wrote to memory of 2364 2204 iexplore.exe 28 PID 2204 wrote to memory of 2364 2204 iexplore.exe 28 PID 2204 wrote to memory of 2364 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.rcmp-grc.gc.ca/on/cont/index-eng.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538e183c1c2bef37804fa6be6e7bb5c9d
SHA1593034d3aab0b71a86260118201209163078975a
SHA2564f164670cfdd93f1a697619f4d38296e07e4ad48bfefe027e1c75748da8c416d
SHA5122d317ba539b3febeaa264f16275b9210ca984c90116c35c76e6ad5249644bb78d1c95e751f249eb6dcb48dee356d556a6542f50c2648927d893cfddf38023ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a39defdf46333238c8a684508615ecd5
SHA1aa8c2a3da903cc7075d1e4940ac1dc1d0098b5fe
SHA2567e3f227adc92acc783e561508c00188f7be046358b3f35e7e17556cb7a720b2d
SHA512226c33b5712a6c4fcccef3be2a2fbfd12531f863e373bf1b3940e068b664a3a232ad5ad283361babf6014cb63cf9c8add179d30323de707bb4f6fd5562d7561b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f744a403f102f073198ff09d7236053
SHA1279efb048d68a07610d1acb8c8b970adf9a1235e
SHA25637d92cbaceb984e8d5d7caafe4c4a636b592663c285cfcf78d1df572f030757b
SHA512f90c69e43da67354643a8e0a4224b8e976af5a500cc18641e84abf0f4cb175c57e3b5eeccb220df39e2e9f39cdecffd42a80133dad0e262863d93e2adc1baf0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282805ee2ccb59a1370b2dd3d0d95b33
SHA1bb030433b02805787b171c2ab43e4e4be65ae227
SHA2569334a086c4ba60fd781891aad40d8f19165b9a47b44705bc8c84fdc40159a226
SHA512e34d41d576c6998f5362206c26dc4dc6a206207297a2b6b75ca714d537ce341be6107c2429d6816f2058bcf5d7c6c85cc483a7ef39107dfdbf0a3543c3f84943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ce871361bfa73e3b93608e28e7a771e
SHA1336e1a33fa207612611f5cb3e1cc3353e80c0342
SHA256c95a32a823ea7797e59fa36a8e8f4fa1d5b1309d23c9b9df8307446d0e10bc05
SHA512bf121b921bf53b706171c0474c7fbc3648d7394ca0bce4faa64a906c008ab8bfc143ca7a56c09e9ea7c1a9033c8004966803de4d89f55d701fc2bca630d2b19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8046635700274a5bf952187d2263c62
SHA134961cc47c3e1cb25c55d847593492a77aeaf495
SHA25609e28d4b9e91f55ed1c4fbd3292dc41d36c866e2177e85874725038250ed4cd1
SHA512e365c57b9e01dcbd2b0c1da782fb6507786d46c454f814eac48141c921bdca112716cd97efebc004d91d813a4f3d640cd4ec4a29ba011741389799245f826857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522589261652749699c896c4d709dc4b2
SHA19db60fe4b796059af8bb88827d2d3bfc450ec5c5
SHA25618cd93c340613260a5466b77ed15ae2359234048862262d01c821ea51e65ec58
SHA512b6dfbf09848048e2dce0513e4cbff8a7aa1bfed6706ae40f23692527ce6964a64b6db5dd79dff7a1d8add5f465a769de8d0233855810594bbbc8268634363326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c74a7698b6a55c988bd5184282081342
SHA11960a525fac36a0a2b1e0554cafdb90f6bb1547e
SHA256b20a8ef5f6b7d3b7b063ed08f0416797dd2c0ddc73db577bf8e4f71114b6456e
SHA512338e2055349ea101c9d0a5ac9ea735e6f9f0a34074a2d48c80e6315b018b05b291034f234d30986bfe3eb1f15fc3db1b8c31bb62700913be76a0ab9fa6976010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbbaff7304cdeda31098602e49f21335
SHA11f0353a10d7a07b33a8e789f7e900758ae9faa1f
SHA256a2210ce3a2baca829038c445bb6920550cbb0a17c9154c4972661396c306e313
SHA512620d7145bef64a180690d6efe2c0952e79c3b683132e9e53d07421b2e2d3cc283b98e9488704546f8bd94f5d27e2498add92600f3e2fc2f4579d7400d74e360e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559f1cfc44db459b55fa203e9938fec12
SHA1cac76d5280291f86302b4c412e08d26c5d1d511e
SHA256d67e6cca62d546617a03a2a7fa891ddd0f9d32036c25edec1bbcb744f5b2bd3c
SHA51280d6bb199593fdcaf8ac05f77e05660b75f2acae27ee44be2546965accccd9d8a7935ad4b086074c5b0eb9ea687fe82d8ac4996e58a5a9b753f10bcdde58d76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad193290f520e46022926623013a4eed
