Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 10:49
Behavioral task
behavioral1
Sample
Solaris.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Solaris.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
enviorment/UIRemake.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
enviorment/UIRemake.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
enviorment/textword.exe
Resource
win7-20240221-en
General
-
Target
enviorment/UIRemake.exe
-
Size
483KB
-
MD5
fcaed1a87857f201faa454c23574bacc
-
SHA1
ba34f6e93349e2d6db424e31e3f02b621f1c8afa
-
SHA256
1919913a6858a14f8c61034e55e13e76c00a7709b429bf2d6cf0e08a31d2cdcd
-
SHA512
51dd262a6362153d2a03e456d6e16a5ad334a7ddc63de6344dedcedf7a56b5789763bc8deb164d4b4bf90fcf1ccd00aa40f9214e060a494520c1df5399c7f532
-
SSDEEP
12288:5U9GUQPoCzg52Htky52Htk8Cr0WuNijMD2K:iG3ACUm9mDCQWuNJ2
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral3/memory/2956-3-0x0000000004E20000-0x0000000005034000-memory.dmp family_agenttesla -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 5 pastebin.com 7 pastebin.com 8 pastebin.com 13 pastebin.com 14 pastebin.com 15 pastebin.com 16 pastebin.com 23 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS UIRemake.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer UIRemake.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion UIRemake.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" UIRemake.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000063a3187f2359c11d68efb866d44efde256df932cfeda4e3d086c5b84880feddc000000000e8000000002000020000000edfa3fdd3987f7699e362a22369e6c7739b7dd7d8e465d80c5297328c78e67ff200000005c863712c1c3a70bb8b957118a3e2720777a7b61d7f8944a79e912fe733459cd4000000074cec3c8c61f1b2827360e036de9f9d2f442cce39acf9bba1a65522f53a41b3a58e5a3e6190b9d21bbe6373a0addf57b0e9677653ccc6ab42b836849bc144cd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch UIRemake.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C8623B1-FFCD-11EE-9DE9-520ACD40185F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07e9521da93da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main UIRemake.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2956 UIRemake.exe 2956 UIRemake.exe 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2956 UIRemake.exe 2956 UIRemake.exe 3036 iexplore.exe 3036 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3036 2956 UIRemake.exe 31 PID 2956 wrote to memory of 3036 2956 UIRemake.exe 31 PID 2956 wrote to memory of 3036 2956 UIRemake.exe 31 PID 2956 wrote to memory of 3036 2956 UIRemake.exe 31 PID 3036 wrote to memory of 2664 3036 iexplore.exe 32 PID 3036 wrote to memory of 2664 3036 iexplore.exe 32 PID 3036 wrote to memory of 2664 3036 iexplore.exe 32 PID 3036 wrote to memory of 2664 3036 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\enviorment\UIRemake.exe"C:\Users\Admin\AppData\Local\Temp\enviorment\UIRemake.exe"1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://pastebin.com/jHLi50nP2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d686fc8b8f420899edc58f21853e5dcc
SHA1906a6fca792c1017f81caa2d77c0d38ea1eb3c7b
SHA256b53bea74e4fc335e9cec3a0394421c2b6e0cf1f309803823320e2108a4c8e2ff
SHA51232ea1a51bb1d2c87590df3ffe34eb2be9ed65d18c872a36560b0695c1a30c5da8af4714929fff3f539ca3738c50522bdf26f6c68569eea0837e1fb7a5356c52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377a73f35c6b72882fff0113b239bfec
SHA1f5874e400c70478a3be07f9a5d5712797f735b9f
SHA256a0e73aa6daecb3168ad9b3baab7aeadc4c8eff354bb8606408df7cfc9aa75936
SHA51272033287a4a3bafb1acf54c4ceed82211c0d3436d427a83a96ed185ab6df794fdf10a91850359fe4b9f5ee3ba9c1b97b02042ac1c20343e53eaefc4bf75c7a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51466834bfacee13ab758d1ad6b9062a2
