Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
liblua_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
liblua_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win10v2004-20240226-en
General
-
Target
liblua_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
-
Size
1.6MB
-
MD5
ce5bc391b7158b3fa9bc868b63ab55fd
-
SHA1
a514e9d97dba40bf1f13977b7a371432325552c7
-
SHA256
931da5c25180570269beedc2c5d4fe4fd98c19dc3fb0e886f7ba2a9fbd31ffa4
-
SHA512
99299f9e71cb97b37f5d522b713dce018650e0f5db7b21ed9c2390cb3feb2ea7f4aef6fb8510780d0f0f6116b261d1ab5632434e8cf9c60d7904dd02d57055b6
-
SSDEEP
24576:QXxN5RBlGNBsYxijqD528WG51VhpIbfN88:QXxN5RBlGNBsYxiG5V51VhCbZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000031e29da8fad0807a197b8c863b7350f4ec9bf9cbbca146b4346adc4482079b05000000000e80000000020000200000004ba64e24830aa2760cd6115b003b47fbb4b7d61ef2d2e62164dd9c0f745037f2200000009167efa0168fdd8808c31cb3866f96eb2a4a0d7814a26f164d930fb3a64cd129400000005a410ebd782efe9a52de18b6470c0fec14296c18681ad387e264649efd01ec369099bfb51bfe89c0551b8ee9f6eb088334b2ef8931e4572a34cb0f4d88ef354d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419684385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95128F71-FE37-11EE-AD30-660F20EB2E2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a2c1694492da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\liblua_plugin.dll_id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576f144ec0dfeebfc3e292ac2f7f0379f
SHA1449ca4cc2415d412143060dcdbbafeb93d0d02fc
SHA2569138669f178f47f9d0de4856a2180316df172a6b6c1131871bd7a897de9a17fa
SHA5127bbbc4dfb28f602006336ea6c597b30da40221ab857639191f95c9f10779705d89aea48ab4113752af6cf24ad6bb9f446fac5fb4adbce2a33f55f4c1c86ec742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5303e28c232534edc6dca6489854b36f1
SHA1a3cd0a75a0e248e2fbfd556287748c6051819013
SHA2563cb1a1776b7056eff7a7689d7657454f0517289081886e363ece7d0447917fa9
SHA512078b7e8b32c7f2f1887434bedd7089934f33f5e8e6e8b8e4d2a48c5162f468b2c1d2913e276ed4ea95678aa0a03d2d45f247b68c0bcb88bdce5a6c07a9726c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863e7ee22575750688c4c11017ac9905
SHA1647763628f81051780f2e49e98b57e13d1ec5153
SHA256a0c5aa1fab3b8cf9d150942994d1a7c6d0bc7e3054459d52d84fbae96018eb22
SHA5124e87a54e847b634314eec85e3fe8eacecb7cf10501536182e2dc7f5467066df2237f127e36bb4b76fcc1f0f42dffd99b4d937fa4f08276fd48c9dd18797c3f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533fdaa7c8bd944aa2f82ac91a9b3f283
SHA1f8abaea4a4a1c8af2cf5ee65fcfdd3881e7d9527
SHA2561436fe8e02471cc10ab7b0607d6b210254d9d98082f6e893a0918ad9fc771ee7
SHA512f82728bb953c2b70966137e6f675685266859ba5cfce46603bd843163f790292745025b5cc8a207dafa5deebfe7977340390b04a5ac48c6a76195a68a9b3b8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a420eb12dc952b9ba45c169bad0a22
SHA18817742233770f3d64643b05777f3cb5e86e70b3
SHA2566926831df2386439b2d6a0ac9580f3640708c499c5e01aa2aa0178fe3a7a8510
SHA51228236eeb6a76442397f7edaeaa17b5b1b263bb13d602b40eb01a8fa9d0f9795fb97e38e891d8c1e4d587fb916f9a69751e7e8de8c9e6b87f6ebc03b743ca917e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb2554b0dd91a832598fbfc96599aa2c
SHA1fb4c2cdd83182b9bc5ee4c30c98badd84a4c1515
SHA256eb19f165bfd7894a942460593d3a8b8d3af3828241e5bcfca708b5f9022401d6
SHA512019ef8f0e6f84e61df6a1f439cb19b4cbd07eaf0a484437d79f07a6114f22c53628d099c3115dbed3cf0ce04feb2be2b2b7284678bf5a5bcab796dbfd9061e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553290090e1955e5ec84089dc9c7bb061
SHA1736016074c21677aa8333a111f523e4ca2bc8092
SHA256c67985a00e47ea51e9c0cc305b00ae80e6166d8ef5cae15882fcade1e69a7053
SHA512131789c44c3cb0d42f376a057e67eae20fbcc20229da665c9652495dde4f94a96a2c604eda222c9a424a396396e37fa4f476be37794684060722f13f8f8cab39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3b5fe92651f6f72e3837a5254fc0da5
