Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3e40cc6f16d...cs.exe
windows7-x64
3e40cc6f16d...cs.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3agents.dll
windows7-x64
3agents.dll
windows10-2004-x64
3atl90.dll
windows7-x64
1atl90.dll
windows10-2004-x64
1audio.dll
windows7-x64
3audio.dll
windows10-2004-x64
3core.dll
windows7-x64
3core.dll
windows10-2004-x64
3defaultUrl...s.html
windows7-x64
1defaultUrl...s.html
windows10-2004-x64
1defaultUrl...s.html
windows7-x64
1defaultUrl...s.html
windows10-2004-x64
1defaultUrl...s.html
windows7-x64
1defaultUrl...s.html
windows10-2004-x64
1defaultUrl..._.html
windows7-x64
1defaultUrl..._.html
windows10-2004-x64
1fileclient.dll
windows7-x64
3fileclient.dll
windows10-2004-x64
3flui.dll
windows7-x64
1flui.dll
windows10-2004-x64
1los.dll
windows7-x64
3los.dll
windows10-2004-x64
3lregistry.dll
windows7-x64
3lregistry.dll
windows10-2004-x64
3lstart.exe
windows7-x64
1lstart.exe
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
e40cc6f16d1e74d9180e98f6a9835090_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e40cc6f16d1e74d9180e98f6a9835090_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
agents.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
agents.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
atl90.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
atl90.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
audio.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
audio.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
core.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
defaultUrl/pcservices.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
defaultUrl/pcservices.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
defaultUrl/teachingres.html
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
defaultUrl/teachingres.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
defaultUrl/teachservices.html
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
defaultUrl/teachservices.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
defaultUrl/teachservices_.html
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
defaultUrl/teachservices_.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
fileclient.dll
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
fileclient.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
flui.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
flui.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
los.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
los.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
lregistry.dll
Resource
win7-20240419-en
Behavioral task
behavioral30
Sample
lregistry.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
lstart.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
lstart.exe
Resource
win10v2004-20240508-en
General
-
Target
defaultUrl/teachservices_.html
-
Size
17KB
-
MD5
a0b6f2fbaf8095f407b0b2530d0524a4
-
SHA1
d2f9ce10a886a7755f8b3ccdac91bdf1a629e48e
-
SHA256
db015f8f3715451c02a5ec385dc95e6297592740e04dfb7505137a8db6174103
-
SHA512
b87e2725c297f9a19fe8e616deadb7352ed638d5cbc3a92a56b58fb11827f75dd2f3e3cc14939fe0856b073fdf66cd53f09c8e417e63858c3e2b2dc8f6db0df6
-
SSDEEP
384:SIo5mZSzhNLoXOLoOCLoBMLokzAPTH+LoZzl5VgQFvpMQFzP2wQFK6SQFEcjQFbv:SnR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d1ea476913a2ce494fa8581ac2b180209a303a1740efe675dd598b9bfb16a5b5000000000e8000000002000020000000817cd0b1c768a343432d9b07d7fa3ccb4a6f236247eb77457f5a589be1591cbd200000001b63dc66379ed0c47a8a3c971a22229dc74704cb7283b4bad8fac857161e12c840000000dc6d54127a47b3dcf7934737644cadb691934921c26abc232032fff27e34fb962e2a684740e396f6831ef3c754815c56101c92fd94aac8bb8621bd4a1c176455 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e010cc1eaaa7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A325321-139D-11EF-8C93-DEECE6B0C1A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422037042" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1920 2536 iexplore.exe 28 PID 2536 wrote to memory of 1920 2536 iexplore.exe 28 PID 2536 wrote to memory of 1920 2536 iexplore.exe 28 PID 2536 wrote to memory of 1920 2536 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\defaultUrl\teachservices_.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4035504ca2b3dfeab56e1784ffb0cdb
