Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 04:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://rkzp.buzz/Zhx/index.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://rkzp.buzz/Zhx/index.html
Resource
android-x64-20240221-en
General
-
Target
https://rkzp.buzz/Zhx/index.html
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9027bc50cb75da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000b9ab4bb9dfdd70b2dda7ca1dc664072f673c286d5783f809c026b0b4f4ed179f000000000e800000000200002000000026135cafda6c4eae7d2bc14863f01ab011fb165cdf3093351776ec82df6b2add90000000b6323b943d239a43fb815acee75cfe966a33005e7a5ccf7bf82cc7613068e9401c05295bdad3fc1edc537c68bae4bd76583040dabcf3d2a3147943b19c4dee35ce5baaad8c34957559b682e3d9c824349de7e3caaa0861ece849156ec60255728a5d022dbd9cd84e5adcfd7b139b35e715c3cad060ed93d71bc1eeabf35e79db030d7cbea6c7f244613cfc2fc899047840000000f8dcac3618bb296ea7c6b55b0490a1874bd9ad14af2fcc4a23ff5abb5ef631a786f174fea01f6420f696504798d945557f5ad3684bf1e0c3fa19b8133e80453b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416553765" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87D2FF61-E1BE-11EE-9591-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000004fbc39b3d364376a1f53c49bce3422043049a9f0556541bb57071912d32e540b000000000e8000000002000020000000b1ac207dfb7f0c8d48264a2ed9e41c992820ec8537bba48c588656669b61d4df20000000cc095a4ddd23d48231718beb3181099c0369af9e4754ade867b187e477b224eb40000000b88d65e2080226d921d1dbad50c390f12b132ffbbcb4ffa373081a89e3e0cc2521d997fbd6bd058621490163246c0723a3590b994f329bd5c8ff17826c2eaa39 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 292 iexplore.exe 292 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 292 wrote to memory of 2560 292 iexplore.exe 28 PID 292 wrote to memory of 2560 292 iexplore.exe 28 PID 292 wrote to memory of 2560 292 iexplore.exe 28 PID 292 wrote to memory of 2560 292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://rkzp.buzz/Zhx/index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cf27a9c1acabd056e504ee56998b6fa
SHA18a6a22718da1f1d50f1e281efe4e3fc76ea329aa
SHA25669448b5840514da28206adaa664fd8a2d16372a9bad459314cbdc7c7787601b4
SHA512d813f38325f0999ae9b727d4b989f13ed3f6c3c80010e2263090a8d66d360d72a1746fb747131f576512105c7fa924c1d80d613c1e638925b7f3f707ccb640c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea7ce94d7c64df0c2f83ef7dcf6caef2
SHA1e67c7a34deea5ba81e61be02c20f047def5ed603
SHA256d101a4f16fd8db16cd0a6ace235ded7f493525b50b88053dcc570ad380c03c26
SHA512a6a1dc17933de8e61248ddc90c22b6be4cf077c1dfeb719b04da1c296305d761691014ada6879ab448170798d6eac3c23e60d64a975fba95aa160ab2160f40a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5273706c39ef5d5c67eba03dc21808e74
SHA18f4121b539132e4bb937a258718a2d04aacdc846
SHA25694b53b0b70073c1a68427d341ef56a48aa8aa9673f30d7b44317dd397afb6c40
SHA5128f6ba8c4192b27513905c9eb5c20f8b893663469125299e852bd45356ada489177836b7bb6fdc4a3ab84032e96ef092025ff319c5c4a39d61d23c1f32893a41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56874953f045f835c16797a4507100454
SHA112838202482fee676d54109954f07d7ddeb91807
SHA256959783db050529a7425b5f9992ac097093369b8d3d5114739ccf26916851e7b9
SHA51276e8f86a7e9823bf5fae6a8102cf5c98f2e9584a6097876777f353d78a70d7ba9f12d66cdcba3906ca6bd974a6cfc5a2c9451751c61cc0c0756578a16b7f025d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5645d7b2c21f7d7b26b0b7d9f1bb0e7b3
SHA14dd85d5c6a4e29b7b198518f6fea884e17b8c614
SHA2560036710262b606d65948b45e770f9f64c8e07cb1a9f122d04fae64b5a0f205d8
SHA5121b080ad523573371adae531bc0f53aeae11843a1b274fd6348c46f0fc1c1f1a630da156972ac365b5bf16f9cf8ce5db9426d2249b53e0913b51d74ddc1b4ab02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9432cfe4996d7cdefd6d307b53ecf6
SHA1b1e9ab2200d1ba82383699df45030f188542893c
SHA2566a44cab5cf63555dc211c2857f2ad8c2e10fb75c138f91b295b2eb18a44e0d93
SHA512b274e78bc12494d23b6ed2a0b4352e773670f467a5f54c753e23da8b53bcb2bd89736afe3d2ae1778cda7ecc1357468f9c07cb934742fe3b5cf90b9a2a77b58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfb44d692318821495cce02a32126978
