Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
libi420_ymga_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libi420_ymga_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win10v2004-20240412-en
General
-
Target
libi420_ymga_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
-
Size
186KB
-
MD5
e0f52e7e29d3e1341535a83dfe6ab5c8
-
SHA1
4edb3fd884746249450420174dcbede414addee7
-
SHA256
1896f1d5a3daadad45e29aa63814751fc36476098e7ac65fa6b4667ba9f1d74c
-
SHA512
536d6f5d3ff919e2de5202dc843bbe45a116385e67191739c7176f8bd94633387ac50b11dfe8ce602a1443285e534b3089e045dcef4ac7d7e0fe4693d34af480
-
SSDEEP
1536:Gh/AHYb38HmQII373lWJzMgYWcWKtIy0ZdujvMQYqERiSuE8B:Gh/AHYLDwGYgEfPSUzMQEAD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704dc0c52691da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000314b785ba6efcdf5bd14facbb55c454e2e3ffe237057e83cbf0c8ce9dc611243000000000e8000000002000020000000b720423635f763007f2a0a25a79885d7bbfba57ea73b5b21c8078953782258cc200000009112b31f2486d6388863a8035447786de631ff8ce9e8b4bdf6898dce51a154ba400000009a8a40362823c7a7a3ad608ef4b8024329fb023529c4653964b633f041a774237de4d91a16632ad18c66353a023e7c35c6e3ad01c9686b03806c68e1cf137298 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419561702" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0BFF611-FD19-11EE-9D0B-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2508 3044 iexplore.exe 28 PID 3044 wrote to memory of 2508 3044 iexplore.exe 28 PID 3044 wrote to memory of 2508 3044 iexplore.exe 28 PID 3044 wrote to memory of 2508 3044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libi420_ymga_plugin.dll.svn-base_id=e3b43bd36fd50840467669364014ee53553872c1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe723d5fbae1a10d6a49d27041ffc15
SHA18e93b0006476db803467d972d27897998ad1e7cd
SHA2569a1cd63726aec256186134df63b4f3c43d82536f10a30c82f11e77937ca45bb5
SHA5121cbe5ec37570369eeb993eca528aaa92ae9b01a720e257bdd4bc693c65e17b017e4bc9f1d17f29f73a10441798497be41c5524ef4a720d55c07915ba994987fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a797a327a29f5f0cc5e6e625b5710211
SHA1eccfc00f6a520ec9effd0286864d98b1d9821c0f
SHA256c982b6f8502f378eb3549a23ff3bc425aeda91d4c36cedd9d8856cbcdaeda7d2
SHA5126cd332bb3979a894ce1679de6e9df016ab02b7db009521df3cf79189d1d735d36ba3c480e6b30a025dbdc1ac7829b0ea085e8dafa5056e0774d7d3d6fa1bed88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54845efcb7c66438001b77f3ce7a64920
SHA1de8383586e5bb81d2cfc7e793c11d3a19d978b96
SHA256840af58b4a5328e2babf7a44d242725d235616066a2bd8bc4ad1a48ad1861dcf
SHA5120b9b1fb90155cdfa57cf7ab65144d40601a1de6c21374ad39333807422ad8fd3d8fcf06c6a6a4368dc41ab5914cb957340b743ac97984b64bb9c5ce5a62ef524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e11060b2263781fcee1241d3d49888b
SHA180883c33820b9625936cc089356e207b041be1af
SHA256537170c27dc45f691485f53ae4ba2692cecab7cc07f5ffbacc693ff0de5acee6
SHA5120180e7e72a25db50983d6469fa76cddf3dd7cf3178e1892bb03728008daf2294b433189096bb1a89ed21902895b7129950b8998bb5840692fe25f8a7ddbc1369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5726706a45266ee7e93f765222274ee23
SHA1751126fe262148ba23fb29b050f575b7411ff69b
SHA2564f2d046c65d2b41c534432434376c2e729f1154093005e8e89d1aa15329114a5
SHA512f82dac8b7694eb6cfcbd7871f06c9c36522d662f3a6991fac01317cea8442ffab2bb7935b9a5746d3a4f6edad174cc8e6623a8add1435dc83066459c2f4275b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57743b58b95c59adaef9dd4135561b094
SHA16e7e42179812c345df70edae6487b444062a6a99
SHA2567ba42bb98f0d68375f71e0be7f668e6289445fca51b80586156c9c64bec3b96f
SHA51221c4666a000ff2057702fe9ef95daa7dd95430fc21846534123c55ede5d662c6f3f79e02fde350ddfa444f3d8a9e214187e64c16403ca74dadf801866acca24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b873df2965ff7437a495df5a45cce24
SHA1c1b820ff0615b54df68fb0256ff603aa5fd0b246
SHA2568923a9fadbf7dd6302c0e0ca8d46fc293d550b67eac9977f2c8008fabc180ffc
