Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
libaccess_tcp_plugin.dll.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libaccess_tcp_plugin.dll.html
Resource
win10v2004-20240412-en
General
-
Target
libaccess_tcp_plugin.dll.html
-
Size
15KB
-
MD5
591281bf21092a2a20f13a95fc096348
-
SHA1
e38764aef27aca057144e9a83251dd911490697d
-
SHA256
dbdc2056d5cf3bc6fb4ea98ed602109a113c818b79f23ed62e818679863727f1
-
SHA512
1d9d945b5844a69ce1f5491c164ea071dc3fe2506bef3120e5d56dbac1ad0f1137586364b4342f6cd3c2d2f65cac6c349dbf99be91944c9d8c3bdc55a88ae929
-
SSDEEP
384:2XPMcMHyAcaHA8njcvXkvDZ3exfxLJzl+Cq124kbrBZFE8uI:GPMcMHyAcaHA8njcvUvDZ3exfxLtFE8B
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419560446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000000418daa03a13ad5b577e55682c76610b171d3a44b01d616f73ee69b3886223ab000000000e8000000002000020000000ebacf7e98877188c9212c742c092b49e5e0e1078685379bc467a1413277e6afe20000000163d48eb27831af80a3920f10aad8132360ddad37015915a50d877560e44e62340000000348897b13f97ba0672dbfa7436e0d2a2a756899730d654255fa189876c6fe6faa8fbff0d53ccdc22fb40c0e72fba4d207dae76da8a6bad2a33b0b4bbdf784b48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702858d82391da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03AE45E1-FD17-11EE-8E7B-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1264 iexplore.exe 1264 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3028 1264 iexplore.exe 28 PID 1264 wrote to memory of 3028 1264 iexplore.exe 28 PID 1264 wrote to memory of 3028 1264 iexplore.exe 28 PID 1264 wrote to memory of 3028 1264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libaccess_tcp_plugin.dll.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f3da05d7e0d6a616f8d7e763b4839b9
SHA13c0686e63003e64d8ac30142f43e678b19752238
SHA2565ce2dd06d15889bc215942ff371d4d649824a6ed427da94249a4a58ea1b7025a
SHA51268aa8cd9954fc8351b3c10e09e290856fbcf36472a20d68710642da278afbf979cb30e3607a5058eb6cb4c6fda10b52f06498a4b2e8e1a9f3f987979ce877921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d9e8ae7f390f8455621579ce0e77da4
SHA1a07fc919e9845ca3e41e62b9fa286a2ac619a4d6
SHA256c0262e5a056a86cef530805a4e08fe53c38361a4e92beb8ce0ec69886281b6bd
SHA512274b4eb6a6a9abba3a5fa0bfbb779076610985472435bb673c34c03299ecf03cef25ae59fc14ce421c8cbae3e78d759a7f504703b43f1e34cb99c7010df18da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a188921c8c0a575e07136e6adb6c0bb
SHA13c518a2416af8620ff1c1871af10bfa55a4ab720
SHA256460e89ce45ea5307a59e56dbd0cf8ffff50c62453d1bde6c534fd57e59a78e32
SHA512cf90004b05836bc13653bd37cf70d4ae5a59aa42a41cdddde74554e32fa1b6f650007e63e59f79cf5fcc7fc0690889f542cd3575b093a7dedd7dc5d306d5e2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5990d66211800d5561ffdd5194cc6e689
SHA1cdff332b8c69b68921c2ffde57b30b5e19b47b45
SHA2565266d13190ce05652b7429556e14271bf3c290f53fbddfc1f1c504d1a22a9a43
SHA5127d3053a2e9261b637ea07190d86607c193113fdd7942f30a85881433c6d69c97c23b121d06ce60b996161986a8747cf89680c8d0438b92880d9503e80ca477a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530447e551085a6e25ac90536c1398d08
SHA127fff24f5cbd437fa7edfd7ccf0d8ed697d43c17
SHA25698158ba6aea4140e9eb7346382da5db6b17577cfb2e421bf96eac71d0e8e2ea2
SHA512e8d4711e8b950b6fbc0dca4d783591a3dd3582e53572fe0a579acb190f184af7073aae3b40b4a58db9cebbfcbe6c4442360be5a44bc13cf212dc9788baf17d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dd01409b7e66fd9a9c9ad8fec92c4d0
SHA14769b45d915eb09c396c5c374cba78508e008ef1
SHA25664ae8c541f02858d2bb49d8506ea76e061ef329e3fbb2b35525069518b512545
SHA51282e7d8d168243c0aad3dd1748db00196d20e93e92a7bce3212a5a6459d265a2dea0ef54f3ba49d1e6e50f06eaab166d85a2ed35b0bf1df31ccaa3a99ed620a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5171992639e0941dfb92da2cc43d9a0eb
SHA141e16ff61b1a5ab586af7a890d38dc159aa33562
SHA2565a3d22f612cde5076f291427011023891b4637ed4d43405ff04213e8b1f4b973
