Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3yba.zip
windows7-x64
1yba.zip
windows10-1703-x64
1HtmlAgilityPack.dll
windows10-2004-x64
1HtmlAgilityPack.dll
windows10-1703-x64
1HtmlAgilityPack.pdb
windows10-2004-x64
3HtmlAgilityPack.pdb
windows10-1703-x64
3HtmlAgilityPack.xml
windows10-2004-x64
1HtmlAgilityPack.xml
windows10-1703-x64
1R34Downloader.exe
windows7-x64
1R34Downloader.exe
windows10-1703-x64
7R34Downloader.exe.xml
windows10-2004-x64
1R34Downloader.exe.xml
windows10-1703-x64
1R34Downloader.pdb
windows7-x64
3R34Downloader.pdb
windows10-1703-x64
3Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
25/03/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
yba.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
yba.zip
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
HtmlAgilityPack.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
HtmlAgilityPack.dll
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
HtmlAgilityPack.pdb
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
HtmlAgilityPack.pdb
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
HtmlAgilityPack.xml
Resource
win10v2004-20240319-en
Behavioral task
behavioral8
Sample
HtmlAgilityPack.xml
Resource
win10-20240221-en
Behavioral task
behavioral9
Sample
R34Downloader.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
R34Downloader.exe
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
R34Downloader.exe.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
R34Downloader.exe.xml
Resource
win10-20240221-en
Behavioral task
behavioral13
Sample
R34Downloader.pdb
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
R34Downloader.pdb
Resource
win10-20240221-en
General
-
Target
R34Downloader.exe.xml
-
Size
915B
-
MD5
db7d07e833ffdf19b25932cc50938b3b
-
SHA1
3d2065309f72e2769fb847467e36fc94b7c3ed25
-
SHA256
e1d3202695e25f899eb5e688c29b584659d7b4234e64a6f85ee8911982dfcc88
-
SHA512
3020b517eddd8c8b518a13a4ce11262739e193f8e4fc2331cec5f16d3be5a263dc69a7cc2fb56e1e756d968cba869eb3ce56d52bb4f210cae34586ab64356c0e
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31096549" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3843224648" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31096549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "418206410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FF8FA66-EAD9-11EE-B1B7-4A220DF8AA9A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000053cc7a0eed2515479bf31208e699f77e000000000200000000001066000000010000200000005aa2c66fa207e92e99fb12749bd0cb39a9f4d7cbefa6701a0c5dc586d3d2eaf1000000000e80000000020000200000003aaae5801577068c434db4a9d4e561774fd9011777638caa035be95e8322c31920000000d830cda81166820f8ffd1eb656fecf73c201f45a4c2827c79ca1efd74fa78b7240000000f112c4226c8e0b37fce1c28052787713654112e2ce5c895ca0a8ca3f5b0393e2937cb69fd020e16dc1b6bf7b246a243ae682b92137f5dc6b83146adcd511850a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31096549" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "418174419" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3835256199" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418157824" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001b2de5e57eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000053cc7a0eed2515479bf31208e699f77e00000000020000000000106600000001000020000000872a04aeeba30829eda6bb5d44183566e89eede4c723df01c5b9ae218dad1540000000000e80000000020000200000004f52ee2d3cc402f65c925e29e59a61f58bea2fcc3a10676dcb393ebd6030da4f20000000897d70b08071c4feb2022f7d8d4fb9636210ec325f32b1c5411715bee6b677c5400000003ea8cf6d1651b20d68d26b5b9c0159fd37547b39300849a60b64b6693f784327b8de5f135a52da0967f1b36c7fd880f99994126111581973ab9f776811f45384 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3835256199" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-682446400-748730298-2471801445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09036e5e57eda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1708 4424 MSOXMLED.EXE 74 PID 4424 wrote to memory of 1708 4424 MSOXMLED.EXE 74 PID 1708 wrote to memory of 3972 1708 iexplore.exe 76 PID 1708 wrote to memory of 3972 1708 iexplore.exe 76 PID 1708 wrote to memory of 3972 1708 iexplore.exe 76
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\R34Downloader.exe.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\R34Downloader.exe.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b208521c2c31c62015c38bb85feb51b0
SHA1008316003e88bda0ae51d666e28934a367090dd2
SHA256c34551e0a8993957869ed2b41357128f47bcd889d141a11b4b2fab20ac678a88
SHA51297a633887ba4208336c9c4a28edfea165c4d6a88daf119cd09d608f76933b8eef9cab5bcc820401d892d923fb11d5646d6db340ba58903ce85341a3e61070ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5666a6ddc320c790ee9eed529560d8a81
SHA14286d8ebbf9b3dd84f14990e160a557d008ee34d
SHA256351743a7a40e633bac708a21cf2441140305a384d65cfe8674d6773f17d6dab4
SHA512712265033d6c8b0e061318b6e946807290c03e34854e8d7cead9cbba3aef619d72720fa52a05bf72a45df501b682e966830b1e3caafd865e66f1e00df73a1b7e
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
545B
MD5844b31e0598ad934b4f9a15ada2ed1fc
SHA18a4eef7870f78a1aeaff27bd3fb7f249fd041dde
SHA25698f18213170f4e5431a18e8a319a80eb328587448a202fa693cf494928107c16
SHA512e2c9d103095d3599f69cf948d7d8402fafee54f38de14f208942c1c7e5eeafa4b9a69b42fa4c7183b38d137923064c9168561d17ddfd06b44bec70d7b70fc6a4