Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1Salwyrr Launcher.exe
windows7-x64
7Salwyrr Launcher.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/fa.ps1
windows7-x64
1locales/fa.ps1
windows10-2004-x64
1locales/hi.ps1
windows7-x64
1locales/hi.ps1
windows10-2004-x64
1owutility.dll
windows7-x64
1owutility.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1resources/...ct.jar
windows7-x64
1resources/...ct.jar
windows10-2004-x64
7resources/...er.jar
windows7-x64
1Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Salwyrr Launcher.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Salwyrr Launcher.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240215-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
locales/fa.ps1
Resource
win7-20240220-en
Behavioral task
behavioral23
Sample
locales/fa.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
locales/hi.ps1
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
locales/hi.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
owutility.dll
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
owutility.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
resources/elevate.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
resources/elevate.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
resources/libraries/java/PackXZExtract.jar
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
resources/libraries/java/PackXZExtract.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral32
Sample
resources/libraries/java/launcher.jar
Resource
win7-20240221-en
General
-
Target
LICENSES.chromium.html
-
Size
6.5MB
-
MD5
60afa16cbc3798cb1352314311e93a07
-
SHA1
0a9daab3a20586ab2a07cd2857a2f2cd65c25d32
-
SHA256
ec105b4cf1588e28ebd596b2c354e44b4fe2cce5e6d5abbc7174ec7be3df6a09
-
SHA512
839905cb7d697ae77beba74a3c82e65d1d6328c62fea6933fd8d490231d1a6bffd692fdbaffee86483ae967e86fd0772fb2bb327b054d08fc0c9177f3c9c26fa
-
SSDEEP
24576:kP5T5WfWSJbJlAV8gmfwN6i6w6C6g6T9GHpbUBpUY:vuw9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAF6DB11-DB1E-11EE-8E7B-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5027d78f2b6fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415825422" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c95582b59b70463db0b4a4c4637abd773c7ed921f9eeb942bb111d69e08bbec5000000000e80000000020000200000003b15f44005ff5fc4e1ccd26419160c0e96d89a21ff6126800a036d73eb1409fb200000002a3ed1bee31a16f7c71376ca7c510bff0ff0d653b11a8f2fca606c5b506c208440000000ec6cf2503a2a75f94103471dbeba40548fdc2ac26f2a3236fc81af87fe199fb963bd10a641c665f34aaeb2290ce5d78091af041195799b03a60e16b9391688be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3048 2240 iexplore.exe 28 PID 2240 wrote to memory of 3048 2240 iexplore.exe 28 PID 2240 wrote to memory of 3048 2240 iexplore.exe 28 PID 2240 wrote to memory of 3048 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b042abf7a7223a92c976bcc7077ded5
SHA1538e2e8ddcc2758b0d274d6078965867efaa57d3
SHA25675f97850b442b4c9550d726a6bbb55f7f5ee135b439327cbf5a5854466f7a961
SHA5127158bb0ff9dd5f01c1412b7ea0570491484e36cb40467c344c6aacf878314c49c6f33534618111d5d838885c5a6df5a6f1d00d79263cee306119d917dfc76ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce809f750fd4bda80f1a148bdf646e35
SHA1e63a1e18dc5eebeb1b51364b4dbde127633aa4c0
