Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
616s -
max time network
616s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 11:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2393.mediafire.com/g89qse524x6gM4_8xohA_TWuZxdEkRNIoHxILjT4kFSgJtbRshtdH6OBvhDBy2_ODRFowOvROQBaZE3FKwQwb_oAB-lKMwuNIkpC_4HehcNR399pQye3gE0jBfiEePxp6G7hZBaZTO6VaMSPitbmlvtcxDIRaAycmodWoO6-2BGb/fkz5gfddt826621/Xfer+Records+Serum+v1.368+WIN-TCD.rar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://download2393.mediafire.com/g89qse524x6gM4_8xohA_TWuZxdEkRNIoHxILjT4kFSgJtbRshtdH6OBvhDBy2_ODRFowOvROQBaZE3FKwQwb_oAB-lKMwuNIkpC_4HehcNR399pQye3gE0jBfiEePxp6G7hZBaZTO6VaMSPitbmlvtcxDIRaAycmodWoO6-2BGb/fkz5gfddt826621/Xfer+Records+Serum+v1.368+WIN-TCD.rar
Resource
win10v2004-20231215-en
General
-
Target
https://download2393.mediafire.com/g89qse524x6gM4_8xohA_TWuZxdEkRNIoHxILjT4kFSgJtbRshtdH6OBvhDBy2_ODRFowOvROQBaZE3FKwQwb_oAB-lKMwuNIkpC_4HehcNR399pQye3gE0jBfiEePxp6G7hZBaZTO6VaMSPitbmlvtcxDIRaAycmodWoO6-2BGb/fkz5gfddt826621/Xfer+Records+Serum+v1.368+WIN-TCD.rar
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 10a4104e5f57da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A7954B1-C352-11EE-B2C4-F6BE0C79E4FA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413208845" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1572 iexplore.exe 1572 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1572 iexplore.exe 1572 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2640 1572 iexplore.exe 28 PID 1572 wrote to memory of 2640 1572 iexplore.exe 28 PID 1572 wrote to memory of 2640 1572 iexplore.exe 28 PID 1572 wrote to memory of 2640 1572 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://download2393.mediafire.com/g89qse524x6gM4_8xohA_TWuZxdEkRNIoHxILjT4kFSgJtbRshtdH6OBvhDBy2_ODRFowOvROQBaZE3FKwQwb_oAB-lKMwuNIkpC_4HehcNR399pQye3gE0jBfiEePxp6G7hZBaZTO6VaMSPitbmlvtcxDIRaAycmodWoO6-2BGb/fkz5gfddt826621/Xfer+Records+Serum+v1.368+WIN-TCD.rar1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1572 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b701028fe2d1d63e0a51af63de1c9cd9
SHA144663a8bda963fc2bec6fc60399dfdb3955e5d49
SHA256e1c03209acf27d238c873afd1e3336bbfc00e3d8badd40b5c1c18416b0c7b9e1
SHA51222f4d78025ca28a1e208ba27d78569f6618fc676c48f104fa8a41fa141df3bb5ed15c75af8eb7676726df5635bb9f1b4f8b235df1cc094dad117e8f3577de46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550240c2564308ea0d24a486a9deda6d8
SHA1844f1ff1c1a03e67d744ba328e1415a69cc50e49
SHA256b23252d58143d038c38f1b0e97d21936daad743f44f3b30c3d03e088fa54a4c3
SHA512438e732b59e145bb5e61c0af0700a4125cf83205ba1d62ee35cda3ebe25a8ab51b1589a21280733a0cf3d813bb0e5f6ab22ca62b543135b0d812594c3143517f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e33abe41d7da1116e65464bb0083882
SHA1b8ec3f103e0d5c585cbb5e197ef0508b43dcd968
SHA256204b3fb9cd618b0457ba9c8f9fc324f0b9d740a91934ebe3f5697d3f61af5d46
SHA51200d43e6fc4493465ccb907df42bcc6b01354803a7a25e8256b801128f36f9e5d182245875dfa0acd7a1d822790bbd358062546931e2dcad8a04a7694fe44cc8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ceaf6419ca30537effaaba2470115f0
SHA1b5dd225ba8154fbf0dbd36650ead47ed4c1e42f5
SHA256bd822c86820056b145f9eb657a5d5365a8211d6c4eb511739f406c99fe4b0482
SHA51254d2064689d900ed3dddcffe30142cd581ed10125a3fa52a392551d96b51924a7539ec4cb5cae0a0f4be8ec992c414ce27d50cf96fc343cb9c6ea957b8209885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54810e2024ca69aa78b14734c608cdd90
