Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
tomb_raider_anniversary_plus1-abra.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tomb_raider_anniversary_plus1-abra.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
www.mogelgott.de.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
www.mogelgott.de.url
Resource
win10v2004-20240419-en
General
-
Target
www.mogelgott.de.url
-
Size
136B
-
MD5
0a5f8eea6156e0b7ce43ff0b8f5f022b
-
SHA1
68addaac60ceccbd83ca372c7101d1733056ea25
-
SHA256
23e7b406580e2a38d8bba25617362cfca0a1a94244ecc3ca517931d0ac38cefa
-
SHA512
118739882cd790ff9ce82e746c4620abbecc83edb43fbaa133cd43151084df4b19e41f3e3b3efdbb220b5995deb9891a2e6137bb50bb0582ff8cdec46ba7dd6c
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421049608" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E0AA741-0AA2-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000c9c2424c77a28c80363275416d932d90159b8315befec763a4494cbcfe122937000000000e8000000002000020000000e50131160a6fcfffc0ea84b39cda5c30ebd4dd325e670985bedec9d3dace009e2000000017f91114ecefdecdbe0a66ff631ce89fc4221122ad5a532eda1922096222669c40000000178292aabc178f8c2872aacc4b6c58070a3c337098b34d6d0f67d53acca6cd40893a2a4727563678676bb148062d0f477a92fe18dfef79c7dd79eddc3be643a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bf9e12af9eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 iexplore.exe 2768 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2580 2768 iexplore.exe 29 PID 2768 wrote to memory of 2580 2768 iexplore.exe 29 PID 2768 wrote to memory of 2580 2768 iexplore.exe 29 PID 2768 wrote to memory of 2580 2768 iexplore.exe 29
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\www.mogelgott.de.url1⤵
- Checks whether UAC is enabled
PID:2068
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb2425ef1c495f8d29c395c26fef60ea
SHA1130655b0053f02ba0cead556defc8f9af0643272
SHA256ebc55883406945dd1949a57584a966b7db8d0df7bb05049b51ac9eb88c9b8adc
SHA512bd20be50e891cc2135a9503c12594b807c35fc9f122680b17d4f5dae1dd9f538788cf6b8b17c74175cc9c0d20af83f4e4d241e1c41db5917006a35325a580b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba0effad9a8b289894f105e93fa6fa7b
SHA199247e31467456d259bbdba4b41b9bcace559b40
SHA256d519d0f513dd270bfcc13f443e862a0c71670128d57c7ce731003514e073ef6a
SHA5127d2190e255fe87d9077ac1e0ae50057424f81869576e1bcf68c86da581ccc00fc3da23f70997ad9a1be0e149e09a691c020d9f691cc21d6bca362c8ed764d9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fbe7500db208f6d0653d7fbe9d2f6a6
SHA1560df5e0b2899e8a121b5951c71d704b238e9de0
SHA256409f58df7cc33d98cf872cfcf00c9915759592d2e3f1e84624b14d1a9dcba690
SHA512b744537082f31e17685a2de4047e8c4a2447963cc21bf18eb4ecc3786ea7cfdbf0901b28fe64e717a581adf3675d199e7b181294570c05f34bd004bd5b3be80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee023b4e6e3f34ef2b44094a30e0944
SHA13ed2f4693efec0759f0ba3f5fa672868085ee7c7
SHA25616821beff5d2c0aa50321727d1883b46a97a81ea9dac53ff315bad665b18e923
SHA512097ca9416e882a0d7f46b002433da93d477d8ef00269d662a0050253d9474e32f76b7ae8f550c2a4706a8c456b7953da92111e66cdb977bedc85fc96ce6501f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508335a683e9fb30bf183a4864fb8030b
SHA1f14e0c635b6ae4c5fdd1616aefd721344672962c
SHA2562b8bc389653c4406c6e2a10f982daf7733b8e4c7567cf9e5f00beba9320a5e81
SHA512581a6a704c0a1f8b6e091f833ae847e17776d4a5e62fc3227bcea9ce1bb1d3e00ffe22c67dd1ef2b0e278ecd19aa40be14a20ff5efb98988a99a32f7c836e87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e08b3dd6662fdc47016e4766b890fb
SHA1c2868996c9a587cc80c5a763327636f583c35d9a
SHA256997516a7ab25fa6f85234a49a9890facac54c860ed98b75780067e0d098f7674
SHA51216fd12495fd19bafd25055e76997e629d5bbcc070d3192a8ec242a61f1273322e76561e965c8b77494bb2f615624b89ef97b498381575ba236902c08a6bf94c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff478270abd0d5f8b884287173425cc2
SHA1b92a74a4d94254dc6ea89188c2b4fd9b622ffded
SHA256ffa74a8387e76e88fdaad66308745199110ee789dfa33761f4e893c6a82bf0c9
SHA512e690a5434e1ad220eee93ae5c63abe63dedb16ca5bdd00091e253e039382769e83942ef1eff49d04d8a5a1cd4e5fdaa75be3f986204240071d0c714be9bc7967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ee8bb453501e22257535fb0ffb4dd5