SHA5126e07ade07e293b4f8ff952d94d88a71abc852514eb8111b4da67bcea0bf3fea97ddab6965cbcef02226fcb3133ac118237fe781bf29af012a859db570982b747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3a6a4a5f199940fd588936b255555c9
SHA1da24fcbdede62514bacea834480d8c7aba436f9c
SHA256226b6cbb4a411287e3f4464a61da87947afd6cc7a5fde97a8a5c43bddd70bd5f
SHA512aec7cd93eefc116300cf9e13eb897d607a7b08d2460748b2266653ff31cd084573ac0613bb7112b41cf3d3a74f256379519715a90c114570becb0ac0d3799630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5212bd34cdf8a6a9f149fbc698e9d7877
SHA16d880afde51b2bf99158804ff4a1f3514b09c43f
SHA256713cf2e32446a77fdf1e5dfe36ab1e653259b23ce754759df6d1c074949f5cc1
SHA51279d7f88949129576e43a7c9dcc643ef5c4919c20a35e1ec6b4e7784f3fa7fde9ea91686fd3db4ef845e913a7c90e7fb3da3a769b636dc354f80e50dbc6ecc483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b84bbd6948a0145db6590a8011556467
SHA1b60005d99cd50857e74c40377b6d38047a5d4010
SHA2565c9cf75e217a3667ca1ec1394d1b898595bded8ba6c38f1b39e0b1ed41c0a6bc
SHA512879c1f07a341aba84827528b6af7da9c4877651f7d1239dbbf5223878ad51515d426f8a32341acaa5c77c5dcd573e53a54502f3628408f7609c022a81df723ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c885aed42bb96d8d620b69a0d7fdb6e
SHA1aafe7a5d862c7fc22c6208ca32fada0e00d76293
SHA2566801a8e45a72cc086e722c6c9c6b249e980277a53988cf16b1275ff5e72d59e8
SHA512fa72f37f70875ad909effd0c1cb88fe47a00bf2b256414b7707c16cf7ebe4cb1f5b61dd52578f3842dac70318bbc830a7730a9b22beb842d6fe7b231c8eb41c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503eae238550c275bd08b2c857e41be2f
SHA14cd7a16ff2cd8f35ecf80c5a6ab0d41f5efbba6e
SHA2560e2f9adbddf5e42bc11e70a70722b19212fc7ac6f89b1c4e7d581ebce935d73a
SHA5125354c66846afdabdb330d672a51ee26119536fdac3e61f2fc5d22bd1bde9000ded9eea7aa6f9ea78e1d8cc594d009bb4171ea29dbfa09806fca80541a70a2657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a974a2cd4515c4ec7b4db07d60171384
SHA160bca46c0fae0557d7abd96be5bfc50b44519d38
SHA2567a71f0dd56e41594cf325a28d101baaef9cf9ac0c1aae4ebe0199ccfde6b89d5
SHA512a28de5311a5e63b37a27984544a2ec0ce8424d029abc6313c8c371f009c89f26aa09a146ba66a2fa963c113afdc224df089de2a11afb4d1e902c53d3147677bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563db56065c8a4a04a08908d7ee7d79ba
SHA161d29fe4667e029e0f03d91596c6d1cd1e2fbb13
SHA256d800d5617d23d181e995bdc03715aaeda2cbd885e7973d99d683ff100f67f093
SHA512fa9087ad156a9f57508d6d46a4fa6b07c97a8a62c016a6ed9d02358bdf13162d3699ea33c36e6e1a15e52d296abda355b4424a48854b39ea027a02fa85d82c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282830fbb8b43ee87b6fa77bb703330b
SHA19b437b381229e5e646db6e23ee373927f322af6c
SHA2569145f50ac3842bacefcdf16237674bad7cf121f930614e5aeca2da48ae97fdf5
SHA5120567b1a7c6d2a438e5d1fb43fcb08f2ff54afd8b7a389bcd06055121242dcc49b37ba82307d4cb8f4bf994d1d5593c55716699b2619d16d6c3fba7a16a604dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5399e1e2f2474b0e54e65e55c9d4abd94
SHA17ab314d1747c06b8241103cac6007493d52b9f45
SHA256606ea30e86345b7c319b97445edcb8c9c4682f5311e3e063decd22ac310d1b45
SHA5120de4597767da9531c1c5bcbb9f77f02a5e8936da061cb17420c845c46eb9366f970b38f2a1abfe4029f8a59183acb53ee369d6511c9b1325d1871a220595eeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba2eea09ffe213e9ffa229225c4b7064
SHA1ade97b677bd8ba9f8f7cefb5d2e6bcc24f88343b
SHA256db01717b9ad3d22d7940b446c4f086ce13d7dde5fa2b171a4fdf9620aadd290a
SHA5122021bed3d0e5a181c5c1efe9382367d4b2b666e88e86d0d6eeb979d36ae364c280863ff67d730eb4eda65b45860d265572dcf5b7a8a05acb50820113d9efc751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5740a55c8f6aa8814ac3a4602a5114596
SHA1f1091ce28497f97f7cef20e69b49d25a5244b8e5
SHA2568a3bf917a92c79ff3e4ace4a3e09ca6b35943b946af39f3b0cf4051d647babee
SHA512324022b406859cc90d94874365e18c0b76d86549f8f5fb41dd93b48e1fb3e47722bd8e57450c759bfacdaf3a62300c31cf4f6a42598255e806d9bb2d09cf5243
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a