Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 17:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://DisplayLink?orgId=ppff&emailId=bf7577c18b91ee63fade071aef6058bdbm3672105bf7&secureId=QYrRHoTUTJMfDmgVviEZUQ%3D%3D&linkId=106790&targetUrl=//7f144cb0.9aaba182d8ee4f4ba3e41ff8.workers.dev/?qrc=aGVybmFuZG8ucGFyZG9AZ2xvYmFsLmNvbQ==
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://DisplayLink?orgId=ppff&emailId=bf7577c18b91ee63fade071aef6058bdbm3672105bf7&secureId=QYrRHoTUTJMfDmgVviEZUQ%3D%3D&linkId=106790&targetUrl=//7f144cb0.9aaba182d8ee4f4ba3e41ff8.workers.dev/?qrc=aGVybmFuZG8ucGFyZG9AZ2xvYmFsLmNvbQ==
Resource
win10v2004-20231222-en
General
-
Target
http://DisplayLink?orgId=ppff&emailId=bf7577c18b91ee63fade071aef6058bdbm3672105bf7&secureId=QYrRHoTUTJMfDmgVviEZUQ%3D%3D&linkId=106790&targetUrl=//7f144cb0.9aaba182d8ee4f4ba3e41ff8.workers.dev/?qrc=aGVybmFuZG8ucGFyZG9AZ2xvYmFsLmNvbQ==
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412365717" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000043445b7c9fdb3be66222a7247a40ac552240d48c063838e6c73bebde253251fb000000000e800000000200002000000074aaaa95448f5aab4c3c8a985a440ed357ae4994ec785cbf6d786b0397e39ccf200000002a587f6e5ca7cf0221866ff6aa319de6e10e512af90fb1c8b5092b09da64bcbe40000000f04106e956870cc7b5bc0e3179aef1f56d0fb77d49d23f1a11c4d2cd051d026b11fbeff39676d5169daabfc4458dcde2e8501c3f828c281443c1cb8fd0254f88 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B9BE961-BBA7-11EE-94B6-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b44453b44fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2700 2052 iexplore.exe 28 PID 2052 wrote to memory of 2700 2052 iexplore.exe 28 PID 2052 wrote to memory of 2700 2052 iexplore.exe 28 PID 2052 wrote to memory of 2700 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://DisplayLink?orgId=ppff&emailId=bf7577c18b91ee63fade071aef6058bdbm3672105bf7&secureId=QYrRHoTUTJMfDmgVviEZUQ%3D%3D&linkId=106790&targetUrl=//7f144cb0.9aaba182d8ee4f4ba3e41ff8.workers.dev/?qrc=aGVybmFuZG8ucGFyZG9AZ2xvYmFsLmNvbQ==1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e43784edd455abf737dc0cc70ffbbc1c
SHA1400a364ccbe1f0249791820942225990c7cf910a
SHA25699f7990f72fe614c3a8870c632dc2b339c924c702f506ed4010a7cebc2b2c51c
SHA5120dbc6c87c5d5199c9db4a5c36a17a18e9f086efe8d0f3b1a4a9d4cfe4ec1d4b0ce2fcd4ab01330a5489cb3158cf1455febdc8fae756a9dfb49ab59382f198ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530457c2d46f9ca71e47c659cfbcf8463
SHA12242db7be32a3a2f823d06445ecb7c662abecad5
SHA256420d2aa5c83e5cab5ad9dea3838921f57e84c8984d38b8f4e2ec477b56a2a344
SHA5127a41bb183308e18e3e3616dc40772b4d23df2438e56311bb4f6ecce8f049a9cb3f4c0392a1a69bd79a8f8affab5a0635582abbd96719692dd41c9429a0968983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d05046c506b2eee98e7d52748d781795
SHA10b12423da6ef54237d1d2683bcfade4a18bfcb0b
