Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3d6bf4b0581...8b.exe
windows7-x64
3d6bf4b0581...8b.exe
windows10-2004-x64
3$APPDATA/I...er.lnk
windows7-x64
3$APPDATA/I...er.lnk
windows10-2004-x64
3$DESKTOP/I...er.lnk
windows7-x64
3$DESKTOP/I...er.lnk
windows10-2004-x64
3$DESKTOP/�...Ʒ.lnk
windows7-x64
3$DESKTOP/�...Ʒ.lnk
windows10-2004-x64
3$FAVORITES...��.lnk
windows7-x64
3$FAVORITES...��.lnk
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SMPROGRAM...er.lnk
windows7-x64
3$SMPROGRAM...er.lnk
windows10-2004-x64
3$SMPROGRAM...��.lnk
windows7-x64
3$SMPROGRAM...��.lnk
windows10-2004-x64
3$STARTMENU...er.lnk
windows7-x64
3$STARTMENU...er.lnk
windows10-2004-x64
3$STARTMENU...��.lnk
windows7-x64
3$STARTMENU...��.lnk
windows10-2004-x64
3$TEMP/remote.exe
windows7-x64
7$TEMP/remote.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$TEMP/sobar.exe
windows7-x64
3$TEMP/sobar.exe
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
d6bf4b0581870019030af8295176158b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d6bf4b0581870019030af8295176158b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$APPDATA/Internat Exp1orer.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$APPDATA/Internat Exp1orer.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$DESKTOP/Internat Exp1orer.lnk
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$DESKTOP/Internat Exp1orer.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$DESKTOP/ԱմƷ.lnk
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$DESKTOP/ԱմƷ.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$FAVORITES/Ա.lnk
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$FAVORITES/Ա.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$SMPROGRAMS/Internat Exp1orer.lnk
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$SMPROGRAMS/Internat Exp1orer.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$SMPROGRAMS/Ա.lnk
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$SMPROGRAMS/Ա.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$STARTMENU/Internat Exp1orer.lnk
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$STARTMENU/Internat Exp1orer.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$STARTMENU/Ա.lnk
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$STARTMENU/Ա.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$TEMP/remote.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
$TEMP/remote.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$TEMP/sobar.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$TEMP/sobar.exe
Resource
win10v2004-20240226-en
General
-
Target
$DESKTOP/ԱմƷ.lnk
-
Size
1KB
-
MD5
3801cf5240ef322de5fb53224f763068
-
SHA1
e4286f9b6e5986b6a237bc70fdc03e8a36287e11
-
SHA256
23dde6d591dc39c8b7901a49ce2edbe1591ef2b68d69700a4c81fd741f2d714e
-
SHA512
3d26058c20050e236cb78533485dc2dd02ed6be0ab7037e8eac5916b75abe189d38f57ed45899787cbe69318ec4d6763633d1a8a96600fd0b20b83aaa9f03ef4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000006412d8dc53955898544de3eeba27284d18404bbc366e7c2108c846fa664858dc000000000e80000000020000200000007648c55f2aecdc85fc101c390915c3e0bbda8b3bb6e4e7c8a79ca7adc7d9c80520000000aee2727ae7461ec7c83c0729dcde50df508b466254e3a18b38f4b0b1c30e3d1240000000548ebe81180d8925f879daa5375b87994770b7801deff8ea23210c59790fe5df002b3937bdb044fd6a83662fd80f0ba9d36a4922ffa24a61fc857eb546cedff6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417032530" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20509406267ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30A71FF1-E619-11EE-97FB-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2368 