SHA1a10328364cd62fe06c795cac69652d1dacf9efc4
SHA2566a6d1763e69e06be5364cbc488b8e26c92e27c19d250be5874cca5c83c363201
SHA51216c9fe4ec5cccbd5fabc58e7ef6ca9fc20f565492ba087b2d23d3ba361f54d35366032c205c9024bd4d7d54d8b190299e382ca462830bf60c53cb2733ebf8deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6c1e09e7fa6f2047010a9d4e414b080
SHA1d54f2379434cf5ef5e8c685f9e69f5db22540a80
SHA2566e48004ff42d4f1c6462561d9f6ff8f8c5537d60c365f245c6a158ad82f866cb
SHA51286ad97ff9bfba7be7698afd2746a1c449c734f0f295082077df47a3114acd8aef9cdf0a15abd491bed3fac5fb9dfb70e134b39d1649109565664cfe5fd3f9531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552f4c83d537a3c2e24a4a64eaa55c410
SHA1025ab4b44c6925f54b04583ed405b5eaa91669ab
SHA256262d34d230e1b60f14ce25be089713b3231e0adc870b40300c4b631392a44200
SHA512aefa90ad3a8b35b333a4bc4372f7af986fd446242c52d2abab02217171841106ea5c61bd43a561785024d42a4cf068b14459118cacd1f91ae57ece1e89942ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574e7342ad4b6b4c6c1d119621d8541ca
SHA100f7cf902ee86edb998f01d6a32f853dcf9cf25d
SHA256fa0a1acdf1c52b80e5d28970e8a4cad05c72d893b90ff001e8b4b8d16fdc91b5
SHA5127c806e5811f2bdfdda9ac02357fb6a40d5977f7b0b92a033bd53ac8cd3e9205ca5c0c3ee4ae72b48c11283cc016a6039eb5a39d128ef9839465ca182b44ee6e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523936145be6df8dbfcbe9a8c89c3417c
SHA10d8cba9dd96164d545dcfc671d7bbaf218cd19d2
SHA256164b6bd791b3ccf27d0461d1ca1ab2506de14b07b8db00346a4c86a94d683230
SHA512aa5213b6d98f6758f79ce19c888dc48b85a752492899999b8d91ff0b7b34b1964d966c2c4b25fff65f2112536f77d7ecc4a08f2dd75dec4c472ba66c45d025a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f334990a0b78166f4cb59ad2258dd3
SHA184de5c968bd13695be9968573d8585d13031ed54
SHA2561f5ea0c541ad31a6a276d71efe14dec219302a7e24ce6153942f6f26daa20dab
SHA512157579df7377ba01d93beba2891fc7a0ea4fbb267ec6189f7e28fac7ddb5f80c0fd11f450bb9fb73747b399d6ddf5fa4f898067b98bbd50f6abb719ebe0e1682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616aabb2d8587a831c5968c733458ca8
SHA173d70cb37a1fb8806812085ec2c2a892748f832c
SHA2567347691f1bb5b1c983456f368f8da293ffe0cf7cf1fecc0b89fb2e5c30c4efa0
SHA5124b501c92cfc7c6f7e583907afd8757dd8ce8eeaa2a929ba806ee506b9670b0db62fd016ac75012644ec119b79d7296c30a00c5baab29b05753d027506b3fab0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ea3a7f8dd9d5336384b865a817f468d
SHA1162796633d97b6755e455222943b872b2cac0de1
SHA256c4730ba0abe12db921a862180e17a6294ce4b10e9007f07f5b06234de550f1a6
SHA512abba7f91897f8ddec494e8d200f7af89903cd316336a2bc1d9385304c1f27f7cf6f74382a61be3c4684d6c1c23e6b3d1882184c2db88391a62fb11a2c5a34b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cac0d5300249fabb79d8a3c5f5c5016a
SHA1ed2f21b6c5e675cc3857284eac4a5778222ea3f6
SHA25614b29165e326ad27ccc06ccdeda0d7c561951136ee72789be709ca8a3cb19b8f
SHA5125fed27b44b1e9a3057f46a090f56415441f90fbfae21abb589de8b48f3cc1eb7bea6beff3a8d25aecf682efc96d7faccee63189fb5f311803795ca67e04a1a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552c50f85892efe129c8dba090f49ef8b
SHA1cc762d8c646a3022d215806b4f159e0dcc594f6a
SHA2568165db581ef6ea6d35d0f6c36204c674739c5a75f49731baf7df0634ca081836
SHA512cbb9eb2fcf7c3959d420d6fb0b20cf55f05f22dff3f157ee7ab26c1d12bc5f047f9a037956770156e2f74c0b2b74645871bcecd518f27114a5ff20729e85adc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52723878705b061a8e63303f00e4d30ca
SHA130cc2ab8c0d1b5f360fb0d3a0d719e533449cdf6
SHA25607f768c640a52b2da35753fe200eee4ea9037954f35af03d1433f23b06540117
SHA512546b65214392524745d1fded0ee25879391c9761b1588dc009c989615d146dddfad5d519d326d9974c694e600e026cc2e2d7601cea83ed1035c6dc2e7a41921e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573ecc0d752fd195b66728636b91e072e
SHA1196bbcb3a611ed1ec15c3b4772123eda193b1911
SHA256c9090e7a1147d3346fc0dd3d83307ba7d941f79dfbd59f289a6a993c41c4150b
SHA51264c7bf69e4eb08dc980e08f7bfb48615e93902de8444a9f51d550aee110b37981facb18bb62e9ee8ae6ba41ef1b3c848d9d59872188213921ab7bc6919e7264e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a