Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
libty_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libty_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win10v2004-20240226-en
General
-
Target
libty_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
-
Size
339KB
-
MD5
a97f38a39b0b0a330ac5b3a555be9693
-
SHA1
a56cf5c621d14a4aa2f53062811ba80c5661aba0
-
SHA256
69fbffb6a73efe1ba9966f7a752e95b4b48a8a47316c8707d24da232678b2f68
-
SHA512
ffe536e480fcd0e2ef09dfad5246385eefd316f8bdc5c905a4f57acdb0b1c5452495652e8dd330974f4289337ecc518da5a6b49d80711d9ce6fd4b07c61dcb8a
-
SSDEEP
3072:wh/AzY9VZ51JMqJUamzK4dBqLJK9aVHXVSvCDYfr7Bm:4VZYamz3dBqA92FSvCDYfr7Bm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78365181-FD1E-11EE-BECC-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000040ec48a88859e57481b537931835fa28d35c78f930e6092907e73fd248b87cf6000000000e80000000020000200000004dfc72e0fc0895b66411b2815ad90d0aaacd25b7dfc35fac4868610994f416c820000000b7157c5c12394e6b5a167941c7b7ca1f46f260ba689fe6530f3400d6fcb8356e400000005888e770a5323d739245f20e296a4db26da87634a2e13d8bb61daec3d67e62a88ca29b82ae0dafbe321bdb78e97fd70cda73908ff348cdef65da3e6f9db8fe4a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419563648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c058e34c2b91da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2760 2932 iexplore.exe 28 PID 2932 wrote to memory of 2760 2932 iexplore.exe 28 PID 2932 wrote to memory of 2760 2932 iexplore.exe 28 PID 2932 wrote to memory of 2760 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libty_plugin.dll.svn-base_id=e3b43bd36fd50840467669364014ee53553872c1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a3cefadf961563e35505f7271f1ff0
SHA1278b4db6ff52704db42aaac83f9e7c0e5ea8c510
SHA2564eee3fed74dc16b8093145bea6142c3a3a0a6b0af6dcc8f4baf98487d27213aa
SHA512562f3d565a050b1bd6ae52e43845cf55484434d6bac88e7ec283f9b28eac5bb0afc77980933e7cd373522b9ecc54f897b7d5a150f1f2a71974c21c4cf0038ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5032c72e03bcd9b4d4c66869068cf4059
SHA114f9a7c6a6e961b08d932a7b04ba5fb3984d89e1
SHA256b919891fac3357c250b4b7f0dc635c88892b99c0c1d2d43960df8318bf1fa838
SHA512f34a7091b12c5b61718af480528f9f4bcb01e96d63d305bc5cbba29508675a08adb0d470d217d6669d84fd87adf4e8ef65b95294c438a8a8adb493bca34c3246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dbb17d7d1c40d17bcf14113b0492093
SHA1c6418ddf7983d8568a76f8fbae6f5f581fd37424
SHA256fadf7621eb55cd36d2f07b8248df37e83cb7b1aadcffdff926664485129d658a
SHA5120d72d9b5b58f7c638157c9008cc94e3bd148d5245dbb71f0b073ae4bb77b6b3707fa3a49bf063f15469ec13c26dacc80f1d82c24c3347fd598ab4988da9abdd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539553fde22339faf51b3977741bafad1
SHA19b40dd0ae39496b3dcd04118e94168ac09a82b9c
SHA256209b0b74877d10e20d4d48bd35047af76430cfb737cb1b49a990c382d66f725a
SHA5128b070dcd018356fc5d7dfacbd5cc397a8f9d187121bfff75600b7f0054ef80802de6bf650db4fb7c1467dbd02c30474eeabc7bb84937908eb8aa50bbc822d9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef5db3b2b13f2c4857faa7ad26f92b72
SHA1a7fa8578f13f93ee25324fdad39a70327b7a9a06
SHA25660066081ed27b1fbfd80be12d1a7d85b48cf9877c8b2301b30352bd45fa4a768
SHA512f90aedb694430f76ee21938b9eac0849f6c2a82420dc2441bdb7fb8059cb7bc49d4896f53148cd68fdf622d5631c3535954c8b55d6d8d25a05a5701120201544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a38eab4626448392324e85968cde2d2
SHA1217ef733b2e9ba9d8531613319e036eab90ae6e2
SHA256f459dc6ec6af0d911c6b02d0228fc5130d3c96ed9e0887ccd87e023b62743ffb
SHA5126d883d891f684281d2db35a3cb99bcfb9553caa231a8f7f818cba2d3213b7d1fa4ebde5eb15f67f75ccfc34b478149b31f93979baf1285f12e6cbbf0394190fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce136cdcce46362bdfc00c7922f5658e
SHA19e0a7b11730bf592c2365837b726c4c199c1d18b
SHA25669c49ad85a13445505394d3ca9f060a7f4a36f45623e9b5314730204e32e52e7
SHA512ea1141b68ed93c15d0140e4470f52d3827c35aba262c981d0e407c8f6676923a0ebbc89eaeccfa99e531f922eb1be0c780de97206dc783c1b8cc6e10cb0dbbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a630bb0fd13d7a6fa9b94ae47c33900b
