Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
253s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
libwingdi_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libwingdi_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
Resource
win10v2004-20240226-en
General
-
Target
libwingdi_plugin.dll.svn-base?id=3053a167982e379b031fe9fbe2a1d57c23026a90.html
-
Size
7KB
-
MD5
3b1dedd75df186a4c0defbce6f6b4693
-
SHA1
f9dab982ca051c2e4526cca866d5c83467d208b7
-
SHA256
ce3de345214e5d7dcf41406aadf845357a8de67852dd725155acac6cc395c87a
-
SHA512
7aed00c640986da3e0e29aa3d34ddf0436e6a48d63c41ae421e448cbfcf76e84b188d22f2075fc4a2883ea7c006bac8a90be3f831f6327d95f12f3ca146ae763
-
SSDEEP
192:Z3vTPMcMHyx1OvBv/bv/dRv/+vCcv0mXHP5BxUFv/jvST/lo3fOvvhv/Jv6vgvdf:ZrPMcMHyx1yrdZ5mXHP5BxUNWT/26JVN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A5ED8E1-FD1F-11EE-BDEB-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d088da282c91da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419563988" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000193707593d4f8ae475d3a3289312d4590485b68359c1db9ce6f88b9e91c598d3000000000e8000000002000020000000c43ea8ae393eaa08f3355903c689127d25db92f9eae8c98e7dba42b42d6eca112000000006b086b8a4bd37d9b34606651d5e07fca946085ab7e38ef0ae75dc6f1847d72e40000000724866ed8287f381d3f5c0d06d7bf496f7ee1d298a71b317e64858930645b362cb6effffb98b16558f4946ab46e9bbac8d594ce53b120bc16a8ef1cdfdf41472 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2180 2016 iexplore.exe 28 PID 2016 wrote to memory of 2180 2016 iexplore.exe 28 PID 2016 wrote to memory of 2180 2016 iexplore.exe 28 PID 2016 wrote to memory of 2180 2016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libwingdi_plugin.dll.svn-base_id=3053a167982e379b031fe9fbe2a1d57c23026a90.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55408473161b161d8ca61b0288b99fe30
SHA19e49216474f7288b37fdc79c76f80c785084d188
SHA256bf6dbf64927a73246c6176baab6cb65f9e9687cbcc56a292a88824bcd727b954
SHA5126ec851ee354536293776d410fb6229d178273c5b21feed057babe4f5fb719d1a932faa36c1659bc9932e0301e66e3031e6fe5aa269d10bc585339ad64978d6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba584f54e890b342142f67b82b983677
SHA17b37b48de38fda29f6a046685966645a0612b12c
SHA2564fb485cc9f605fe8f600f7e956db7adcd13a02215a1442112ac6ba78fcb47099
SHA51224fc7c7a0229a583398dfac8ffe91c03b2b518a9ceb12680e730091665dfc504746e9a96eb4b38724c83a4f5e356d4fcc041c48d9a2636f3b278d6733fba2606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58da9cfb9f5f266311530530dbe6eca1a
SHA1a62f943d23a1ea7609a9faa0b7358253bd444675
SHA25653cacb275db2277efcb97d770b71e07f0fb56b59a9199398a219769a09df1cfd
SHA512b5f043bcdfa4a20c5fcc50bda8e45a9cd3b19538dc5fc5c30535159e6de4155184bfcb98e262b256915db6032c1aa96da50fabf2d3353d2026f7519188aa95a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b2867bea1329693e992004133d87fe9f
SHA1609fe3bd7aac9ab2ae299bba01911a383be18639
SHA25603d60ea8a0a46156edfd5b10ac923f2a8575ccd18c8e24a2186e2f0ca7dd0730
SHA512128c23c21f0c4e40f05aa359bd1f283ef113db89215cd945f31bf245a1d56e32416eb884879159988d2889eb8a341adfb315477b1bef3604654fd3916aee5385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54da37c324074d71b20ae8730bdc0d1ed
SHA1c8586e2d517838199352550b093ec0400500e5d3
SHA256770a5ebea81c0a9858022272813fa58d4bd1c216c01a0840c6ebc2ae68e6a5a7
SHA512418f6a41460b186ded2e299010a2597d699684d7a06ddd468d8fb1b2a7d0c5dcd84e7e1e5fde4c2339dd46cbf5d86735dde14681806dfc77d47d2f999fbbe445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5004f5270d48b662cb0ef961ffca9a1e0
SHA16ec463bc54a0a1f364f0bd36ba506723c274853f
