Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
libshishi-0.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
libshishi-0.html
Resource
win10v2004-20240508-en
General
-
Target
libshishi-0.html
-
Size
301B
-
MD5
3ad86757308d2031e59e6d05ed48fea0
-
SHA1
176df81d0b6f24253958fb93f7651a65e5b9fd3b
-
SHA256
4a95ea496ea305b2aa9507e0c180befd7f01d9778af2b2f9817725679743dc49
-
SHA512
3a3e33283e56a74d883513fb414b3c4bbb7835790be2d9de653fbac6b5a393805a8cc6d44d856f50025f94980ff0a88caf2aa9564c4b71744d859e571bc1eb70
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABE0CA91-1832-11EF-A4F7-5A451966104F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422541005" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0385b803facda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000f25f4bd960260dc6e2238826663a92f3dab8acc0432e142920a510f5d2ac1547000000000e800000000200002000000053a98d459421ed540fb07da3a0015bcd13f1b12de26b53e584b4c6a8add1b86d20000000a6ef39c8e7f6c8235d309dc5bf468d54f3a70c15715ae3f5058d9adc6d9c211e400000008ef251e8395f66f959250b264c452c129ce2820f56548095cb646a860f77faac2968347528fcb3da073c9b8ae472781595d985d69f28a21b90b7fb11e76c2713 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2080 2132 iexplore.exe 28 PID 2132 wrote to memory of 2080 2132 iexplore.exe 28 PID 2132 wrote to memory of 2080 2132 iexplore.exe 28 PID 2132 wrote to memory of 2080 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libshishi-0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f57a20a4ee09abb8cf5065b0dc220ed
SHA1eaec3d68963dc42f9fe2c3395c70056938420cbf
SHA25656ec0828b7f03d2903c565649ef4f230f978eb38be6c95a1a3ca63c51505c6a5
SHA512b85736bc86f53f98dc500b9fbfdb10fe888aea4af269f2a2ec6f2a6a052f1a810445acfd6816476bfc8d9ee3ce8ec997924b72e2c7ec90173bbb4c67776c1350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcac9da8418e346c7afffc3cfc6482b0
SHA1faf7f9c297ee461bb15f25387e6863d2e5f4e7ca
SHA256ba5f7fe57e3e0297e5691221bfc6be17c6becc9c18596d8a3b0899189ed7413e
SHA512886cf150be8e21bc047e7b77315792a86a438cfdafe813381a0aa55c409d453649828b1f1bda95324e274ccb4c34cc43da08d3f055f87ff5b4f3f6a7089f3472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4fc4b39452a59cb1b8be2537f88b5e4
SHA1d1cf16e30806f0cc866447b20735a2f2ecdbf946
SHA256f47a1e62b655d0989c4d6e2e951590d9820bc872ca4c46e6e5cf03e2c91ac2c5
SHA512ecd3a69ea67202cf82c56d3c0cb60be4fa344abb3064b65047220f6433b36f9c59acc35fe5b8fabebdb396c0b593da2cd0156bbb711fd18aae00f0b6698cfe9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffccdf5f8978d0fb62591cd869579a9
SHA12072f73e1aa4bc928c2443a65aa4f09a01a68ab9
SHA256daa0cc5a491214a96b6937bc21671eb38025a665186bce9ecc4c40142ad38d80
SHA512dc61247287a9bd623b6ec6597d9b2d5b6d2f8269b90fe21c563750201bb3d55fb06bf913f204a8d9fe1c442d57edcce654eca10d3591039bb315937d6dc2b2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc87e11ef9818959714dbe0d3cdb34d
SHA12c8a7712d6d610e30a9bd27055fddb72295a2dda
SHA256a40977d70d99fb350cab52501abe757fe7b2ffda95bdddd050e6b4628239fd81
SHA512195660e8f748abb53ce850668f505a8ebb7a6f2d2e4e3f22602537ff73d86e7464d3bc7a8348abb9b4bb1d8b310d7a22eef590e2604715bb44cfd515605629f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba84b4b5d92f55440af37b5bb952514
SHA1488e1d47458ea9bbd6e6b2f182ddea09aa538574
SHA256200df9305edc29bc07cf9f6a54eaa537ceae68505be696ae9cc10503968eb91c
SHA5123039d54b561242cfd2d39e411813a7c278a9f39f95e61209da7bdbfe7259a156811d05946e31f3e2c2e59a39fac4aa5fbd18b55ba4f89eb3625b891f32580a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c43fcad650c9c8f668ce197f3b9bde22
SHA17a0b8129c9fff55f538726b5577c56ccba45aefc
SHA2561842adfd8052f90af60fdd1d492ca2f6a49a9013ccfe78ebb3b01ae0d0658065
SHA512d88fb0128e11615561c44abbe8f0ce7fd1d5721107cf660251de3679e58892a820b7163555028b5796783dec47a73e207a917d1f6cc500329fde9a415b0213a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5154ec490dd9db185f657cf37cb868752
SHA10e817c3d7f6bd53776a6aac525979f97ebb18fa9
SHA2560417f1e6fe4d1732666631176d5db1be3cfbec5ef51a1ba173d595940ee05f76
