Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 11:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1235844300894507029/1238446322801967144/XRecorder_Edited_10052024_130131.mp4?ex=663f5084&is=663dff04&hm=a5e6e876b410ee15dcdc5a216ad2b82c2e9f3ce6e3d435460fd475c2f35f1417&
Resource
win7-20231129-en
General
-
Target
https://cdn.discordapp.com/attachments/1235844300894507029/1238446322801967144/XRecorder_Edited_10052024_130131.mp4?ex=663f5084&is=663dff04&hm=a5e6e876b410ee15dcdc5a216ad2b82c2e9f3ce6e3d435460fd475c2f35f1417&
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = a03079eac9a2da01 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{261DDD91-0EBD-11EF-888E-CA4C2FB69A12} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1756 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1756 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1756 vlc.exe Token: SeIncBasePriorityPrivilege 1756 vlc.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe 1756 vlc.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1756 vlc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1116 1628 iexplore.exe 28 PID 1628 wrote to memory of 1116 1628 iexplore.exe 28 PID 1628 wrote to memory of 1116 1628 iexplore.exe 28 PID 1628 wrote to memory of 1116 1628 iexplore.exe 28 PID 1628 wrote to memory of 1756 1628 iexplore.exe 30 PID 1628 wrote to memory of 1756 1628 iexplore.exe 30 PID 1628 wrote to memory of 1756 1628 iexplore.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/1235844300894507029/1238446322801967144/XRecorder_Edited_10052024_130131.mp4?ex=663f5084&is=663dff04&hm=a5e6e876b410ee15dcdc5a216ad2b82c2e9f3ce6e3d435460fd475c2f35f1417&1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\32785XDE\XRecorder_Edited_10052024_130131.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e978b6a137d863b6f9599c80522fcf2
SHA1c6098e760867367c8a9e1f989e739eb0cb10e6a5
SHA256fa7d9e49ea1e0ca875a25c65181feb1117285e2c4357c128ff519e418b90f8af
SHA51282f75c6ce882d870918b9c7c346bff695a22c56bed2b3feb45f8156c6796f6dde0be29a3ae2061bb2ba13a2d005852ab50ae49840e5e469a66a99d80cb83f086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53846458453b31466f3376073a0bcf21a
SHA133f3f2592a52a0860e66711bb7176ccd044fc4e8
SHA25615e611c69f0ada65891c40edc6abe8180f9557c169fa9dd3d33ee9bd580da974
SHA512e1f1c27ebc665a33b5ea7d4fad9cb71ff8372ac081d3b7b579d3367421af1c738d83011c57a3109eb547ac255f2874d37b6a351609c2601ba5858b92170639b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56297e803992f84ec12585a90c382d24c
SHA122f1f1de2e1ce1db8a168c5974907070e379a3d7
SHA25686f38bc90ec8a707e5350b29ef3ce7712eabc395fdf8d30ef9da6871eb4bdd0b
SHA5127e20e5f0708492b577df9670f484bc13c518bb9d42b5fe8cdb651eb3278b729000a8ed7c62e97dc05207130eb3917708a86b63877f3dcea3ae8b61b4ae104f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c436d210963dce03ade630b53977a7fb
SHA18146de067b2d5cbd37484d3e75afc45a80d35482
SHA256f497630acb06ad950216f826552c16a512668ffb8bc0225e67af13bb9229eff2
SHA512aff1b81bf9761d4ee73e8c8450b9752a0b0ce4bd1f18b481143fa986f1236879d06c761f7e743537c7a8c4b5e351b5845316dd133f8a616e06df0f9a04cc0048
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6RMN5Y7M\XRecorder_Edited_10052024_130131[1].mp4
Filesize215KB
MD5a3c17b86926e061fbb70f4972aca1a26
SHA186261bd7ca748ecf5aaff490262b43a8127c451d
SHA2566cf8b55e3acc4504b6af7529a3da1a691f0d7984668ca4773eb6a3ffe1d3837c
SHA5126f4052cf47e9dcb7245ded2a05895565d48126f3ce4225926fb9025161c1dd75bfd780049165765f455c445e66a242afbde1090e11c9a9fb3a1735398ca08b90
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a