Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
8f701b4554e85d5447200c2aa0887bb3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f701b4554e85d5447200c2aa0887bb3.exe
Resource
win10v2004-20231215-en
General
-
Target
8f701b4554e85d5447200c2aa0887bb3.exe
-
Size
36KB
-
MD5
8f701b4554e85d5447200c2aa0887bb3
-
SHA1
408ec76fc7c86611253245edbf8f08526288b89e
-
SHA256
675ab96babb07738cd4e129ffd2b4df45f37bd0ccbabe2be450939968a2b9792
-
SHA512
a7c8a6159d39c4fe4346d44a2265ab2551a4362c9732bf4a9e5a8e6128340748676f438acd28ac870aa5beeb173dcd1e91166e2377ef20f9365c3f979fd09891
-
SSDEEP
384:fw9Hjv2GKD31KDZsViGup/hb4AVEyAV7KxFKFT1pD9S/JKDZ8KD32PDW:fEDvkMs7oZeyApKqFT1Js/QbeD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000005d6120a41bddddc38334f358c1a388bbc8f06cc53a5fde44e8e40e7d5aabffb000000000e80000000020000200000005a0457ae60fdb42004486e5942da60f6e9dc1decef4d98f43f93dcb55627370420000000be2754499923d3f3cb2f3e30bcc39c30f0b130c45dbd1d457d426b80cbab15cd4000000029ed458e57029acc716ae38dbbe1cf0d142ffb1f244e86354e7cab968725952ca87e2f7c05910d18a0df228870066c7c831813a6d7207138ab50e47802ef3eca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61CACBA1-C36D-11EE-87B1-5E688C03EF37} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413220372" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e66d4f7a57da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2308 8f701b4554e85d5447200c2aa0887bb3.exe 2700 iexplore.exe 2700 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2360 2308 8f701b4554e85d5447200c2aa0887bb3.exe 28 PID 2308 wrote to memory of 2360 2308 8f701b4554e85d5447200c2aa0887bb3.exe 28 PID 2308 wrote to memory of 2360 2308 8f701b4554e85d5447200c2aa0887bb3.exe 28 PID 2308 wrote to memory of 2360 2308 8f701b4554e85d5447200c2aa0887bb3.exe 28 PID 2316 wrote to memory of 2700 2316 explorer.exe 30 PID 2316 wrote to memory of 2700 2316 explorer.exe 30 PID 2316 wrote to memory of 2700 2316 explorer.exe 30 PID 2700 wrote to memory of 2676 2700 iexplore.exe 31 PID 2700 wrote to memory of 2676 2700 iexplore.exe 31 PID 2700 wrote to memory of 2676 2700 iexplore.exe 31 PID 2700 wrote to memory of 2676 2700 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f701b4554e85d5447200c2aa0887bb3.exe"C:\Users\Admin\AppData\Local\Temp\8f701b4554e85d5447200c2aa0887bb3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://200.221.3.168/h/toon/pian_086.swf2⤵PID:2360
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://200.221.3.168/h/toon/pian_086.swf2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57800dd8decfa6a647ff53d416e40cb0d
SHA1f4bd035e26ff774fd7b85b2c882ea7b911fa74ba
SHA256c20b192d04e043848bc3deab32f0ba77e400ea72c02205bb1552d033bddbb105
SHA51287f8e622fd1f6e9c2b1e762ae65d11e6412699b9a928212143f626fe431d2905ff45d3bcc0f7f1c0ecee1fcd54a74272a36ebe6ceb1d7ae87e1e20926842af25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5538af68c773fd1ff391fa71371b038c3
SHA1692326f9536ab14a5f38f9bdb03d87448fc0a6f0
SHA256fc072b4fbfae192e2ae9959f037a56493cd058bc434e6d81a3a05b1c589f5dea
SHA5128bbeb363b5959efa5bbd0894f9708682822a6e3f36ab6122c4c76f194ddbc99c320313edd9e9ff803a261113e31aaf4cdf50d15943d61a34b5724dea01fa204c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55535d222d348469d08d8e7d0e1f92d70
SHA110e0589e322477369ed1339bf02fe9b38e1951fa
