Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
CardDepositControlSvc.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CardDepositControlSvc.html
Resource
win10v2004-20240426-en
General
-
Target
CardDepositControlSvc.html
-
Size
10KB
-
MD5
09b55715fe6d1535c3b7a8cb84833226
-
SHA1
909eeca35abeb1fde704285e85ea1b8ba4f05226
-
SHA256
eb25436ff939dc66e8ccacb95ea6faaa780be64db4c8a8697e27a4155b2e1cda
-
SHA512
e3a6e33c56c0dca057456a612fc2dcad1b3bd4cd89b3af57acd8a00140e4d05b9f74e3f748b509d8e03f27a8dbf57406c7b30780bd065e3627b77570e096261c
-
SSDEEP
192:oSFNVM9OAOUdDs4JAR+Zl+Rt+Tl+y+vl+w+fl+Le+9l+S+tl+V3+jl+BDs+zl+k6:6wul8cl/olt0lHWlPGlAUleAMlRulN0y
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dc61d0af811fef4baea79c05ce837a6f00000000020000000000106600000001000020000000a14890690027691feb0b5ead90d3bf93450f944c3003e9132c365d25123d6af9000000000e80000000020000200000003621c01b5b56152367aeb4564c5d825b71d7cbb19957aa585479135acf09da4a900000005bcb1d752de9eeaae6f9cd8eec6114f21dfef944adc28be30b805e35a433dcfffd3bf50b9fc0520502a36e160d72d763bef867348e06dd0ce4483d173ac791fbb3311f4b19c17ec6e6fc3c7d573acf7a1420341aabf9805c722b2f39009329b5aaf2287c5f4740890a36fb8cf3dda0fdc44220bb5135e1cd837e50b7d737c9afb65e7df034f0b081f2f56fbfdfaeb61340000000b166f5448261148562df76a335d8532b9c10f24f05fa0e069cb8768ed83e9b49b564216ce9a6ecfb1d093a105d32337200ef2b91132f8803e9ebeedb2e7dd7b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422802140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c87b809faeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABE677D1-1A92-11EF-AB41-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dc61d0af811fef4baea79c05ce837a6f00000000020000000000106600000001000020000000e284d54fd9a65ff37f39d4d070b07d9fe2d4dca567f23a5d9b60183471e37f2d000000000e80000000020000200000008dc7a53db105856877e178015fb7ee68a44731752ee26b7f84ecb9bc608e58aa2000000083261dbbed4f324a9f6682d695e74a43e4c49a72f3ca1f67cd3add3348a0c055400000008cdc407660510169f7b99f14281312ad4af916a49df9198c4d1097c192c8a79773950ce5dc215a6d8f6f6b59f24125b9f7e8caea9a87193dd443411273a69e0c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1664 2240 iexplore.exe 28 PID 2240 wrote to memory of 1664 2240 iexplore.exe 28 PID 2240 wrote to memory of 1664 2240 iexplore.exe 28 PID 2240 wrote to memory of 1664 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CardDepositControlSvc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5659141b186f8324728d3096c81b83837
SHA1c17097c7c04b2753b4a6845d9d592e9489c63774
SHA2562a427254ba6ed673d2bb0e6a4db847b7c2db7d9a6a996b9bd65fca3de2455040
SHA5128eaf75cee51c6c26b3a1b14a578d86f4e3329d9ab2550adf2f8aadecd2835654757828a15037ff50d8bf8b3241445bac37c3feede3621531abdc10f59dde157c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c802d37a889c37f6ebc54b7554775ab
SHA1e0d7c9ea9c7070423bb64245cad5a95592463cf7
SHA256d944578bbe0c3503ea062aafd12e72544c4d3c7b5192861aee315af50ceb77dd
SHA512376b89c0cd52c50400f5dd60af1eb31643313ac94b505e797cdbfeb1ad46e4814b99c15b1b1f47c828f752ebe11ce952f06d3078420c39315575540be3bee88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ad288afdd43a8489afc2abef18728d
SHA108b7f9a9bb0d4af20c45c09584859f8cfdd1e5a8
SHA256a572fa2dce89e0568c97b0d45eb1be9b21fdec3319da7bd9776299eed10db08a
SHA5129a483b7d1778efec2b0a07b2fc095bc45b620cb46759098e09ccf29304fd600519456b3f4e6ac69bf34a30ae3d7f9a9f5a8ca44d11b3ba3c90f290556c3f7a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e65a01e9ae985772baaf4a11895cdbae
SHA18b64c09eded0e57b4db1cf64c0c7bdf17ee292e0
SHA256780a2533e54d29231933e669b33aa1453e156864002390d8fa24a69990abe888
SHA512f8d2338b5c6ff2ab7a63813638a1368ef00227e130d85397d9c340d201623256215f2f8ae951c4f802d876e7413f7e18baba647525dbeb75e1a99ced84178567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bda8743d8be0eee9883e5288e694ef5
SHA1ddbc300797bab13b74fd3953cd3c2216406812f8
SHA256594c225693e91579cfcaa9fdcd6e0adacfb944cd1d3ff344800f1f610504b8cb
SHA5126758be92e994ed69f89c4c277d83b2c1e4571cefdeba901e0ff2bc24024b1322970dd159911bfc13d4c07556bac9e0674197249999e9d58aaf425685ece23e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a223b53c30097bc46f48709c11c4f471
SHA19116e0926b58aa166fa42374c4f91562273ef392
SHA256e566d0d99a0f5f9dd9444af9d97e9d2d4ad48189528a76c1329edd17341d92f0
