Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1URLScan
urlscan
1https://e-z.bio/vojt...
windows7-x64
1https://e-z.bio/vojt...
android-9-x86
1https://e-z.bio/vojt...
android-10-x64
7https://e-z.bio/vojt...
android-11-x64
1https://e-z.bio/vojt...
macos-10.15-amd64
4https://e-z.bio/vojt...
debian-12-armhf
https://e-z.bio/vojt...
ubuntu-20.04-amd64
7Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 20:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://e-z.bio/vojtax
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
https://e-z.bio/vojtax
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
https://e-z.bio/vojtax
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
https://e-z.bio/vojtax
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
https://e-z.bio/vojtax
Resource
macos-20240214-en
Behavioral task
behavioral6
Sample
https://e-z.bio/vojtax
Resource
debian12-armhf-20240221-en
General
-
Target
https://e-z.bio/vojtax
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000af57ad0e1540d0c4ba903b010556521724183b34c57e62fe0d0d749db9b13c9d000000000e80000000020000200000007da9f470fd9d6e135a730c80eecdd38f25a5d856792087c65331e76a4f2eb7ac200000008a357c4a17f9277c6364a99d939079756b9992e443f9a3c29a2d4f66336fd58f400000004981f150b3e976fdcaaa0adeb485377841677956f8671cb392244312f2d1f92eb23181cab499fce44132c9c1530433ceb4c5837a6bcadcae603f967b76852e07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416177111" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d097816e5e72da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91226621-DE51-11EE-BC03-E626464F593A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2516 1876 iexplore.exe 28 PID 1876 wrote to memory of 2516 1876 iexplore.exe 28 PID 1876 wrote to memory of 2516 1876 iexplore.exe 28 PID 1876 wrote to memory of 2516 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://e-z.bio/vojtax1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD56aefb332dbd0b785fed5b355dc5df4a9
SHA1061498dc178eb31a66537506e2536696a98eda1e
SHA256ed30b06364f85f9dd46f57950ca2a8679f4a075e704ac7b9e13a20321774ac09
SHA512bc33645ee9a94456c66dedd3332ee998c14667a955cc8a193d80d1f1d9ec3906b564390d552629f24f70cc3a6403ef3b6ee5fffd27060d38732fbc61f973c5c8
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD53b4b4e362215194530ece9a158aeb356
SHA1f8c1de37c06d36d9cfdeffb3604f242bc1d5ce31
SHA25613ecfd2cc079ea06a5dd8f0eedfc2330580e9f53a7bd19ec319597349bd6ed65
SHA512dd17d52ba8721b47bae5fd02ea755c01d43404abc6d990988d585b710c582a58236b784efb73be12b52f3d053ac5c6f9d05f2aa9408283bb8a6edd3149ee1766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f0cfa0aa8f7a38baf7223fe4e68bc33
SHA1d1e14c9263b4df87553b8a9078f75635c76eff56
SHA256a266256932975b281754ae501931784bd2b8caa248f548f27313eecf1248fc96
SHA512f8a7d2b4b245e041c51dbca5ffe7484cdad79835b9a1b56027de98a1062fc4927ad1e8608f1e69c68caefa6c19bce0dd210587d5b527f11679781ed6502748a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c1e5620c06852b920473b6de3877a9f
SHA10cb4dcf53c3b43774bfe6df5d9d6fdd7c2395e81
SHA2567d6f6ef91e5a62abc87d873f987650f61206d5f716efde6a75f409c8f618d57d
SHA512546f0422319d981812d4140e2fc7548a85a7afb24fe9419490bf81148ed1f5a13a670038247321dad1bab4f40891f9af062d8d830cfc1528069c6154728f56f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1051c30b9f0a3b0305d74c45345830e
SHA148eb184fcc4f42285275c61186e3bdd823c533a6
SHA2563a1f0276ff1bb4396b51e58db227a4c51cca1eacd30908f51dbdaf87b85a3fed
SHA512c9465874ecce18be2ce0dbf6544e789022e648c6727ab2c0f835bc3ab58a9ff2a4978f23e6ea93929c20f7c48c6d65aadc2b9438e121efb0a0dfb7ffb619d474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ebdb9b1882e96da2ad24c2a0917dbcc
SHA1b8e12bf71974d1e96286be976e6b38f5701b2d51
SHA25634deefc2ef4565b84a50427fb86b9a5edd7cd2d6d0623b8311ac854f5eae03fc
SHA5126dcacead5c9e968a3f1e87d611504eef41a6c14bd3bd462b5d739987f6a9f368f31db225415c09e62578e6abbc9034cf3d6208b64db88cd40c7224d586b1250e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cdee595e2b44a0ab5d074e0e29b52f0f