SHA256d746c69e2f9c477bc0f4640b1152cb059e659d258a41354cdf2f4c982a38dbe1
SHA512015f242a338f2600036d0c34a4f138646f96168fc6adbf44ec4d4112ddfffa4ce0d1e74dc7e5666c1b282b2e241422a1682fd214bbd92d7b62b6e060a3846ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9ddae10767256fb53db542044505390
SHA11e9336f42a38a7c204542a0614f2d33653b700f1
SHA256f5c00a8e912037835b61390e931e71b70254eaca8fab9ce8e51c32467148a1e7
SHA512e1dc4e8b92985e533fdf27dbc6e8c4843aa0863fbb18c705bf1e2943d42113220380eea245cf503fbd98c25fcbd22f73c639b8fbce9cc83092ea006f6a0f2333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6298a28a4f1056c77055989502e68a6
SHA13784305e28e687f79b1bafe3a2c0ddd6edebdcd7
SHA25655ef05bbf06fa7d7e0e1f84e3e6e9e76e878e9bfcadde3bff839a4cb296a2df6
SHA51201685e5e01efb667131c916806756723d05c3397d7f0c89bd175f4220480f59ad5ae5633b523238444af97550ccf0ee6d4a8bc61b4a6c30702652fa61ad68df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a47192d64385ba547080e147f04da9b0
SHA1faf5016afe47365f903a014b5222fa1d26297db8
SHA25649f5d335d897f11757ae42c841935e3cc5e76cc13a35666a9c232bcf13a69873
SHA512c3fd189571ffca29c5e164b974a8793a67a5c147af6217066838da806b84d0a3b717a55bd72e7ad2a25effbdc69facde6f8499a5298e0122a3c200556145c71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efd1b15f8fb33520d9744e4b2a8c93f0
SHA1b01e6bb023ebd09cd64a7e1a46eb18881ebe4919
SHA256ce9823333777fb5c11762d3c6f379ba8dfd2fa5f64a922ddf7357e740fd54615
SHA5127c853be9138d60e5c53d784c9655985acd59a33526611b3614abfd276901637e550027390c2d90cf8d46a7b5f734078cdec23a46bbdf0861df58b885d4bf98f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e97b646b5f840b08bc25bba6f978eb
SHA1b6c297765c67e7dbdea7289e1173748617a46517
SHA256064963e4630753f8a96b25ed1b4c60518df2e6613374ddf73122e46e209cf715
SHA512f7d2ac09586eb3f3276788ae8e719542ba8fd53466741cd56ab29b75b8366d2e65345373d57d32a5b5574f8422b3edf39f4bdc1e6b4715e20be0ab051c4ecf99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae9e307ae0ae2467e410755b4aa6ab5f
SHA1d08ded7a0b59e9197fd1557f8bd96dc79bc4db7f
SHA256dd9940b353ef1f3c8f85d1596f4d9c8a1a58700bcc48593256badfb9b85c265d
SHA5120f417249d25f4c1f83293d92b8d04122dc69241c25c0b0e95f020948466f2250dba08352a7b0286d4c187271148776f92672f5cc28e8278d3ecafee0e16d57fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7ea1e2b7ae7805aa09124c3f913cd5
SHA121857d1fa3a9ae6c34b0d1262d6b556818ef1f6e
SHA256f5113ff9cddc3440739995d78013ec7aaac3d1bda2b3dbd9c8dbf06eadd878a9
SHA5120eb35f9b6631a10d83a3387960f295e27677e6148a029b61360de8ed6319fd3cffb7a7d36f44dacfa0fa58613834a5644dd0fca39579691165801ec420146786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccfa4ed77e555b52a41ea8bf0b3ff052
SHA1728f7de291cccb257f2c5afcb4fc15281af9dee8
SHA2565217ad304d6736f9a18566bdf198f820117070684b55df29e907b338ca8b8e83
SHA5123c048a3b6ff5d6870297d9abdabd22a4b511262779f3f834e6db46d8de2c7cf59c716ba7237ae5e9051a7c9018243f726e313887449af69ddc97a02fe74f0e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545c02cf5a2be2a815c147854e13d89b2
SHA10950da7ff8b28d50fe803843f60442663e4dbfab
SHA25673fca896d840388e32af629ed610f6f451656ecf95198283fc43617a9fe15812
SHA512f08ee04b5634a5c47eb254587568eebbff7c76516309c635926149a0ff22dfe6b912c9375421b2fd570a4a8a817bd5f92434979f862200469babc3e78607954d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63