SHA5122ad64a51501dffc4f4062e8b3b5dcab22c14d78d7cb8f7c8466c7c49ae031687869f6651c760b4b8a72ef6aa9060baadfa12c41f574ee68342258c0d1a0ebd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dddebeac93eff30aee609732c3487cab
SHA1fa8c72b8edafc7850f215ad3277b62c7611c7803
SHA256db5ca445d409a78d3094e1ff3a45765847ebf56661c38689cceeddbbc7b82a5c
SHA5123b4796bb311b9962610031e72f8447229a3a4931cf04e658452173c0c87e6dd2b15d7038178bbe6a1e3a137c0f9047b4c3374dbeaae50ae2f0dc21fee44059c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543b4d73f8271b288d61b7b5c7f06d889
SHA11cb047bb47a9dfd72bef31923d5150d416203bac
SHA2560c0411cb22dd33547e77c9c48d1d8b49d4ab65697d578c2e53056aafcf828123
SHA5120a26ec893a699847c3c8d4e85f55966531704be3b136169f02b8bd0b4b89b178e584f526aa95ef7cf22a4c362daa795091785b7095d673d913ef6c93bc24887b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e78683d1e84c97e06c1d7a8027c19749
SHA10fb0ad6f262fd81b202a4cae1695cb12f3d88f5e
SHA25673e173ce258ad3cdbea43be2ae36e6d8dd18bc4665ea442f56215e2ba6b15255
SHA5120cc8b7df06e8bc433fbbb279c8fef2f869458187ed12ac637db6fd3ee674527fe5abc7f18cdece271f5f60004e4f821aef8292c72f303138c7c4aaf47fbb6e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffd85cb5957c8ae50f6cf114e01c61e9
SHA10263c66bcdd6b365d636ab1856b73a1d325be2d3
SHA2561c49065439254611d50be082e522142f5374ac6e02b4e69fd3cf2c19b6879b8b
SHA5129f491d53433787b62c573429d050cb1a9bd87e88d99a3a04ef70b916a4d942efcad7392ad0f09bafe684b6522ec6b2012386e3aa8183f6ff5df0b101f7510bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51509d0dca978084c8723e29f62cf5d40
SHA1db88cd377ed383675af6e7d35b93c2b935623cb4
SHA2561729a2e3e95f6f974c60880778602f7d552d65b43e5ff8c60044ecf51a3453a8
SHA512340ab76a408e3680c99ef1b98754318e5567889a14fd5f20f95fb59da0c5be452cd89450afa958e0ec2cab101d7fe10c2807265f30b490a126dca41dae30c4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5386f154850e4518926e71ae21fc2e4fb
SHA163ca092e858b1f275008bf148e625dc3886ef9b8
SHA256529f5c7b4ec6e47b5a116c54c294799078c60dddc00b72b1beae7c3910dbed4c
SHA512d8730f54ba461b7b17e1ce03c70d33956cf765ea9f17aa03149ec4b402f9fcf49646cc58d87cf18d525867dbfc66253c9c7353213d7d94c4392d4a028d043a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0aa16ad9dce50b3f368b3afcf19cdb9
SHA181cb424ea0430ca7da07323e85ea52d5b21b69a7
SHA2560877fc642d61976ae25dae791187a0ca069d0e9dd8b0fa99d0a5e68c30e596a4
SHA512b2603aa8d395ce681f837bdd4c450ddc597fb79a07da258031ff58b1ad2fa91314d251c40d75a21a9a86a8940360d7c2f57b60f521756488073dacecceb0daac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512720a21d68cd929b3d787df0142059a
SHA1a2e110b08e2066031f45dc0b70917aa9768df181
SHA256f81cb8cffe31473d777f4bb0cff4be7033157e3378c7ac900269246bde237cf2
SHA5120780e577596e37db3556d00b07beea095fe94c376b0e1793a0afacb7a2a2fbf4475ed5a8b8ebfb028655f1eb8a049d8e22279c39b7d0d97d8b1dadb47ddf4e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fa18e023562ed8dd054530baff1f532
SHA1c02f6c75c95d068016561117576149ebee7e2dfe
SHA2567d9a6bc4948fe8ece91747df2d5bcdc364abcc388e91d53298717437c36fdd54
SHA5123195bf07b6d888c2ad41acfbe1526e4b5fa733ebbc3688300619031c6a2af31c726312225da70bcaf3ad1817c81b9bb88767dedca512bad370383a65d74b09c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f25accdf68eeb1e5405fd31dfc543e
SHA1131001fc13264ebcd454a0bf4fe260fa8255b724
SHA2566cb8db959bc18ae60703eb94437c11dd481c5fcb5f167b30ed4bc0eb0544782f
SHA5129b2347b21904461428345044c1125d26e3047f2dbd4dcb7b78f8a19a4db1adb2237ec608063abf01fcf328d5874537a99d7723f25e7f0e745b0090774e3724fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df49008034e2388de47fa33f139d7a3
SHA13563c160645e0dad52802bd5e50c98ce61cdb34d
SHA2563b5874a51d88030ddd6d47c84c495aef20b5054d7380032bdeb10b94eeb9ec86
SHA512c4747805421cb35e2dc1611058f347c155707e3c43e268ad584523278021a571dab5793f02798cdb4f4cf7a6817d9748c93db4df3ecaf0caa10f3e2020290f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1038a1b23070cc33a18f1f9109faae0
SHA13caf766e394932989f64ed8409f3942b452d1471
SHA25610b71aff563172340c607e30aaaa70a151be8197f5ca1da5ed09344bbd1c85ae
SHA5128006166283f3fdcac6404dac329473653ef6e05ed318b608ad9adbd6514eaa45419e724dccb70343ddd76444ea920c705495afe3dc305e1c82cd8bf064a0412c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a