SHA157f01f0a23bf440425c99fea5a2554c6b7250a18
SHA256acfa1064b4d5765b0a76dd784b53192e300c7513de80d45e22e1d817c76578ed
SHA512f40a3b4705522163a1e93cd4fb119451171f2a8cbfbbe3da47a9958b0dde64afa273e2a992572115df29000ff50c4af1631ffdb6a0d1148309893d0fb0d9410a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ff868563569b80a9018c8cc3e9959c6
SHA1e183303060c81febc70e7d876d060551a063b59a
SHA2562a16f270ee73b49705a48e2f27f6877a1f8d5cc481f61380dc6b360130736b17
SHA512897b76bfed9f3588dc8b32aa117823fae0f38c226b50ebb7a507c4e49e480a290e64f90931321bab51b1234cb6c5d07743afaad752ecb87005726ff77cf45068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3e1c0dd3075e10c806aee0b6db70dfd
SHA18f890929f5a1df8fe107babac31c5855e6e18b1a
SHA25671b07ba4b3b7e212100f6b46220ca5c191cb3db0ec80282ac554f7fa8e0311b4
SHA512394ea85fea3d064015b69f4ab663b06a007825d7e986002cd35382e88661fbef164dc1923a9bf3e984b5930add46b5ae23d69532f226c6711ff50636addeb464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6cb86d7ad37e67a2c6d8992c342d7e
SHA133377d791f234200a172a059928daaf6d07cb9a5
SHA25683e89494d4c1e596a80fde0ccbe1a5eec4ff4d01c56410affb8539372a3ea422
SHA51225310d16baf209be5516e02036c9df46fc89df9097515f8984678aa58ffc17898988c925122227a39ed3625d6dbeb9d2c14c38299e765a87355df22c59477157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c18391909c2bf6edc55384233e0ff0c7
SHA165aabdf2e462c2b32fd724aa8e770e07d6beae7a
SHA25607dc7796010fd1e1b61aefb940fb416bb1af155c619b2ba5079809d28544d058
SHA5124a44ea7ec0bb0c8702c8ba47c700895c31274b4d3080d5205a27a031ae5ed84d98953586bfed6ace84647bd780825c436c2b7b1ccb4a2a57fd091b29c16b9566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5490fb6c6dd25f97e792d77df9eead417
SHA16660bbc0b5ce1f654609c4409583dd40f7102ce9
SHA2561eb288b63b1560d8e0ba255a1337d7260bf83abff7614a8cdf77556427f1843b
SHA512b7ab8d015b0da733c6068033179a4256a7f11d585494a945fb438e0c078474494991cecde5e6b26bacc1cf6e5d5d0443ba9712bb6ae1d8ec02826c035312c418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5925849db94444c005fe1ccbdbcac6b5e
SHA1316a20a03b7aa8707a2d5931dab12074b6957eb0
SHA25639736415784f93cc264d4b06259a662cba66e7a80af8ec511839df13986c1078
SHA512f4aae08be21b5bbe078da93456b4a24e76c2dd7170cbaa58881f22e1fb0095e78040f53bf1e85a9bdc4e403c7b53df1c9d051657b2eff51bd9692a4e936e014f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5194144762edbef3a689332f37ee79b12
SHA1f5bbc288fab433d939d01a02b6670d0198216734
SHA25682b4d32f2a62e3bfdd7166b25708b6c39ad23d19a557d8fb4ef0e0d0453f8020
SHA512438d63b8ec8dc007d415ac35b08c83b901961bc82a36994b7a8924dac6c42a8a236df315ab698c6d13e9de2d14c968bcda7c6720a6528f3c0e96a9a567541ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7c4f0f5547d1a3023c643c4e233c07d
SHA1155b0dee6931f390115610cda79c0cb83fd708a4
SHA256b8148db634f18ef04e80025886266a3db5f6d6b29f46d78064f036208cbbde0d
SHA51297371a087b1bf30d2a5317408e12ad09d722b7d6f311e584dd4dc4603e280b3f90e0e5e74281400ea8b7631288a15478d709ce7e26e3692e1dca6d1117a26290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb491944d9cdce72079a5d18fcc54b26
SHA1f8ea919004d7ff4f8bd75913f8d3f0c554ca643d
SHA25631b40146d7b03e4323131bed3b7f7f1b01660fd7a85c83e6834e901e665e1af6
SHA5123e66b989d1ad7ef393640b75c3a621f511c488bbfde1883464f8b81b4ea162ce17e6f538bd01f87516296c10ce7af48bd4ea84d1d80fab84aac5a863c443caf2
-
Filesize
21KB
MD5c5a7a57f0c85cf6ed3c9fdf561c9f129
SHA1778eb310949728fd6ab45ea085dca8819271dc47
SHA25675e685047ac357d8a977622e020e4b6b0b35a2a833d7056c5148308183fa15e9
SHA512bc4d3961aff3bfc82eb4bd205aeb6c7cfd8c789e98858dc2f0a15ee7bdb194c0c87039091a31d441b723cc9cacd201a5cf2e592b1868cc05c6a33dd494cdc9a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\673IEUYT\favicon[1].png
Filesize21KB
MD56628daffd28da73418aa06c128b410ea
SHA1659cd27c80316aae69e62ac52fe37b8c1de38734
SHA256795fb982685be59db4acac9b6f0a698f717320c14664f903e27bdf3f21a695ad
SHA512c9fd4fdb8a923dd79e7c48b218ace62202f3ec6fb91a4c6d8305fa752ada4d4e8adb11f7a3f611a0eeda143b2b0e2fee1a56910aa1ce2526b7527b2dfb80b723
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63