SHA256c8cd3e8d40a54007bd50ec5221f1ff5dd3cc3ed12e247ee4289ddf2486a0518c
SHA512e45ea83befb0a9a8bbd411ded6e7a9b6d98d3e34cf8d5b6dbafa865c835d15c7d26796ec5d3140bf31cc8e98bca4ef0f4eabe50a89303c9e5044ae40fe715acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da90076d79cb8d89aa076962e2503a00
SHA13c6bffdb0e9250c23500c16f79d95fc679edf572
SHA2563b01c749f1d1d383ee434a0bdabf1d5810271bce2c0aa1014d38c38598418189
SHA512a9ecf30499f0c2de895e55642745c88f830d3259411bf1f87eb04f9bdd4563c3720bb2fcc96d27715afb3a8569929b6d7bc7f10357153af2d9a3d8b56bc4ad6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521cda59ffcbdaa6073c72de24acf3b93
SHA1f795a5ae36912564e2c84bd9172a9c5b43b50769
SHA256587bb83b69d43e7a88d880b3af0362baa66f4c41ca2272f4dda61e31701b30e8
SHA512347a39453fd9e5cdb92475a71cb99d1f19461966c317327866b09d0f34a2a24629b09921addc88daa59d67d15ff686be8b986736ea24c5d529298380e0ea107a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afc0ec477729a6d02b8f5ca4a021cf2a
SHA111537d81f8b8621826491cdf36821b50d6f3d89b
SHA256292978feb4263ffa090b6698a539cffc8d6538161b1da1027d23e2c9dd5d1b56
SHA512faf7f32c93ce05ae30bf8da5dfdd026de599b22cde142c05538b15b1dd8af3205f754b0641d4888ad017f4c18e386d4a6b82d410a8f436086c07105769a984d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ce8719c83454de33d65bd29363cffdb
SHA19cfe1b192c3bef065e394bfd6031a6fdb145fb70
SHA256cd09e7809964f4b98ff5e05d92266db1c1a74138159a35fd83f5b3ce13392ff9
SHA51220dfb32f5d7acc7defb7f5f4283df4e12df2c58b574fdbd562f150fb8baf96ea1b02b325bc21f1be76c9d92eec651a57c3234024bd2d6fdf8cbab1e9d97550d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD515ec018deb2c6e6b48d76d04509f0ded
SHA119fff26b7ccb9f1451c4025947421b4c47087df3
SHA2560caab43e2203bd173a2dd59e0e09d6c527233f2acf70436c3b0419c7a4a1ef6a
SHA512f626e40bdc5b6c5c71abd7794da501e6247623be4278cc456d6483fb3534fa2db3a9516a714749e38daf4b6652e16e61333b210b8f96c1f00c975a177869ded1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598ac1c16eccda07ff85ecd1230a984e3
SHA19dbdc262b9236812269d22ca15aea05bcd92abcf
SHA256b1ac57368e07ec0a64334c2316d02c9683261b0e3b37d65442791e9e71ff9c16
SHA512f8495fd4637a3a184aca84e26a13f6bdb335a988cd09cb14e18882c9c7eb1b0b0d375ec9b556ce7e6037c4130c1df4f8b340e686c615c499f855a26dbeb6b509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d8b5a3163a662c4ce75dc7f2c2a8b8c
SHA1b6fb0871ba403e43fc0daf03fa951bfa9402aee8
SHA2563a948a945add0685717baeb92737bf0940e773e0cd99388aa165119b0901d92b
SHA512935b1a6aa2e18adcd6777fc2530ac8f757547d6ba88f584dd0038968d6e1336a0656d0e830dc686f3c6be4fbe5910f3ac4fd55089422ff52240c80e33d7cfab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc78f2280d424040b2048ac044dc2875
SHA1abbb7012672068612481c895043a9a42b1f4f146
SHA256b7201ad9385be9df5b84468f31f63ad7f55e9938432cb05d6ad7352bc3c3725d
SHA5125047fb750cd6195957e3c58c2597b020e003d88ca112be506d984661da02d4931a1ebfae1efefe8d6bea87005ed8097b95f90329b4c3d99e4447239aa53cb606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf30d35a3c7acc3110f04cf04004de1a
SHA144d94f0b165d83b657e257f3a2e3dfc7bf6624eb
SHA256441c75813c7b696de6cb9f585237de6b14bf78812223cf2a37a8a21f0549a8c4
SHA5126edf46ddae2aa2a2a6a248ff1f0d3f4b42bdba8f3344d0b95bda1b8521458c4f42d31aa5b76d3fd13976bb390e6ca958f3dfb7f0140bc0544c858e4627bea46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51eed8910b29e2cfe53032189639a518b
SHA12514f1db8e9cd16975e8d42c6dd9b425a9ec3b47
SHA256b0bd510a70c0d27992b76cac6763ff3a5deeb02f0918ca7e45dd7d0d03989865
SHA51272cd7d414e6d26ace8c51e44399f84d083aabeb6aad895aebf60a2f682bbca2b47497e91916586307998977e000718820a60cde4a26f27b4aa0a314cae395ba0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a