SHA512060c5fb1d03251fa532c7eb4fef03d9f68fd4d0a45b2f1ef6678f546269f7fad2f12210a136271d9d6fb56ff5deb1d0a2fd83353f825f71cb67445c256881241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90dcae30954653565fc26aad09ab4f7
SHA157f5e5102bab2fb9ee98e9c38ee745727068950f
SHA256d3c96b60ca09e58229bc799ffecfd41a68d5a5096a7b2f6eab4f06544ae6762b
SHA512cadbfe7f248e563855ca0fb78e418fff97743fdfd40c4c0a8ad1b79e6fe75e89cfee16786172ec2ba4acf4c7cec07a30843d2697d1aa83fd03f234162338b5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bba3a366d1c5d8293205ffd62a67394
SHA19abc7175c46c42e03d2a34b51e407e31287bb255
SHA25680a678f4b2f6ab04dbff2bdb902313acc5552e3f9a96fabc622e27fd8f7eeff7
SHA5126d0f107afd59f06e00e0928e107a998cf00dd2a5184811b11f26045d4c22a2c27199b0d12c56d3389f7dfc125153b4f2ecd384c2da520566330c0ffaa50f8bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8d272e026e407dd611981a60d1cea8b
SHA10a6b3c8e9d9fb23f462ebe5154190c70b100db32
SHA256b8ee14af1dafcdb13dffea0ab8c099d3e1b60d7e0de2bd7d4885c3fbb1d90d9e
SHA51296bc21b4c45ab60369c672496e4a5854f1d26f743beb7b4b3250f5f269298cd78b3031a572f1c9cb35c79430f1519262d2c913023ab6791ea812fe6ce7b081a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f644494b44252c40d0474cc90c92cd14
SHA1cb9ec836a1a9ee81571d7806212319632a1aef19
SHA2569042be1be9fbc529802bece1342ebcfdc4309cea4b57d509d2b13b126f29b659
SHA5121313085d7eea71a15c2b4dc830a9d06bcd7a1e23d99427e4687458a3d1a323a6d313fde4f60220d4e06b99e1a82e64ceaa9877dc904e8499d50f4884eb874861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e6639ee300f92bf4ac079ab2e0a3ec8
SHA113b09cc762eeefa0f22139a529e95cbaef75f596
SHA256d1ed43e3d00b000cc21e4eb38fb39884131c80b618bff0b55e024d07f9db4954
SHA512542663d0fe4f41bf1a0ccf54891b15d6400d45d9df0853e265e1be821f61f51c51d849f6652d89eb07e4231bf7d0463c51ef4c6a92f2826fd9510055af41b6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e470b3264673f544ab5947f1064c94cf
SHA1b2fe513ffb16e0ca72c8314454f06228a94bab58
SHA256e2a11d9dade6a92b3a9d926410f6cd4802636d2fcd664d75b73370e71efa9735
SHA5129f58ae9946ed5f99a92c5a676217c9e8f16ae62faafe640b56a1477ee66ccfa27b6be3f57b2247a545934e3bb0b436e097f96cb93a77033092ff0a4e31df181e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6977b73e0eb2537f0799676e13760a
SHA19696d5e39cc3dc6aa9c988bf3f3b7207f333b817
SHA256514ab8c8c5604cb5f77612533eb0cd77800f11e1686cf1ad7d7c546333a50cf4
SHA512bad68256af4d9e5b0421cb10f53996f2ee274ab6779a9287ef93dd110ce8ddb67b891183b4a225340a3524d486456b18ea1663370e67d11978f6b990159cdb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d99884900b34bd38cdca26e0289a82b
SHA1de26aaec051e619dc4d323abcb04831a99580000
SHA2564ef67174fc2ab3f5f89b992c32065481ec9f493e26110f7143fa4f014b068581
SHA5123b511d58a3d12aa09c977d9dca19a32f649bc58b04265b9958f2f953a8426007b9c5efee16fc4e6591de6eace51a82befc3b780e57eb4eb9a52dd0220d18d568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f1c7f05d5921ce600ba646d14495eff
SHA1cd44bb1299a313c658a1cc5d73e755e40f3be9db
SHA2567b1fdd741e2ef21ab875fb9ae6459144cacf985431098dd5471308f2f665da51
SHA5121d5596a0c3ee55f14fdfae37a9e3b268468b87bee91391d8536bfd1dc8aa2db0b8c92bd47aff2478a4f216edbd59c1dcdd26768fae7884dcfc42d3da18d51601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53218f02095e0f3dddbc22d49a5c138d2
SHA1bc3bf82ca04e46db882663c19e623470ab2c0935
SHA256afb5c1b549653a9d03792ac0b361188d34ec30a3e93416d6c94d75a5ac5e3798
SHA512be3281572bc53696bd151bf8a89400a6ab4c100063ef31ef33b7987bdedc4b8b8320209d8ad54ef38195a879adb9200a57d4eaea59f34c99e4cf71bbd6e5dd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd46aae9be6df28a4b88eb9444f90e5
SHA1d3c5f919d46a5f9ab4ce4895c74f58f7dfdaee16
SHA256bedb5a5f81e491395033ce7fcf9095e87afa630b09921314cb9953e60fa016fa
SHA512a628909e20b7627b1f197c9251bfc29de0d2ec51eb7d5105433de2b75e377b28d220dc4bdae9260adefa7d4f94f8a10e3fc68f79c24088250f7bf503a8a2ec08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfdeaaadf437d03c9f38c4c34558f75a
SHA1452f2dc60d4ace402f57e140ccb3d06b0a7d0d02
SHA2564bced690d3868fc11bedc921374d55f92dec0ac8935a52416001e878590bc214
SHA51282fbb3663e90fb25f296b7a008accb9528534c26e13142f7a4db178da4f903facfecd1af312f852a4074427b4dfb3af7c906ca8ba1780adb12aa617a594158e7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a