SHA11ac82edac67d82955371ed36ee925deafb5ac80e
SHA2564e6f6bddef516759911016dca7580d093ef364c640a4bb4ef5b3a9a330ec7be1
SHA51225e23c1bffd483ad4a9469de55356e8c136ca28bb5078d1773dba9f58ab04f8a1c42c47135b3e709d6a508766a9e2debcb6ce7d22bac327b81d67f7ae7714efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557fa7ad57e2f659c189287332f03cbd7
SHA1cd1c8e0e3e03c045223a5718997d4ed3eed4b956
SHA256e19a1dea6a244982cfe32ed92891b03b02d8067dd35fa41719e633ab2bc1a582
SHA512a0f1ef78dfbcf1a29e3c4c5ce842648811ed4d5f239c003a30bc7187b7b17a9de100a1629bf4eaed53124d065d97d0501f60d8915718a5a59480d88a0f2b468f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5887ef0ac307c26cbfd5949ee2d849964
SHA14ec5959edc53c8e7715b7ef50b6cc843e17d143a
SHA256c4b4b151295aead7d0d0d953d5158aaf298d3c3bf378a862d1696905b637abcf
SHA512878377a893bc18e3c9bfc26d3c990cca96d4faebfd6e27997421d0ee51a7b9578319a0d4b2531f9bf8b27d6cef9fdb3294c31176b77856d38b3696f4eb466595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4d79474a61377bcb9bb31fc569d9c35
SHA1baf5d856bc3ca0a6e5547fc8e419788743074f1d
SHA256203e6b4bebf1089956fb1077f6fba568d3ad49d2848d2dfb5e5e22c1aadc0fd4
SHA51264b7a45233228220f24d2dcee4493685977032aafe084c09d3e17cd4f74bd3c4265384db251a0d9626014e542ee9eb94bf2949a017e7d6a65c7104ea90a541b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534d870b007aef4f950c5a973e015068a
SHA171d99fa39763118da2f7fa3f5ebbd7b1793aa293
SHA256c56de54a563e496d3c837e73b915cac3667e8015b71cebc4989e4acd4801e336
SHA512be0160e7629a26b8de81b1c6b71faf2c6101a909a5ffd0700aeb1b209271e86ea30971a18fff0b740c597a0f4aef9248485a54cdec20170204a9466f2aab3378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6cca789ac3338211d88e21ebfd57009
SHA13453c7545c71895ae48803e8dbdbcaca58eba779
SHA256cdd4d57dc3820a282fedae87a4669e8c7310f132d7cbae0f33242ca68b3353b2
SHA512658db1d1714dc67f88b423cdb90919245838b73b457f17f7cb96378691a08a767c951ac0be0b3533d3dac6e5f829c8f160a75753a7e29054becf2a2eb8bc50a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530ef59c80a2092d2da05250edf27a3e0
SHA18531d008f8be816099f4bb702dce8cbb66111980
SHA256478a8c31bd204efd0aed4aabe1cc019ae8538d1888dfe79be93950d04341f994
SHA5126ce8e753c505af318ba9b5646cd8de3e9ee6db42486a6f6181b2dcdcfb314aafeeb41a48208f6a57aee40fcbd30da3ea71e304baedd960ed8fdba303593f3e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e090791d36ffccd23a3439ea6deded67
SHA1a979234bde28719a6f0e6b6f53823e6a0f9b7a41
SHA256228766f14a3b7cbb80f5160fcf376e4fc44f7d5054471f64fdd247c6149b2adc
SHA512f520f6f6db63b1e2975f444bee9b04728422c1dd40b6e84211c825486f2ca281ca05f4dbc0479de945287d50eef8a4cb7c83687b01bc667171b0e486e4bf7e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5045f27e18fc6d4cf18c2ff052e6d415d
SHA19eaaeab91b6a12f29e167004dbe2fe39a82b7690
SHA25629a9210187f5f8b84da2589b5941efe7ec87addccb7edfb65a9d43646b6e35fe
SHA51277f34405c6bb3b753157d85cec333d49f66faee43ad1d9cd4583b4e0c9319b034bd9e095ed26001e65f054f8306ac3e830398a8aff517c1377cb4b3561357d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc9ba7b9dceeb37b222f5e5969cf9d05
SHA194582895b6e7ad5bd664bbb999c2967a51811690
SHA256dfd0b8597cacae01a6b608e5b377dc96c690139248a5b3e63ee61905cad0ad7a
SHA5123e0c0bfd22c2e3caaa0520dd405b6b78118c1ab4faf34d68746f8ac4a4739e9e69481c83b45c7495709b37f2450e799c7866545fb49f03427cafa36eefcbae7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf839c8e382eea6cb5e3de3ebe7785f
SHA106cc06752ad7d32727a913711f011366ae88b653
SHA2564ee59e139ee71be2240f656c250280f92946643ecf30127dcdbb04769a7c443f
SHA5121ca414d5a6cf6b84ab259cb78ea0fefbcf7037a8260661110cf5a5890561f0c5f0da4e341a11019ebd78cb58305dadc8bc3f8b7860738bb57d91f3e5224ab88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5037ffb36c7ae8df4cd54fab2324583ce
SHA1c80ff2278f5621219e1d4be30deae497dc12d69f
SHA256cc319344b5de23c5699841f9ccb4277c65ee625bb96c280948ceb49b7b3305dc
SHA512e56daaa5c1a6ac0d9c327e712e6ed465b434e84156a8fe4b37f8459f248d68f38c8b559d42bcd2663c1980e4b7ac6fcabbe1d68e92525328420d099ecc905599
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a