Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
1Beni Oku -...Me.vbe
windows7-x64
1Beni Oku -...Me.vbe
windows10-2004-x64
1Ne ararsan...in.url
windows7-x64
1Ne ararsan...in.url
windows10-2004-x64
1homepage.url
windows7-x64
6homepage.url
windows10-2004-x64
3setup.exe
windows7-x64
8setup.exe
windows10-2004-x64
8setup64.exe
windows7-x64
8setup64.exe
windows10-2004-x64
8vac.chm
windows7-x64
1vac.chm
windows10-2004-x64
1x64/audiorepeater.exe
windows7-x64
1x64/audiorepeater.exe
windows10-2004-x64
1x64/audior...ks.exe
windows7-x64
1x64/audior...ks.exe
windows10-2004-x64
1x64/vcctlpan.exe
windows7-x64
1x64/vcctlpan.exe
windows10-2004-x64
1x64/vrtaucbl.sys
windows7-x64
1x64/vrtaucbl.sys
windows10-2004-x64
1x86/audiorepeater.exe
windows7-x64
1x86/audiorepeater.exe
windows10-2004-x64
1x86/audior...ks.exe
windows7-x64
1x86/audior...ks.exe
windows10-2004-x64
1x86/vcctlpan.exe
windows7-x64
1x86/vcctlpan.exe
windows10-2004-x64
1x86/vrtaucbl.sys
windows7-x64
1x86/vrtaucbl.sys
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
Beni Oku - Read Me.vbe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Beni Oku - Read Me.vbe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Ne ararsanız mevcut tılayın--indirin.url
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Ne ararsanız mevcut tılayın--indirin.url
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
homepage.url
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
homepage.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
setup64.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
setup64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
vac.chm
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
vac.chm
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
x64/audiorepeater.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
x64/audiorepeater.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
x64/audiorepeater_ks.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
x64/audiorepeater_ks.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
x64/vcctlpan.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
x64/vcctlpan.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
x64/vrtaucbl.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
x64/vrtaucbl.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
x86/audiorepeater.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
x86/audiorepeater.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
x86/audiorepeater_ks.exe
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
x86/audiorepeater_ks.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
x86/vcctlpan.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
x86/vcctlpan.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
x86/vrtaucbl.sys
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
x86/vrtaucbl.sys
Resource
win10v2004-20240426-en
General
-
Target
homepage.url
-
Size
68B
-
MD5
f6683aafffcb30ff1dfdd0888e71c828
-
SHA1
08355528191844add18c235956a04f8baa5b1201
-
SHA256
8963abe390e47cc5dc4a2d18fed9e8e457323e401cde87856c80d0f47e0ad5ee
-
SHA512
682e69a3a91d2a1b6cbb2c82cf8dd79b44da92a967c2adbdfab7ab10c1484a82bd20dc613775bc976e94f0eb72f84e1ecaa0822cce6a995b3f624e4d1a38dd8e
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c0934a3ea2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{754ABF51-0E31-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421440973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f981a447e56ca72ab1b90fc9b563cad216366e1cd3fc8a67182653d8130c5204000000000e8000000002000020000000e9a1e6327e3ef96e46689a8dd882313fa8be5ec1d855079cd749695aa9b735da2000000056a07bd8752012c11e991c289e9828796b69b54840116fa1ecb317af75f8ad77400000005654aa834f32702b8b3302703cb35923d037bcdf96ff8047817abd32377193c9f8764039eedbb74884bcb44e9e7e0460f670a41a8f3382fbb631047fe149f4ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2776 2056 iexplore.exe 29 PID 2056 wrote to memory of 2776 2056 iexplore.exe 29 PID 2056 wrote to memory of 2776 2056 iexplore.exe 29 PID 2056 wrote to memory of 2776 2056 iexplore.exe 29