SHA2563a839b491209a1d6fcdbb2b059e63b3eb3059c69cb47f401db1324ed1b67e868
SHA512553ce6e71e2560c308cab2794dfc1fd698638d08ed56ad2f1caaa0f96161237afd083537e4406de4f4a988aed933f7f0e06471ea221f961e9cceb0bcec3f9e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f0091c1513702cd279dc681c4c381f
SHA17fc47c519ac531fb905d21152e9c185a80f7b2f7
SHA256a8230fa963a2723fc60c1504d64bd3fd87368b46f1a0e7395b76038b21b9c650
SHA512ccc7b63469085181d5f07278589c33091f58753622262caee95453e74e68cf0eb11f3aef8928be881f02ec5ef463b5b4e2dbabf38040eb2ada4a20d736a5ee50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a22adfd730053b8f9b88d4c7f88fb88
SHA1e8f7cf9e47f6982c24af5a5e9cdc396948b383de
SHA256b4ac3a964faa16d01e6bd036df2c64640745ced38e0acf876945962f22829f5a
SHA5121dad1ad0cafd437de4c398163ee324ce187f176a081e34f8f778ed741be5c8dd34f96d887b7780dca7b125fca018d717ca7da67340c389cd10f6ca9722cd5f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b96e020a51bf3779aa26d2cbcd58eca2
SHA1173f61b2b36a23f73596139bce36d512edd52c1b
SHA25657d4ed8f7cdc3af8fb4f4d3d65e6af8b1704dd646d2acb7b64a91e4906a934ff
SHA512be7ff007a79a1c1804f0c2bb87f14f1726799318555181aa096afeb8052254290e56e1f573368fe1d8f5385334098506e6074b1d6069b46383be505d438d7f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547627e3d5a45da19aab9671cba56f706
SHA10ea608cf7eb85fd4586915cb2b06d7f0fe035482
SHA25633460e75f37ab99a2fbe9d80b139c6d704c0f99b4060c8211c3f420b675c8376
SHA512a074e08214482d03217b103236307e6e8eb5632c75baba675cf72ebcc631adf7f3ba7a45119e233fad6246a65107fc289eacd8a4a77288d873ba5081cc38f483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5198fd1cc30453afc81ffa2ddcdc52dd4
SHA15420d400d5835d0f0ccffafd96466776c303725a
SHA2568a0420edddce66b97d4f8a26a7a581cdbeac1924e0b46123d37d8f12eb4fe2f6
SHA512b66e8e6266edad4ebd12109730430f4d103001abf7eef96dc3a5467788d1ca463f485c9e32a449ca8b991d65922022e22a8fd3504dcfb1e89fc620867ed21afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572011992e6ba453640e3895740b03894
SHA13d863a03026f3ed66d2e80368a918a4dc2410d78
SHA256b558abfa89aa57ee5e12a719959c3fb62773e468b0595495e2db654361c2685e
SHA512bd656833bcabd8a11b8b6fe8e693af26032f7ef159b3c2102ff864ef2287a381e41e0c9c94620114e5282ce8b6ccdb8894e7f3a031fd2a132f78d9156d570548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da4fdd6bdd67366474c51236edebf066
SHA11269e19536b95e2038729964032bbe2f7952813d
SHA256a68fd89d02f15783e1eacd88c9d7ff189a9ebba15054df4416f037ca0d0e0da3
SHA5124fb92b0b7afef77297a4bfff497b2cd7cecf6316f17165d37bd988724630ce8bc650db7409668f1650b795eb66d485e1f0196265f84046fcc1a1644549a51a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51418b2d92805d2f42f04d38814c2d7dc
SHA138abf58af2dcc3ce69cb748a916d8e50891ee8b9
SHA25635fba1b8642d198660c0a19d18e554706b7a0e875a77b8ecd2b57ed47cd30128