SHA1b7022d5225922a67c89e535374ce681f930d5f8c
SHA2567ae5a644ca68ecc1d37ce5221d90f78433c6b7e09f91a39634525a0d1ed7b7b0
SHA51257916f4d0aaba70119f18e04cd6c8c91fae61a233391cf9cd7844cb63c635f55f73bbf7d4f33f34969538de6cde93a9f9dc7d72e0b1b05b73379d05f39a6ae92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5858caa0e144db9fb3b6914c83cba8d5c
SHA17b05ba95a13510a79fc813da87f8eb00f92d85dc
SHA256c1b345ecdbd53fa47d7167f88f25b545d6803ecd979b25edfdc76105b31dfc8a
SHA5126da6008e030ba08af23718e13befb8afa0bda0543e114fe920667633ff6538d2a23f9dc24ca0d1a6425f445c07e073b93deadc5a5ec327dfc9fb9a5595b2531e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebe13b125cd6ca5c5cbd0d52059327b2
SHA18bb3cf82cbe0ccafe18d1a2ba71db6af3fff21e1
SHA256aa66f42e8c0193ed6788bbf235ae739a06bac8c2e89ecfba44594a07ee3cf111
SHA5120dc8dec46191071b044248fef1ee0001fa741f6916581a6a1aff3ec2b0fd0ede07055b879327ccf45e38f04262a7d4e91a415cbf03abd8fb5c4afcd8c9202ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e77493235f47fe5417d7e4392cc3561
SHA150a95f41d1033e6a40eb540e52738477a9aefdf3
SHA2567e99139937cdafbf552c2ff127ecccd3dea680d7ffda47d246ae89ecb034d786
SHA512e7ba900db585322efab8243647aaf7aefeda2677dd12152825e8d58c28c6c494443a94e047f7ce0c4c9aaa57aa5cfb434693700964a7f4dee0a4e554bf1a3684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f3b5fafcc4913f9a1f878d166ffb885
SHA12b14f9fb6fe52640067cd6bfaa5cf5446de76ffc
SHA2564e165b735b67850669deced23d19ea138744033c305a47e59751eefcdb489811
SHA512a6997e3105d628d69165fdbb06ca6abc415a1c1c63b49415b8cd6f97dcccc0b328ba26088153dbcc4093f55f279b64f4798ba1057831a2e53b8a7c016c9855fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e74a44f3e1cd3d2d789490337d60606
SHA188f1b2e386e89ae9200ae9fa490ec9e353096f33
SHA256d89813f699d7f24b778c649cd95799457ed73d32043801cbe5e83fef7c3be35f
SHA512d6ebb77573c27837952d2fff4c6a2621a8d26e4f8eeb0e57672a334461bee48a2b234a9b06f654d3c89b4c354c5f31bd68eb7b8777db616a66db9b1cba10a5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beafae6ec066ce7c9281660e806a17cc
SHA12a68ac2075f512b7c81ddf98edae143e4e46616a
SHA25691a196c01ca06441ad3950d94697e4832a1220e910ba767e6847c0ebbc3b8afb
SHA512471f1540cd1e24555c258ce7e80e3e8b4be503ab5488f7871ab59a9b850b1ef0ec45d67808f6ce827bde2c81e5c8f4388316f3245ead408a9faa08e730ee5a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba6fee64928d12bb001bd2add02e9005
SHA1c1bd822687676da52d6cdf83ff0bcb1ce9e7c2cd
SHA2568a26f8f9a132c690c4d60d13a481423e5a9525e0730f1f980ca7a8eef3020fda
SHA51215b9b966d4638871a8de42a0b2c388481377894aac3ade2d4f5198cba666725ddc7e80aaa7dc6c9cb1b1e17ceb802464002a44f32260787599cd46f4cfa4945c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eda8db5c0b0c1d3bef554fe7455fe6c
SHA1b04c1d84b1627d798e61a0811971e3b01ba6de2b
SHA2560af5489078d15205fbc54179525458497ff27dd6a40786c0c3d5bec1e2151128
SHA512a8aca9fdb812c8fbef135505038c5d12cb751c19674f87ff38cff213c9f51a4d4652bd80f451bb314ef48f89513688dd25c3769cb7adf513785ebf73a8eac28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528a65826f8fa6acf4a55470fe048de4b
SHA17d863c04c55d9f8e07673a19219984541728fd61
SHA25673074d1edaae241807e010bec209d9348d0a7e26b2603996b5ebe1e4d6f4761c
SHA512e977292e7d0b57ad68a1c13ffb05ed5ce524394dd75d09e4dfd3a43ff54b796739dc757b391e65a9f189328bd6f71bd495e85cc7756235e471da60c24a0a4931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544348481a7e7ebdb99a91393c675b62e
SHA111b8fff19d41f30bd64be65064092e9e9ebcae2a
SHA25623d31b3f8c1e7b126f08b80e49e0ce39fde1c454e8f0c70e983c424865b9fcdb
SHA5121c9ec215c493f1ce4965b22aaabfbf190de3a8fd895fdfbb292b0e91bb825d645007ee7b7330dd81d37882034a15e4d546df01beaeb537ae1137b76a586f2fe5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a