SHA151289c03fa57cc50f5031167c8bd29d94567ca2e
SHA256f4ba98567582557b95881ea172ace90e51a3aa29a4e255d56b4a6e539e432d9f
SHA51233f4e4a8595b3bd5bb6431c685db581d8cf05b8df350f41f3818856828ebc32bbb5449777cf43b348576573dc2de176dfad64d441126a5616cd9ad9b524958d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dc357965217a154a1bfb581f4cddef9
SHA17443975d4734bf367d98a3e611873468047b74eb
SHA2563afc0b34a1fd02b2f3ba727fa11b53a8a7ecd4bf8b7d8c61cdc07000682ece5b
SHA512030156f65a131d9ca8e5bf916a7e693ca93d3a09eb4df0e4695b9d1d22612176bf92396d8aadf5d3e6fa9b31e7932b2c321d4055c6b20ef2999df73fb2e455de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c4bc1ca999a07565e1c1b83c48f649a
SHA14f3adcddf67b12a0dc686034e511a7f6e83daf23
SHA2563c1f5a673a47d1fc13ca7d248d040b0824c5693822770f00e48a32d257344205
SHA512a7ce0e73feaac590972e00cc9912e9f7e5ba2f858770b5956ee5b29cd8fae3047db5223d029ecd85bf98a83df3433b921cb2c599c8d8cc4f8eca5d287b4810bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9064a160ae3880a29109f5d323f2734
SHA13676e94a14a6964fa9d113f897cbbb4fed32c4b1
SHA2567d1910dbec757d65590370753e5965d1d3e33302ebc036fd440310a7ebcf350a
SHA512f684fd2efb598ffacc3695f091ec6e410b5e234560ed30c666c7e18ca080ef3417747ffed5207de33e4e4e87053ab96918b731ad71c08f6759ff738c56a66cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e7a735be7cb00fe5b7eff058c13c9e1
SHA19a94776f09a10ce02e27afe13128d6fd1105fa6e
SHA256b1e21b6cc9a70009f9e9f4c1bb7b713289074f4e8dbdcfd755b816ae9a8a2ae0
SHA512b695b273e242463f9824662c67776582ea77d8b6ff3acffbb00c9685d1a360d1a380f57a295e64034a1b0a391814c9e109765bcec5d9abb0f8d427f77437be9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be747ebfd9c50fc8ced62667c48846b
SHA19724c7bd471ece199e1144e871bed4ac4ac4f52c
SHA25645b370fbcceba82aaad27ee2aa705fac27256aa076baad5af386f26b3b39c71e
SHA5128ec263ac4f447bdb945d14398bd36bd2c86220c3976db185cdcca13c01c17a14801376a6daec94971299998df582b441d3c51e4653ca77010adfeda6d8cfb083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559ae2d22e932b1810b7466f4a907749
SHA1a342273d3928f5ab55c126a8f5b4709cf9ee6807
SHA256c42a4b075f24bebb7f6e5cc91d5e1ebdbff4cdc1ec42d2101b3e0ef3cb429213
SHA5128e7bf08a02104b0647d64ed0f95426044638f86216a39316c91cd9e21bd2b27ab940c3fbf6e875902b46ef6add05377d42ea0d758c7ef7a3bf08a83f0915296a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c113601a1a668162e09e093600801d47
SHA187432bb0144d240f37b63bc6f1c2f44262de34b6
SHA256ccbcda5fe3b94354f8ac8b0a923a8bbaf991ee99a1594cebaeccbb3a6fe35d20
SHA512f46b41ae713738ec6c398aa7c1d027e9a2fd39ac7a84b6de76df6c679c54a62160344c08801e5f9cc57f120e0bf7d13e45c5922ce49c69db8911e0798dc283f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5375825bb595ddca20833946f88b26a86
SHA16e033af245d6e42b4a04a8fee6c449430046a4c6
SHA25668450d05f8569f60ba5993c28909f077fc33b7c04eb0432de609c5efe6af06fa
SHA5129db64fbea13f41de65e799c52b00d550b066f47b7aba943accd25c3fa7f5a0397e2aec07bca3b2fc352e90fe9f273ee640ea14c7ca60bae663a6f20a0277d46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510eb37cc353654b38563e9c04fc6ebc7
SHA18b4bd7af99f054025f1bdd8dc0ad676e9439ef7e
SHA2561b5957d638f150e243c8c923004ed339797ea55ea74c9c6b3591b919e2565b5a
SHA51237448226d810a8c8c24a0950c74e8d801d6fa9fcd9f619bb66fd0c22e2070b411ff6f3bc18e891f8dbd600379ae32254884260b271bd31ad4731b8d6cb4416fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac05eb5e599b20f65616dd4f744df2a0
SHA1777c99023b70a17572fa0a83758ec86f9674b9e6
SHA2568d70ca9c1c70c2090ba2377ace2f9d9aefe114eab12eaf163fec31b16bd3d6bc
SHA512474a5c11170dd8da787ca73c998df82053b9d1bb30773577c360cfcdc4b8edc677aaa5d68608ac9541942b06bbef042076ca6e33c4e04694641d00ee0eea85ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06