SHA512442e33b6b134324d20d970ce6139fa5519dd680670629a5b2da21150b95878641e67e3afb200db500ffd3610b81ecde979ead69f97ccc1c0e9b1f253e01ed9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c3b0d2daedc5f849d7cf50a73b1da0
SHA12e6d3707461494cf3cabf0e4b24d22b9f94bae3c
SHA25609f5a413a7482fde47b8af9d8ea9e5f612f67df6c0d61ee38c955fd6bb1de260
SHA51212edb0e401e42afd5d87a03be103b71e5880b9250ad77c4d04c3f8f9b232d4a278094a3cb236ac226ba9e66013f3456f5bd577924910df1f5c4121306fc4a8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7127e460466f6ef6fdd32468ebd0fc7
SHA16fb2b8c2610dd2dffd4545852490920d8265d7cb
SHA25615f2acb2c0e31079f0753f8b7635f16c68b614e6cf3cb3282d0c8231ee616ce0
SHA51248191223a78ed2091294a3db77145115b8c95fc8962c1df9b3cdc4386aea175e2e9762cbaef73db5b691a2bb9d245a9916b0198e07fd65dcd714e72e7cc3584c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a33ccfd3495e29cd35579035a6914f29
SHA107cabcd27c0abf7fcdfea9cbbdf763362dfc8bd8
SHA256fe242b9364d98f007f217fecc147d65e189f27e1a3e6f03d8efbe751e8ad5beb
SHA5123999329e9263f13ff89bb6d8db763b36199354cc7631760c28f61551b5d03fcbc58c0bc676f3f731e0420fb735a33b8b8e788a564f837423a14cb3934251bc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5074689227bbe1f82e6c2706c0dbba96f
SHA1eb68fa90943f7cd39a51e1cfe00cb0d81466703e
SHA25690aae0d739a2477312cc775f427dee9f5b048e98b54524d7df59872280064b1b
SHA5129cdc70b1c13941c65f813b512fd8a934a777102476e8385aab3a9ebe821a1b46069194c4f011dc710eb07b35e90d39af92aa9a7c7a875bbf15fd95893eddb838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3299ebae5ebac22e722a383e9fa8dc8
SHA1a4f66ec22054de991afc0c03e40313b02ceb4240
SHA25695dce4532bdd97868f94324286df9faeae8cecb753e55e7602540757b2ad1fdc
SHA512ce32eeb146a2e636782731cbcaf2a3e0a65e2a6234be8258eb837b28dfa128a732e3c654262166c9b9e09163935326b280f275c318496064008b81160d9dd051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e8d1c91aaf08e539b7d7e906f5357c9
SHA1b7786604dc07289149a034613f3f61b169c2ef3f
SHA25627467276bfe1add7b758086de6a395867aa32ed9df829baefcc511f3261606cd
SHA5120dc058ee938de6974ffc0b5861a324c7877bc1ee74cccea04bbbe965b0012fa8e7df3548f30cc8012da311f7e4c2b992bbe4d1836c1aed4c554eb5b1c32f686a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce2650fdcf73a3469f59cc3641f3a8a
SHA18401becffc0ea66bdad6035739271b6fd4f76443
SHA256bbb4dc64f75507f178afdec7fec15f8f63b7b882f1a9369de4f3e1cbbecf0bd1
SHA512266173ba62b9840f3f452316d4a9b0c436bfb72ec2a7706afb7e6cbca2ec1313c9f03c2096cb7d57b198c82a294fcf3a287165b53ed7cdd869662126d01f1074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e039bb8ab2a8b783058cfdb2c1e56d20
SHA1836eecaa11c8ce6c54de9e8f093a1e1cad73c375
SHA256ace0b0aaa634b253e810dee159d7b9fa3ba497a872a433d006345599c05c584b
SHA512fe89970b6a672413a341618c5bb3786d4f65098c91d1c0131774c131f24ac1ec54d230569715565ab8d812865618462193323b763215dd8d49d8d22c172c7415
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06