SHA10afc8e95fea1e46a3708061e32191d710c96232a
SHA256a645c77acc44d80d517fcfb299314c3790eaf749ac1ad88daf7e6615d89b2b4e
SHA512a052e1c410b23dd1c2cabd95cb119fd14ccbcf71280b1ae397d247925f75f3da88533ef17dfed8efbebd7ed396d4b02e842feff4136ff447965c37e980cfdab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50284d44f604915f139536b2d50ffcdc4
SHA1c8a49d437af6109d1fe96404fc42dc719d126dee
SHA25630d2da8d013f88f2bb366def57800f53ddb3561c71174bee132c10cfd5f0e639
SHA51287a6d747a9792ba9bcf06a8f4f0f256d4bc0898e21ba73102b193f371128ac1ac936e03bfb01536e94b4407308a98728579b0669497c34c4b42a72e3e65d0e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ef696b77b4f7014e5255b462aaaba1
SHA1e1dd598384d0c9c5d44070d381235435ae9776e8
SHA256ed0f3f6ee26e50e8caf820ab9bb066366e4e96137b62d68e31bf617fbb456fa5
SHA5123420ea887892eafaf9a636ef34551ec9f9cbbbbd9359c4e0b01925e0edf8e89eb4e1494725d50a3fd8e51f460067a4be5d9fbcb883ccb163f39c439d5bc84bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0de28937c1f7f175785aa7a263da847
SHA1e150393f6af9bdac3ecb09c16d956f60ce5222ca
SHA256a369d9d8593a7d470d8c1698017d426bbf5309bc810a467c73cafcac47236019
SHA512943500a4634341cbb44a5e95a707f0bec7d709e71b7b365b6dbdc745da25421ba8164d8ca639a141a2f1f018af6aa9b26149150687b37a5ce7482fee95d88205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bcdc70865e387678e276008868d67c4
SHA185b62c6e06f2a2ebd135636c33fbd1f1053ab3ce
SHA256d65b7f37d19c8db44d991352985163ff36fc7893b640a0864a90c627106b5c11
SHA512c4d7efeb7b3976189d45b8376aa9afc763518c8637d6b8952ca97e4713657bc76fffb4f9da6afad904499eab2f73a49cfeec8f1a45c6e3dbae4e2ae887d4d2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcb63c25c8336432626220f6dee6576d
SHA184d56d4971ae5bb75c28f73b7a3029d425fab23f
SHA256961eb238d67a215eec94e2cb82faae0dd942261d4a28bafeed1d038f8d045bb9
SHA51225830562e85bdd9179d4e0986fe58dde310cda722c0db0be5e386591491665f7e59ed843bc2538b962c62db80cd8d705ccaee8ce9222808565c48fd19b928c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5894be426a52701739ab464b0a6cd7369
SHA1642a076e3df7d62d32bf681934c4796b7dddf19b
SHA2565f5e463cfdd8f735f123eaa80fce9d9ad601937622a104a8d507f4217cf4a0a9
SHA5128bf4473a6be23d7866651eaab160ae77d6ea10dcfb860316b671ba02c221d6f340a5e04ebd34d05ed0a088cad53f1ae39da2e5bffe90ef4a2a2e62b49e8e5eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f7244b6c1ab6254adf1e78f3c9c24b
SHA1317e8b74e80778b3507458cada7860d5191eeb4e
SHA256a06a5458604d3bc4ad33424ed518debf0e5eefe835391b315b382f918670143b
SHA51274ef2837cf980ea3952d0e510b5857378cea4b65988797caad958df04a57791d0a12aa7f757da20fe8e1ce6016726900b95431fd010b2ca5f2577857cc97999f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4792a72a349cd3f4a059c514233a57d
SHA11d0a1c2918d8ab94a21dc9d32c4f77386cd45e45
SHA2564ef9ae6144db74cef995b8754ee929782ac8c15ce3c6dd5f9b9e803d751b742d
SHA512a8415e2946563ba26957ff6bdc83e27f182ea7468ff1d288b96cf6c00af958b41c30248af65ac18e6e9352184936db14590a33677743717d0957c37a123bf469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a9f20a3a2da801e10141c0ca6317ef
SHA1b7f35550538b8f113d1586c1770b05f936f2a0a2
SHA2560f57c5f2d37dc931a5ed131925b0c7f111bac78c580b04a27cb299d46c91a3da
SHA5120e4256883315c3376a5b98771127cb1d9a01e1dff3bca45a6779d6af3552a6c847040116c6c35f1b980f67a7aa608113138dc34262debbfb17bbd33567cb4022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5050603d6a57673a5745820404da0087c
SHA1ac8a5ea5de368b5bf8cdce48782391f0b1468e1e
SHA256b37f0e68fcee67ba0887f83e99796d6c871f33c2ac4fb72daa51031ba714ac58
SHA512398d3b382e29313eac685ee4d5f45d469dd61f85d8f18f13c9b32badba3a549b45bca4520a7447e76110462a50ee7d6ad0a15878064d82bb699e1348df37ce4b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a