SHA5127dd580e789e6c45372d039b0d560175b98f2fbbe0189f427662db299a7c1d1acd249c338c6218609650ab8e6afc78f57ece83f64064e66ff59b868779c86680f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0e3c24049000d8b72eafb96e02851a2
SHA1f714a7286db142dbe51a35a1d8dbf972028d19fb
SHA256cd8679ed08b96a8b603b38749c981e6cf10981138ebe6ebeb3ec86a493575c3a
SHA512b7ca685e416a4610e28585b17992c3a81ba5e9267819caa51cbaeacb9268df016fc9188d3aeb849d6364f7d7ec458064347198d1abcc50825c952bf808ad06ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de415cf0808654cfa40df9b5439773b5
SHA161717267c85c337667edd82ceced4c696b7e9e53
SHA2560664b67d2b83aa9eb87b07186da4989c67582230d721321c1801ab6e6f249ee7
SHA5123566631270faa220dcd175f9c78300f2de4b3f440730d040c1d287ad8247656260221da7a299a53db5714c830aaf35e038b0e814cad0be750c253231c28cbc97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a42fb385e686bea206dd10129666bc
SHA12c998b406741a1c57fe1c624568479e53c32aa43
SHA256ccf8ddac815b42e1e9d315888ecce086f041e0187fbee7b6923430b1f8d8857d
SHA51272bed5a42b6e0f85bd6234820620d17abb6138a8d2db681179dcd438a4dbe56bf7a5bbda09f147a89436b48bb16dde316deff2a59f904497ae0f2fdd81483523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e81d91550a9ad8474a65a95e4386ae05
SHA18cc3c87d72766fb15ad9fcdc53e2ae692cfdd32b
SHA25634d92309f08a993f5c86e1b4cf1858fbd4581e4397181794fdb014c94a22133f
SHA51270b570943217385ef28289be71178502c6b4b2e0c3dda4baa9897567319e9dfd15bb50f44c4eea67d788d5b2f63e513394820f8e5365f1d70a928df7d960a0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d0fdf23eadbde3c6196e324ed0d78e
SHA1b8b769c70cdb17daf09785d82f195f95286f38f4
SHA25628ce2d148dda753cd108cfc92308e4f7432d6597a3cd1598601320d73651a844
SHA512489156f2485aae26bb697ba5b4f00856678a0e2ffe83e371dc956694efff2678b4c10ff27b1abf4a524685622a1d0e41811d35d0db9837ab957cea3edc1240e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea7088bbfebb47ce3d88cb5fae538d99
SHA14d9ecd42d1a31c97c6bc2fd130b5ac232be6d43a
SHA256bc1fae22eaf9d08b51efd5f504f9865fcbd6eda4dea5add0f927427b4159ddd7
SHA51208c81c58e492ad3060bb89c126543e7b9a94b77a40864a18467586493191f5d17e781124f1b8139f1d639300c5423016a739e265bf02e88ba0080148dc250d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55537fffe68528856b13875f09ee3415b
SHA1643f946979acfe2cf3b346eff208fd3c29a35145
SHA2560ab5d19be932258be997706308b06a3db6d54c7bc052331e9e8dd017f0a7d267
SHA5122b861a72f45b65174cb30239b177a3975805975715822337d13ca946b912ab1cb6a8638ed308616149f057c977c5584203b97850ea525ae8230741b6cc4d4577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5360bd20ba3a1df6dc5f025d6bea43173
SHA17be836c9622914633fd509c7fd13b46ec853ba41
SHA256b1cd6d161d3ef63cb7eab520477269a4ef09fd8663cc4892c781640aeafdf599
SHA51285e386875ed1ae09578cc43699dddc263af1831fc7ca479729db0c24411f98a9207b28eafdf8f0ce85fd1e38d763fabb517510dcf5efa3fc6af6bb7ba8b0c7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956421d457706036598de19e7c9958fb
SHA17c3d85a307c62e24bf963e70c7a15386f15775c9
SHA25651d72076fd97fa86aab58156301a58ceeba67b3042a6e5ae09ad9a996438fd11
SHA512a90eba42a40e086e99f977513874045c224411d10007c00106c2d7194514934084dbfd7fa93a80bb9ce23be114b4b30f5eaea0f7e1d17d775115c2453fadde78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5494be18714572f9a6abe9076e8fea1e0
SHA1c657c2ec05fd3946cf615e501075209172f260fe
SHA256ae7d960261ff4e403e31e02b64fe4e01eec68f7278e5796fb78ed468a2a134b9
SHA512e4fbf7d8d8d93edff11ba9ff121511eae6cd78bd332e5acf6673eff659d2eb844c7e58ec9edb1268081dd12f6732a6df2350119dfe5adf961a8761c8283124f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581a9a066cbec9782886e834d82965f1f
SHA1ce59f642ee59ba81b30988343e90c5315dfa11df
SHA25660701379eb8e6c668036acf5b171c7cb86ec1f79cf47233239f72a5b7f5b0bfc
SHA512678758b84a7884bf2eac44df12942902af8daa3969553309895558b68d5a38dd46eb849f03891865a489a58167b60fd07de4c459b9e120e5bd24a74f973b46b9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a