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\homepage.url1⤵
- Checks whether UAC is enabled
PID:1740
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4f9b846501b03c24d0a986ccdd06531
SHA1644b27ffc8a9fc9a5cb044dd15ed444da3f7da16
SHA256e226ec357ef6f292d7953baaae82ddbe13d4cc72278519c33abf66fd4a6d09d7
SHA5123835333c6c9bac91d1b9305b42b2a6a21550d40eef225398c01dff96cf131a4f6a6b43c185db2244a13d225527546cadf881358ae754460c8c4a11d54704ff9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8c242129a82dd3590db4c70d5daebbd
SHA1cb5bbe760617d91399f86c90fe0daa2456f51c87
SHA25602c9569a111512de3c3e39969bebb1cb3afabc3caef78a8ea8f852b87e88a1a9
SHA512988cc593b8607ab49614f2fcf728fc91e3286c578362fd61953113907d087e9859297602bc28a605b950bd992cfc107865c7a818b8598edd7ae61af5ca8c4b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580e4e5bebb5f10994157ab8753e68ee0
SHA169d5592bdf2463f4229ad2b27a31d812da488e79
SHA2562a1fc2b1710c7c2a646ca49f10f301f7edb9be42974aa02958e08a6f425f84e1
SHA5125ce9089a8a5ffd3368594777c523ed899b74b7eff7458245911b575a1b57e2efbcd7426eba2f287a8b5e3aeeacfaf2392854579ce1fd784f48a87af2e78b9f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d49977ec5363f985f5a840047cf5f50
SHA1200e2a17612205598c7084d95f840cb3ed186fec
SHA2565eba1df720addb52e8238e7b83465f1fc5aa16195fe147a4cdd10d563b8460ff
SHA512a97c0e4c486b1d58c87c6c3077484cbbdc915796d0614a1d75ed584326b75f9875c3cae186ac00a56369bfbb59bc9232049e0615f90d7796c0408584fc0b57c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cef8e3f8bd87ac13bd4d46a3d9482bd
SHA1d5f8d3ccbad4e05dbc66415db4a23a0b67f1cecd
SHA256a426575ada23887b12ad1ac577e29b60a90493f6c41353cf9ad2abdeb9e99cba
SHA5121f00017621072d8bcc78173668a7ca9e7151bc359d1f11c9558acb8556c88d5edca6ccac3cd2ea45897af1d49b2ed27b3b4d95b28f66987c36436429b20a519c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a445223e36da02041f9b53f6e3c1e64
SHA10ec3bcec22ca83030fcee625bddb18a8f5373bc8
SHA256371e1c50c2dd670ae4bbb348a5460092f7f2facb571656d652bc10d3577a4ccb
SHA512b4c4526b2977abf746df8e510b240cb56ee2e890ac1b16a587e3afdb3744fc6e6165619f70b1d25bd69df97b2f3dacfa86958dae8f66f19eda63704b47d46dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb31489d2fa960c5e38264483444e76b
SHA13aae5404c52fe08cac2cf82b2420976f11c470fe
SHA256c19ce04927fb10f8953ef2c29c2f0b93b75a851db952327dcae11c777a167cf1
SHA512ce19c3033d9ab5ae4809f97915a202edc793d83926ba6d8394b8dfb9ea16986e0c9ae6bdeb979128238f71d7dfd5681e4e79f05b1470df2d0b22aa0cf05e810b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcca9a7bf2831c8d28bf35bf7ec1cbfc
SHA1cf86cd0d3832bb55652c63f99e61571b6c6a6423
SHA2566afce9de0c651bb51e28baff192d798bea4a62cc5faf2534d8afa774bdd504a0
SHA512f1070cd6f13dc4e6dcf77bc8e19d0bbf0e549c2dcd29555f8912157a03e1907a03adda648359e95f83386d4e1c2a100ee0cb1269c039609a60cd1a4eae545a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51baffe0914d637ad55f4456e91c7dba8
SHA17bd6ddd110ccdb5846cca05fdb46b825a8108f9f
SHA2568ef0c3e7c6d628a0d6bb4328bb9518fd47e216016908a75ad4dd2733a42fefdd
SHA5123a3c515defb1e2ebc6bcb71ae01876307b11e59a413e5832a1fe7130f3464bf0c3d70f6cc93152448222cd0653a5e8b62cb0226285a2c7c0ebd8b0a513449c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0261e23cdd626168b2ae665447d4afe
SHA1f9300176a21f9b54d8f1ca79ab57b334a9cc391d
SHA256a3f62df112af58c9ade4666c2c3dda21e09920b7464a4cf7bf17f1dcb6360da0
SHA51241aa8c3f1bd91a56640a13ea9403f31bc8d51a14a7b8758df538b61f26db1d6138cc8f305ddf02d53ca92ab4c85716336af46888b39860fa49d5a47734ed23d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57704cc7535cb5f9c2e25617eb97c8743
SHA15c57bfb5f4b87f52282649d9ffe937f6ac908f65
SHA256a1c5fac50999f618105b83e2a1dc5ea7767dcd8952fd240a8861fa5fd38a03ae
SHA512a6526a2c68177986af504bf6c7243d5fb9e5ddac5b832aa61b359ffde378e4bbeaf9553adeb015f017aa292c3151432f6caacc5dded744325168ae528d9124eb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a