Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/04/2024, 20:47
240409-zk7qzaag79 109/04/2024, 20:46
240409-zkkansec4v 109/04/2024, 20:43
240409-zhpglsaf93 109/04/2024, 20:40
240409-zf7v6sae88 1Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
Encrypted-PaymentAdvice-Reference (1).html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Encrypted-PaymentAdvice-Reference (1).html
Resource
win10v2004-20240226-en
General
-
Target
Encrypted-PaymentAdvice-Reference (1).html
-
Size
1KB
-
MD5
d518664141c76f578be9bd77a87da8be
-
SHA1
18b5e80b365eabf607350a934521181dc64651f2
-
SHA256
752dc035519e56f67f73da13233c6af3f7655ff29f56f7cb03afb307fcbbb49f
-
SHA512
6a22e7978f66ed431ccb5a98d36ffbbb6a50c2c9958bd0cee5f9adf30ea53f4ef246fd8b6dd034ce60dba584938fe221a80e26a7024e38fb08726319686f8245
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902149d5be8ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418857356" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000c4ee6246fe93075d1e1a393f4c9f02098064d1ee78a58fd41bad075a785700e7000000000e80000000020000200000008a8541e27bb951223319023cb24a0a67a1ce9fea8b16db47511c33451b77a89f90000000d8e19448ccb5634d8e966b82dec2fcea1ce7785b590b1a64dee27dac7e5b7ebaaadf51e87db2580a2bb60a471006641e59f1aac257d5cd2c1355116036633048b82b33076689db88575e5a5037053603b2ca9e51c9f37f7fbb531c867dc0d13fc6ebc0be514d319df09ad7d30849d143ec2a7366fc07e68e11120ac798b7981f1ca2ddd1d58bbb46dd244233526f649640000000c595058d46472c288699e673a7f7801d6c560a1c47da0954298e523cfe267fbed95a86d7e04623ae1e6d18982426023665ea3d0140842612bc867caf5c0f29ec iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e000000000200000000001066000000010000200000003ca2685ac3d7836316fa343de35e9c506d8714d911da645daa242547bc6bbcb1000000000e8000000002000020000000df5a1696cb9858602d3a4b7c21f0db6b935dd3511a53c230429e9fcea448eb1b20000000e2a9ceb6b6eeb1b63d778029d0feecec350ac7c15ec2342b66712e7ad852644540000000d88c8a4a9588ee8c088f38e67d5b367d682802acd3534950055368196063ef332cad7b7c0acf44c20ba70456367d427c9a2f2bf8f7b36717b833f3b4f3839f7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{006FF971-F6B2-11EE-B9BD-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2968 2144 iexplore.exe 28 PID 2144 wrote to memory of 2968 2144 iexplore.exe 28 PID 2144 wrote to memory of 2968 2144 iexplore.exe 28 PID 2144 wrote to memory of 2968 2144 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Encrypted-PaymentAdvice-Reference (1).html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b01e42391e7fe653355f7a88a1b3218
SHA1f80ec4f8c95d87d5b323fd2bf079dc0b241593b2
SHA256298e5006ad1408c17b1b5cc35def9f13c97feb8d34794ab8d6802d0069d17d20
SHA51246fa4b6af149928e2d2125cb108c75c5ede53253277f2865b79b3c95d96ae1b6810eefdcd640635ecae0485866e0c76c6d8e9a5624a541b2a44edeeea39cc329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5061c7a0aed51ef1fe7671907b02a7934
SHA10efcf0b67183a06d4d43ec67b7278d71feed75e6
SHA256f44d464c89de46d4b6e55fbfdcdf2f07b024d349c7802b4ccb6a1654017d73ae
SHA512eecddf0dbaa31fce1cd3dfd00ce15dacbc9382e4289ac53d94f658ef6a1b24bb8623d00bc17f41a189c6a0d9b8e27d50d256916a924a08f62000bb1856c5f06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb4397136e54ff07209761b99d503d6b
SHA1e3ef843af7285604df6bf3f3eb323f94fe005e8e
SHA25602a0af49bfab8cf96740749b530f721e249780e1bd92a4aea59aa154cc115ea5
SHA512646cdca0867d9829b61829520baaddd31e68e81c4b32afd7e7fc56ce43bebedf91f2c47161430363c06ba8551e4aa4d544959efe5f5313108eb2dba1fa971ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5396345b077db04a450eabe5337dc2dd2
SHA1396ecb458fdb2a2831adf7c4e71c8839c1e79baa
SHA256a279c2e9fa5c435d6725678c89b2c62a204208200f0bdef7f808805d816f9645
SHA5124ce09e4dc3c387d7ab7e2be49ff111b5ac4a8ecb5808759fb33acefbdc7619a79caa0590296f8b0f05a5095ee3049970b671e40573991b1f13c59b845fb80b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df4e182388e07389a3082ad7d9ba2ce9
SHA140fe0cfd5ef8b263b8b8adf094919aeb64e7c029
SHA2561c762aae247855683c8ba35cd1712afb6a632b437b2b2b98da8fa3f998889d6a
SHA512f1c15315a51d47b1ca107b623a0e2c86e7fd1916c324c773f3509f687cb2909205a07c449edcaaac0f5698be99374662ede373bba85143c52b11a956ffe0d390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ca72d1207499d4ccdf2dbcce02b1e3
SHA16b8408bf88a40b2f51441daf4bd756f642a36704