SHA2562bf901574b6e50862c4563ba8e8b84c6f5d0ece40c4cdc3fdbf37d01424fb6e1
SHA5127b91836b3413e33780d606e52c36cc5cd0d0fbc6ca55e7aca282ac5b54e5f6e31f639a2ea57131c75126ce8b1731c28591d60312a3c0816a2def69d8d9678985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce70b65119a85a62d6d0639ac1d36b2
SHA183f9672d7be3b6b2fe42ce49485e1200196496f1
SHA256b7b61e89b6c868c3d4e58f24eefcf52d6ea0e6aeecbcdcae18428b576e047ea9
SHA512b8fa31108b5106be466d0e2078e448065f7dbe9d9ef4822197ce518ab9c2ec39c2dfccd78af8f51d1fa35cf8b3b3e66a3a34c6c1dd75a6f592c87af71607543e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e35800a2003cdb8f871136664649f8
SHA18009b5a8cb0bfffff46189751238fddd7e5073a2
SHA2564d81873e49ddbea585bfac6e702eb711a7f597dc8a8f0a6a8041387c28e5461a
SHA51296dfe0f9ceb59f7691f4712db6ce7fe7beea595e6edb4bf87246963843e34926e9bbabc4cd06bbc3d1cb3508a0b817c61f7d66c1186ddec744dde45b255d18b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f18474709dc76ec9a8d48019c289df7
SHA1feca00c743d70bf3080d64256f0453ffdcf9b9cd
SHA256051b7b5928103c367a8d65e6b2d886d69d457d1c4b9d0b4e9d900de8218ebe8e
SHA512f9f22b743eba4acb79dcce92be77f2ed467c6b29a13324c984c60530bfeafcd1c7eec6c2e4f50417c36d87442b5c86901e5a194ec5108fd3d5b245dd0a5cdbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb76058a748cd8eb945076f237eb435
SHA138e8329c745fed35cb7d04b24a5b336113424cdf
SHA256534fef86ce0e79deec9777ac333a852e5ab6ca54e72bf486e6f69859cf8e8e4b
SHA512cda3bd8b5fc571da89fef97caa3b755d913ac67c60022da9c46f355296b421a01aeea831bb9d77aac0d78bdc73a645496686346e08a3b1edc32ddb10e114fffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a48fb215678603d8d35a0ead7abe09a
SHA11deb3952cca45605cf849caf29f15160aea25dbc
SHA256aac5f5c6175b4696ec1b2a67b72dc84f4fe66589ac6930732711e6efb35f5c86
SHA5126c9761031dd0b6d2fd25cb42c08e036140932d7c55855799e64ced0cfd93b9bdf50b20408c820be5df9b5f5996362f17f5f2451073e6ef41ea95d431e0217576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c019d475ad404b1a5c9b4ff42d91300e
SHA1f00ad863fa598780720b5952fdb7e979d1c67c66
SHA2569b996ef290b5ddd6669190244142cd1eb9300fad0e914eb4bd5e4187ee5d7389
SHA512fb46fa1690653fcc1e692a7c9ff21f915bf2d7c03334d02808b449fa558c3eb84216cd8759f8ca922db2101fa0fda68f7cd8209885c55df737ab3ef7217b3dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4df0918b7505cb137bd651e2c01ebc1
SHA11aaaab36afedc76192b362e9d68d63af30a06840
SHA256b0359257b7c85a68d31daaef06f354e754336c4834d26501aad4bfc34c10b905
SHA512cee095b7ebfa2ab89a92c7240333c1bad6f68f698d8bc62ee01ddfd0d0cdeb3a8f29f959ff99c8575aea4ace780b57da42af86b060efcd4fcaca6e0f999b9172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d4040b044c4bb7e4a2db4550d67f67b
SHA10385f1c57b849b2f14c8ee0675e9ab9d2886522d
SHA256352caf70335d0cc0c49c43bc89436b21679ed037d005cf4bfb990627ef79da6e
SHA512a1755e4c0a4be36656bac2df464a9a0b3c8ec1c6d7d8dc3cb4ae5216ac7742d55be6f6c6aab7a358b9a7a8a82f78fe534c7d2fc4a85164c2972e1586c1dab81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58496dcb7addf6465c61d1d2b79318d1e
SHA1daf6410918d09787bfa5c72fbe197771ce222523
SHA256327b951f200e1d76e9e6c0d441300b8348e31f74f2d31fb7532bcda8372e5363
SHA512e2400fb0fe5c2788045d03735324a9830b7f83278f791e2f32569dbced822d33d6f0f2d0ac8a88dc69c04d67f287e3c5f444d55f0467fa5ec4baf9574d0d8888
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06