SHA1205b645941b5c208baceadf51cdd4b84f1bd405a
SHA25644a5f96d8d6c458cdca674db871ecd209ebd57ac3d1b91170db1233dab48b211
SHA512add1b0dced4d32fa62b84d4437ad8daecb318ed32e7cf9f469d7f1ab32b973297b6f4c01ac028fe70421e1be797fe00a71ab380fa07e221f4ea1c8f987d0c496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b78178c2cddc0668e250eb5efdcdb3b4
SHA1fabe4abd60f2fe214d32a5ad2c145fc0f00f5fc0
SHA25687a7a5cadc8fa33bfef0ad0b89e0c7f460bb5d50e511bb708aef89de16c67afd
SHA5125f27e19ce50446b22276dbe18ae98a1c73a535576ce1ae5b44735b66314bdfd3e259b4011817fef2d85328f29faf8438b51130e6bf163feff28b5300d5587b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ec93faa45de49d9cd5d4b6e7871aa51
SHA1374aebe0c4f036e0bded3545bf8fcc95cab42680
SHA2561a5e413688320c7485512690ee37f6c7599e806bcd5478c25aa91e6ed5938122
SHA512e5cc0b3667d793821b9961846f85d6171781777bfbc73db79f4166d038b99a972bf64f604792839d2098e67ae142f665b70d89392867ea93190262411da3623f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5722b55355da65c9f1e7fefb82675f983
SHA12ccb2513cad26845f684fb9caafdf109a712bdc1
SHA2569613f646da87e4123464221a801198ce261739913a22cd67ffd4a083d26a2595
SHA51220822c854a8ce8fa1c3c632bc8adda3aca5eb90adf83354b3f1bb752ef6946c4290255912ff4744cbcd4fea16ecda61efc999b382c733bcac343162b16f9a4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c6211db772210f4f0dfce73323d4be3
SHA11fc3e48ee2f8e26cd4e04b75450dcd486713e704
SHA256bb59da6d93ec1024fda8afd6f06bc6bf83b662a07415d2268725797585fbea01
SHA5127e6f5a854e18b7d32abcb93ff0791a48f93a9b9e672d52f99f4acdd552acad679af27b7a61416db41ca49c97208e5a42d76bdb680125db7f240f8fc8686c4cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57216cf165694988a7a49d745e04d02a3
SHA19a173f91ac6a45705dd85f004a6d83fe106b6291
SHA25646ccc286b94c878b87c7da2d9a791c2e27adedce575c4947ca3e4e28b8a9b90f
SHA512f12b8a9df832151cd3b6024fc15732e1670360e805405b5f28ae012b59b6c5007a1af7ea31d1db6c5419568fca4ef9b741082f668bf769819528225921f82327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e437330074dd279eaf53ff9d32fd2555
SHA1a37b842a732a92c8c8ff198b624b4ed2aec6cd9b
SHA256170a1bb5b9745f78dfd620a1e024b8d900bf705c92eb12fe5ea4e034a1f4edf5
SHA5125a24f1ca0f2230d08c9b2ddbae5cce201c1f905beef9810d76eccb537f12305ce516e6b117f5edc72357147452a120d496cf73f0fbf3b9eea90a0fe23afe179c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e43a48e94334ee82b2f4429dcc52f093
SHA181bd1e596d2719a8d3e02762e55256a9e54dcad0
SHA25604391f5b2538332341e66ac9c5d168c9946e72e24aa5e95a7087063f175d775d
SHA5120e885a6902df7f8feb12f7375e5c864fe7f564514e6b8775c9a5c05b95b746e0b8035ae7d3f57e675ca8b389250725341f5e25d43084d29a937f58cb804895cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571ce34f97bc2f65d5b0760de0e5c1b4d
SHA1998fc373eddb5a6c5a70fdf7fa5d4a89b5234f56
SHA256c9825c0ad7734d711af77373c9f02b9ec337cde185f47f0e9f1db90e56010705
SHA51257b6897e0c0c8ec7f41d170cf0579dc46b804c0e8447f4dd5cf8f0ea2255a3b7c69ea72fb0f689e4fe9f4c9d5599bd71e2e55efc1b795fe2078523430c9fb5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56d90cf2f90a4bbcaa7e5289247947a8e
SHA1bd924279d4cc2bc796b9d2c22c088fa17c03655c
SHA256326fc906cfb5290e0de286f9aba65b8d08548671866ad4f347907072fc26ba2a
SHA512bbc1ed6d416207d7d2ca54987f85ed129f74b77e4a7a68ac96af1f5cbb474719a39df302374de0547b1a112f271fd65b335eceda84ab9dcab5092c75d71fd664
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06