SHA18911bbb3841545ee511c115ef015ed5d7a9b210b
SHA256b25ee19bc00fec0a3d0e241bc298348fd458a155efb7c0a3755e78f69d1ec91b
SHA512ea7fdc6de6d823561542c8616b6043164ca9c16b7419b7a19da684a8ddabc2156e38882f92998082ae0304cc9730e166d78dc6be3a0497b4dcd475f5b2a554ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4221e4a9a565291d9dfde6f1eb5e147
SHA1792cd73de68c5e0f98557f72d7443c2d72785502
SHA256308662d50f19f0747cfd584054c76ed32207b9c6ef9f5c6aad02ca3ac749b8e9
SHA512c62cb851a81980b9d067665be5bedc016f296c643eaa9abce14457d790291456f150171f624504018ba134c060073bab224ae5a64b5dd6d069f2bf3352e466c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b810054ee71cf31739b7b341e5cb06d
SHA1a2e2f0b69e81ffea7c9a80320b3b7d8c7bb34908
SHA256f1d9fb1d7c1ba3019342949134b9e8508536ce82f9ff29424eda4e7333f10090
SHA51241a0c1f389fc85d63f4f395dde79ee72293bd30db4826416ac6f7feaf10ce89e1539c5c06cf690627169dcef50051f7b4e0ca859b84332f919eb46c6dcdc7aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ec0b3f2314cb025f2f9b964071878f
SHA198eb8feabc7d89da42761d93232cec5c5f41fbfc
SHA25648af9e54a2a04c4f518b3679fa9ef6a7f5813c40a106336ec3549cefc0fd05cf
SHA5123acb233dc460532e1b5205b50396f76cfd4dbec3c9aa927c06782242a38bdac667ec96f5ce55ddb3738e59006a86377264b4b3604a7d06b03ab0f16bed1382af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568f960ff0278cc7f869cf8336e6ad1ce
SHA14883d17fe969d91f907e77fc9c8215c3a41d55b7
SHA2567c398021ec4b960a5a285336f09ec4164013ab72c2129eb501f22bccf4b8f407
SHA51277e36d48eccca8a692eb92528c1ccd439b03bcbc7c2a44e4fd73c388d7d438d274de29dbd4110dc6338194088f4937d091bc7a0fee2b778144fec69003449b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8f64b5db7e42fe3208ef9b1f2e3d28
SHA127903f6145d597b0c614edc1e0f4f7976db0ba59
SHA2564ab6bb5ede7755caf04cc0495fe5cf4de3dfb5fa39534ac1c0289f481033d232
SHA51218188dfacb1d020120e7f3b5c6a3cbd65e3844e5fb711a4d901ae4b3d963ed30cb558839694b7c016c32a15e89ec147b18524fd45ea7ecab2ebf230e420eca37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aef8ec9ad05948fd0e7a258a24b30100
SHA1610e691e86b250bc3a6f9ab210ecca2255e6995a
SHA25666f4953ddeb13d59a58a41bcb0ce7d6bfeb9b2d9638793ed4c75009ce2aaca35
SHA51211fefb993b820fe9949c15252ca21f98a6ea6d8814a745090074d5663df348cfe822f2953c0f85e4df463a05a9545298edd8c786a56f5792f933f3b213c652f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad9cc4ee4ac07e5bbfbbb3b290122f03
SHA15476dc440af87ca96d50ea767b7084ced1367ab2
SHA2567334aaedc953304aa6ac35afd1ceca32504bf5a34e02f3581bc535a273ec967d
SHA5124d49bbc3b4124d16598811c4e54523f36fba388a4f81bd765f3ba59913d4de3492fa7a010c34d1165a5978fddc67f8fbc75319d26358b2ffed9ee95eee20a333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d61bf35b9f5d97d4110ef66f95ffed
SHA1286bcb7ac595225a554f51ddfe22bd8a9ca24c9a
SHA256e576518cc0855d0e545fbe65d9789721ae1e471deefe5312e142d31783bc7bda
SHA5125c3e375b7d30e0c9a68f389d2297f4f8b3ecb746790ad9d16fad0837e74ecd723663203116b889208243732fdd8544dff76786308509b7a9a97e922d4d555c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f01e1297ae34ae2c16d7309f19be316
SHA139fd91160a5547eadd0ea127af750c21b99f2873
SHA256660094c284e83479da8cf1c5f7df14198e36002f315375b38adb403508201138
SHA512c115c2d01f773898dcedf4aff7a84f38947f7812bb308f68d110644e19e5045c4c61da8da1208ff7a874f9db36da67dd4100474010abe1df60a4c36f4f591010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557806370fe60f010ef5fb76e16875fce
SHA1809cdddef2adfe731a30eec771f7ed67620c3892
SHA256e8ee66fa3df4d7ec563f90721501d8a54b452e461be0fea87bec09fa51f45b41
SHA51222e4db17b52ee0046aaab43fe3d1f68ac2f7464aee90c43ae4afceaa0d2491d818014c5da0930b042a2bd16e481ff89f8e83813d3fd0aba70f99f8821c4e9e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520efdc0d3db3561af63a64e35074bc05
SHA16ac393fffcd82374e123badb69785c57b0083ded
SHA256ef38a02c7dc1d222de25d095305d1611f4f6bee281e12cb1ab047eebd744c807
SHA512cbd9a596a0c4d55cac45a15ed434ff08c77b63e7ac02988bc2b35b80283a3f8fe1648bb0f7f42d1e3b1169e237f0212dbaddadffff8aca7f1a8024d2c927a079
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63