SHA2565bba93146809905f77ddc84f9fecbaa09080ca138b4f451299b225657626fb36
SHA512162a965201d5034c0f8b9f70d2180d670c45fca293af06f70e2676b76a0bd0af4eafeb8a4d76ce2b4a692187e81cb7775d77ece4e305decf32b3b2106cbb2f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b08485de9b66ae6675fcab268ade5e2
SHA19741db244a7398eb7ec72be096d59e36e44a9d4d
SHA256fad95229c60a80b337c3c7897b0840f2bd8191340789589eda2c62476d1b4eea
SHA512a61902b6b080cf2727a2ad8bcb2128d221f18be2157561c9b3e74d47b5d9538ca7c8ee0a958be5471ce197aa7475dfe06b44f2a7427c0a24d29e6e9518c6009a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df65520b85a8182e0be22a897019ad30
SHA130cc5807e04575ca948f9e68052cd273b1ace94c
SHA25658c9a89ea2cd3a46c7e01430e4b7eac4cb0b251cf9c4610f19740e5006aef4a2
SHA512d1cd65c2b78c16fe9e754743ac5a7c0fb99d78e657d1caa602003be00a7b2cb5561c67359dd3472b69f242507e9d477bc2d35e8ce308063813e81bace04dbee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59067d2edbce145c1d50c174d00f0485d
SHA145ad58c15f7e3105efdb0f1880fabe226241ce8f
SHA25698a3ef106ab98e5be53b33a4848cc6e2cc92805a16d57935b65c8b18af19fe91
SHA512f33e8292b689ff5fbec92d2623426fde0d19a7234410ad1759370caa7ba89153f9f47efb24cd1a816209db4c15ad00a97f9506e8492a6d338ce52bb87dad6050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc0c2ee17e77ce157adfe9151e588a9
SHA11239418ddb9f04819aa21ba0dbde35fa6ab0b6e5
SHA25633c701e88582dd76612335664bf277e7fefec5b88bff016bc64d7a906b2357fc
SHA5120ed82126282eb1013a5bab3d47d0250dbd3a05dcf09505416bf1ebc7d1d83b73fd50475e9d98592783d4479c12eae9f1f3f6e9bb353719f8a6c69f5e179cd882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bbeb75655ccb03b2c92bb2a854fba91
SHA16d3061ee98a0c5099975539c428d8f70500b558b
SHA256163eea98eb3883efc80b506a44c72036048d6c59653eec7c70ec0bd5748aed53
SHA512ffc4c02eae65df847f35b1a0b291ab32d9f979faab6dc31e16b3da118fceaa0da5c13e8208017c43bfee9827470dd5ec64ac1ad02eca294ab20b1c8a1533a5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5259a5621a3e53c11d2b4feea08f8bd8e
SHA1c6ade937c42b371e0608045ded043630bf10c095
SHA256699742f7d70f634cc4d8cbdd428330dc997f2feec045bcc7a00c94641d85f9e1
SHA512c941f0ff0edc1dfac4bb4e6bdaec79b0bfb324591e02dee59db2fb798d11ea528e2226d2cf76ff10cb7695e2b66737d7b5fe066f9df6dee668493d15a8fc8159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52160f4355bcbf64fff096f228c8008
SHA12a7bcc64f9c5fe1035f726d7460408045fb135cb
SHA256157dd052e38fc6ab3cdd2b3666cb46655fec0a90c818a7f23cb27b6d25d69d50
SHA5122564760d851fe0f12d1d05c2bf6216198ec9564caa34050739ebc90ebae991cccc3f5bedad794ed817cb2d4ac296e672fede8883444e291c0a0a3d3d292019f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5338765eafcc185987e89da29c1f8806e
SHA18de1705db69768c9a7d9e2102af79e0cacc8550c
SHA256c09f4c11cccd3fabe08250b27660b82912bde0eff338746051046d78cc11dc4e
SHA5128ae147f5a3c2b97839595f67c12d4709507f9d3434a65bf7d9a28dbdea9c439b310ffa906734529a8b5da74556d4d2a1dc95790355fdf1123748dcbb1cb9b5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5262d2e5620282467c4826d663bfb45b6
SHA1d7656b9c3a0ed54adfe9c3302e97c2274f312c8d
SHA2562779c43184e7fac9cedd268ca8c9e016ffe2131fdca3ae60d340d1a22259f286
SHA512a6cd88cdb9d7b8c76a1e2224597597c591cf2a100e6dd148b026401e59c31feee3d7fac210bebce2da7ef67f39693dd4a38fbdf99f71fcfd1b2731f39bbaae1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c9228ab6684dd5ef20f4f613f830cda
SHA1bf30392bf7bb34808fa722806e628025cf5afa4b
SHA256c62c08cc09d461f058107bca10e420c18dde7dd5cc9eff3a0c042eb11fb6159a
SHA512a35bf4b632b81a95ad0ff62d0b6835e94737036d85128c797b6110a03444325af6a34b3fa94b0766e1192b9912e841dd8879e36e79f7c188a4a7abff38572d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5786edc905a7b79f7a7b0520dc863b366
SHA193d66bb3b412100595336b5d4e2349041a59296f
SHA256912939b2c096379d07c85eccce611b5c22e348765541598450d12910b6575c1f
SHA51292553bcce8e0fbbcba3e73ba56d8ef333490d8bcbf1bd15b3b4fff9c3a217ffd85e6743ecb9c0faf63185e3ed9ff785ca6ab3ef88e81732a97e4c46e31f32dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5335d7d85e0bdea9b9f838e1b219da23c
SHA15da68494479b8cb68c1abed6ef907b5e87a27018
SHA256aede7b976188f64ba7f909ad87399dfe84110a134032277bfee8f638db24dfc4
SHA512a3e08775228e60d83012b28f933989bebb40e28911ded04d679ed780c20870fd18d19e1b6ccacd88f886d5a3b465637a6fd7e1600befbe4044177d4529235b33
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a