2772 cmd.exe 29 PID 2772 wrote to memory of 2368 2772 cmd.exe 29 PID 2772 wrote to memory of 2368 2772 cmd.exe 29 PID 2368 wrote to memory of 2620 2368 iexplore.exe 30 PID 2368 wrote to memory of 2620 2368 iexplore.exe 30 PID 2368 wrote to memory of 2620 2368 iexplore.exe 30 PID 2368 wrote to memory of 2620 2368 iexplore.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$DESKTOP\ԱմƷ.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.wagabb.com/taob.html?desk2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e10311cea31a000e02fd1cd11f9ea717
SHA125363cea43d4bc430704be15f0be439b939f635c
SHA25676cb7b00fb29fb1922aca624127f5190d553d5db0a109d9208ff117441da5aea
SHA5126b9a236d158bbb6d2cd77c3542a54776b9c24230939d41c9f502f9db564571dc8b82ef1249a04d15f58a4ecbf5059ec75b4d773fce01447232e516a65ff328c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5356a5712155220c95a298985104146f2
SHA14fa76fab387a21f37e66d3ff1fd305f074b46e36
SHA2562f1c21085c0f54a4e5f6e9f372622c87b2cbdda0dcccc76c695886cbd955274d
SHA51232bd50e6d831ec72a63237462d15bf5ce8acd0cd66d606874108253e75f34f9aee969dd03425f000208e2f40e9837d19e74fad974f05789439f18f2c3899ada9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae5d963b58d2216d9f717176e3331b24
SHA1697910578eb3af1322862c14c2d4447d9656fd89
SHA2564f7bb2f5395cfd42f8d0aafa965f008356dc0f574bc1c15f96c47bbb742b854e
SHA512e93bb0fdd8a526e00f2fec3d4a0e6d4a5364d1f629f18646954d9aea600d04c170577a8ffa57754aa7328d9372f72cc5eb329a49a941a8335bf0e6170b791497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e5ebed95e9248cbf70d1fa0a77cb87
SHA1aaae5526f0dcb9ec585822837cb9e88c9a0bdaf4
SHA256915ff3a50030f75fea8652b8376b1817d38c2d72da04ae933278c586a2de0ee1
SHA51265ded2e53bd71d63534c79cdcb247d44131731d2a94d2df5d5a1d1526926efbe073d5dc2d56d0e6eab13eb0bd55e2bce1db4b4d51c137a8d0e607a5357686101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5090411a61d40c922be2db140a5239e77
SHA1fa63203e69256240a4401d2d70189064689aa1a9
SHA256fc10a0b77901b519bbe444467c09bfa24cd464989a78c3fb2e5703334678cd11
SHA51266cc6bf7b8a035bf6f4670b5b3afc3725d0cd2edd87915511c7bf40ceec63caacb13e81d8577a0a7f812ff1e43fde09ceb19a5a0b9857931d886b464fd6ef191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5295f03190603da79e9ccb23fc97b9c4b
SHA1910f6a9656c5f08265489ce552a041ed29932d17
SHA2560853aa7d53be674c442b8bd1d0c50a991c533da7f781505b2e4ab809ac95760b
SHA5121bdec00411b5f4621f6b40e03ad11f5e2d17a41b85035744934378a3ab140f946c95bd591a4b0309053e33dbe76842a64d3128fc0be6eb8153773d0151600988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5496b36c6dd6389ec264c9999ede4a53c
SHA1c0a214f00062b71cddbba0a07fd544d64d2af4d9
SHA256c34ca8231c0fbf9893189471126b9f722857866efd7d83606fdb0a6706971d17
SHA5121952d93b0cc7787fa767801cfa34bb9ccc7d71c738f05530a49ac33c8ea6526b164c8a135c73f179f4095825e54592fa04bea1c7e1c55837dc9c2732496a5b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532c18a297721c26585c2e77737842848
SHA1f87d780f7a9c9af5e140f9d84c55955a31beec19
SHA256f6d83fa8e8c28c84b7bfa2e0c988734b7b32a80a9fd85134b593cd878911fd29
SHA512ce31825bc6c2142c80003818111ff206ba12b26f1854ff08dc5b80dbd572a6c53b329aba8910505eb047ff02c404fcf809e31bc4dbe1ce8da76bf1fc675f696c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63