SHA1171841be01b32b3011cee734d4b38a77fe536adb
SHA2561cd87bca3327a0f95cba72db3158b549a5636ab1d92e22591814cb9a9e23aa94
SHA51222c8e4f0af61cea6233de3552939d458fec1606db1cb82cb67107e896ebb9e3df9194f2288d2610a1e2ae1cab08df1bc69f58b32074fd1d0e4989714fb056254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8feddf0cfb37aed0cb3ef7121d1296
SHA1461ab33db3b9e3c6c300c8e43bcfec3851d3e22b
SHA256b2d144214be27757f50157ded8da68c3fe00f25ad5afc433f2a105fca8015729
SHA51212e7fba2b5678c87a7cdebad4d2a8228c28d8bc3cb4d29823cd677042c1993dc09736742509e114c881fb3fe91e9b99ca3a5c0827e165e6773318897bacada62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a633589614dbe72f9bc73510c7cefcd
SHA1084a8e18eb55ba1c8a2026963e01d0445c8d3080
SHA256e2f180b5ee3879e07f76195164b6c8562d3f11c5fc27020b402301720df0a2fb
SHA512dd9c389fd681e884521568e87bad358b3de4d27c33404b21ee59ff0355f9041a948cb795740c0af9f79c909b9b32b977c499414c630a6ffe5ff15adde227284b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdaf261f3c6bbedec4e35098174ea116
SHA184ca6536b0f936823a7f78769cd57432aa8fd3f4
SHA2569f30131eb8d3904a96838e66cce9df66fb2b8eb6bb8b46cdc86f37f28e3d8794
SHA51240a86c74c53b941de302b635373ac32344475e2be89a6c540c6222c7248b71a044abb44be95d08d1eb19aea2bea440d0bacf61c7a49b7c8d995a5dd52e4f83b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab2ae3bd853d43a308105d7f7431c494
SHA143a03e9b0595977238b4aaaddd5627993a5dd540
SHA256c6e7be5b2d31950f36d0c8f1ec67f4edc22a6ee3793ebebff230e684d615de8a
SHA512c6ab175ab96fe6222d0e8494cee908da6ffed03893ed20f2226ab966f727f862b4628d007602ae6492dcce5518c1855c6ae32960c49a38054cd3f43644298e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552424719908a96798d00ef6eea723b57
SHA108fe06fb85e6f388cbb6242b07ac2e0f45bbe8ce
SHA2560e1d3885e598c7802ef3e89b31a33ca27d9f53b0a6221eb2f057661666ee8bc9
SHA51218bd0847becfefe221d62f96d07aada23db4fabd398e2e12f80daf18dae8d9bf6ee0e740d1fd77fa631a0e6ae1cfcfc1891057031488b6aa2878627bc145e4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f1f3dae99aaf2270279fd5febf3573
SHA1d9b9db5c82eb257fcb9bb749eb1a16d5ab21e86d
SHA25686e2601146359970cb17eba234b8ecefc7e982c549cf508038230eaca556d1fa
SHA5121ee2751e94d6028eea3f5e9857ef3f1f7e4b882312095255323be32019980c62c574d7b342adbdbccdf4fc8984551d26728fbf6b2169f1d8490e0cce28dd6cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d5d9963dbfaf17ea9a0a6dc75c08b0
SHA17866ef13caf8ef83cf015851626bb2421cb43093
SHA256d11a8f4a249ea0d1aa0895bd956d2b7cc4a6a7178a1270acb47cfe49784092ff
SHA512d3c0d5e3cfd0a850f699d2900aa8a239833f751e21a2504f3cbb77676aea28f04c29ea242d261d1b1fdcaeddbcd7e321a9360485dd402c5bc9d5fb7773631c4c
-
Filesize
428B
MD5e9f5a325546b2a47a3c3d78f19202800
SHA173fb9338c31a1aa9b3b58bb3dff426efa009c8fa
SHA2567995d881d14e4872b89b60075f02eb69725aaf41db4e4e9718918eb467024d38
SHA512b98e02d7b2f0d1742a84eb175aeefc80fd996b6db786cb366b3292792654fad904e8f2eea60c13937aaee450d9585da5dc1da372676d40967527b5e8e6eaea65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IFGNZ1XG\favicon[2].ico
Filesize318B
MD5de86a6f000f8f84e20bc7eb2c7d320e3
SHA135af87deef9e6c081d834d08963ada2530dc0618
SHA2566a5e064af00286681a3ae734e5407a2ea883955d875c5490e597d1ddb8eda021
SHA512e06a8f3101e1cad5bb965a8543fff987a2e22f8ed1fd9aba00c86bb937118f75b280bcfb1c6649f5ec96d6182582aa64a346e7dd7637c0f73a26f79b3a3aee96
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
16KB
MD5ebcd65089f2d8977df9ce9aaab328db7
SHA1aa54bd0b2a9740d67146e9f23edfe0a6e01fb088
SHA256be9d14ae26ae8f9f225648b52d5a49667fffa1af4855ee6f634d4e6e583e019f
SHA51209014860c168c8475b8d6f8ef858fb41b3eeea5794a012eb1e5ffafcf0c11fc99cd80d2f28481d49934dec4926e61fc9d31c7e667008ab54907f10e3916a2efc