Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
fabric-installer-1.0.1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fabric-installer-1.0.1.exe
Resource
win10v2004-20240426-en
General
-
Target
fabric-installer-1.0.1.exe
-
Size
449KB
-
MD5
7f0502234a4af4bb9ee0b35ee38b8711
-
SHA1
e708d55f12586a153770bafa4b7fbfa8441b1409
-
SHA256
d90987a8f7a56cd9c09f69585de0ee6241c326f5b41399b2a8319d03fe6ce64e
-
SHA512
4dc60b1c4da89d3f40456ca54665c797816e42fa1e44e9b2873f799ccf2a4f834732b2854e3f8491e1ab1be562e7d7528fef19acb49d072a63a668e7e5468320
-
SSDEEP
6144:nI+0wPnAFavZtK9qEgsdjMpgmo6KlspZpP5OLhmsGpAiXx74syabpA+J:BPnAFSS36lKmPpemsGmiXxVfnJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d590a540b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ad935fa4f0c0074d9816e4d7fbf0baee00000000020000000000106600000001000020000000d510f7c84d895a5539ae301cfe15a5e6b461f6cf707837bca8b5bd45336115a0000000000e8000000002000020000000226c64374b7bb7a69c2857f77d6222b09d51b7bbf54209e30a53cbfa9ef8e3942000000029e76bdb8556e98e391bbc708a38ef14cc6bd7b6ae7e9eb5d80dd57b1e230b3b400000000c52881be6eeeaf2386ecc974c3642709554031750e6aa0ee7d326bf9ad505d7417098f8d84adf39588b291a89f078d791b864daab7ce22e8ef69433c5e3dd27 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0541901-2033-11EF-A596-F62ADD16694A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2232 2356 fabric-installer-1.0.1.exe 28 PID 2356 wrote to memory of 2232 2356 fabric-installer-1.0.1.exe 28 PID 2356 wrote to memory of 2232 2356 fabric-installer-1.0.1.exe 28 PID 2356 wrote to memory of 2232 2356 fabric-installer-1.0.1.exe 28 PID 2232 wrote to memory of 2592 2232 iexplore.exe 30 PID 2232 wrote to memory of 2592 2232 iexplore.exe 30 PID 2232 wrote to memory of 2592 2232 iexplore.exe 30 PID 2232 wrote to memory of 2592 2232 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fabric-installer-1.0.1.exe"C:\Users\Admin\AppData\Local\Temp\fabric-installer-1.0.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://fabricmc.net/wiki/player:tutorials:java:windows2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5565d783b92d8fa5b2bda9ca4d685ab8f
SHA152689e2181baa44e1f9492256bb8361befeadee7
SHA256e2df282fbeeed57028142ccfb87c04dbba3bf771666741a5d9e8065d8c1fcfe3
SHA51294416c1d602e7106ba4183f0718ac393d4843d127aab57632a36e174b95fbbebc69c2e409fdd064a673a3d4a2fe895e45bea9f4f2b4d127db99bf8a978345807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57dfa58641ff22d5773f91026f2d41a9f
SHA1fdd21a48822a5dcb20715e6a30555e05f3077086
SHA256d601badfad4d10c664e407cbaea35483cb16805ca1d7b9375f85e067274fddb3
SHA5125465e9e17315fe42d5fe7d1afefc05c77863a8d2009fe58c8f0615926590c20a9144a79b993a6d3acd3be8fa8c48e5523765e1c34c5029b8c9862d97e83bb6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51aa9c94aefed5f1d5da84b6c93aae698
SHA14df10050ed79fbd03295047fc0a5c89a594ea8e1
SHA2564bc369456c00fdce0d3339f8d6edfec9f1392b1b77e5d34dbcbcb5f039caa636
SHA512bd2b1b3700dd0f44a087196b62a722c694faecfed0b900a19efc874dd5b89654b582aca3a4039cc01bf57d1fbdf7f04f0ae6adc2add48118ab69ab5d6416af32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cfaf85dd9a397a2a5dae79662776f5a0
SHA17a24d6fdfa2d21cfb86e926012fd604460ed0ae9
SHA256622e65fcb24ff246de3d1c84e735be8be9673fd804652624f5811a9d23900a84
SHA512aea0bf1450d718fa9819a7dc35f5f1f2cbe9277ccf37f4e848293904950f7529aaee58168818b7264d7ce9d070ee6f1c169455026d5a5c6df137ab9eaa36de6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5828ca175611609f4bc89b36aed1b4f11
SHA1229ae088848defe86f8ae0b46487b71d20a2e5dc
SHA25657581666c41286bed1b65660cbe463e10cee3ac578ab6766f2f518c007e52028
SHA5126fa0a6ea12cc3dfc5243b1ba015e42a17049c421f3ea595a92b143dd6328bfde8a8044c08c22138634ddc17c58a7a617f345db646e2dad3f467634bf63a727cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5683862f51e326eb9292a3e239f7f9480
SHA1f4632e561b3037a3b5d4ece858264499876c2166
SHA25644ed0ff6ea285333a31baf644f90a89c210a02c3a399b05280898af25a3aac9e
SHA5121142db77dfc3ec598946a5be396d68a8bde417b9ec31faa98c2b4f45ac3b368633f14f34d7e5ab73239f2392a15721f162d8ef65f6a4f191aaad582a9a9ff413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD532e7d837b556939207a83fff3425525e
SHA1a4a2ee3ab23ac2d557b2abac9ec452ec95e151e5
SHA256b913cc8525eacd04e9039c16c7ecbee1b6bbe4caca04070db460ee44b6640972
SHA51249ffeadba108b628a568ffcb8c9ae3e64f36891557ff9b7e533b198ffb76296a37e048e715881339930b60b09ddfe299c9f61dc3342ddecb89de675464b126dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD594118586e8df328b750d53530d947825
SHA1e0d03cb2919bf56541872a0ec55f79d9f4184ed4
SHA2566c5d0f03d31b0e7630e930958a4f5609549629ce177f7d87480ee005fca196e2
SHA5124d5a1ddce9b7267c631386ef03afaa189689cf04abc3e8ba8405e006df6af6f6e13bc81241fea3c6f3e998f740e48a0b201e8a319a7cd8fe25cedc5b7874f4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5709c9f6866b8b96875e610712382a8
SHA1af117db88ffe8fbe39b11b3a051fb38dfc3cdee6
SHA25613cb0b440d55260c65b1473dc459905de7f0030aa74d267251d530410e73ff8d
SHA5128e166477c48dc5fb6a83260fee8f17e0217b18c49a2cd50dd404ed0038863c8394e90fd4928b4031e2e20190f5b25a36459336ac0d9046a12b433daf4a5ee908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5448182ee9b01f26cfe61d623303a3739
SHA1331e74684f1cb8c1af6e120e8f3e10f719e5141a
SHA256702cca0c5470cfe10e03926cbd1faa97a7c450b5638e9872fb0029a11289bf59
SHA512f5b3f7124c8ad6578a75b0339b44d25b3950c5cf7542e3d5d4c11de1b8a680fb934e45a55dfaf4c350fd1954037ef2df2d73351275d1b151806bb7bc4b1d8d3f
-
Filesize
99KB
MD5491ccb9e5d4e164cc96a789b89b5ced4
SHA1bb667912a1b9a781fe548cec6171c0c959c58427
SHA256533af13e1b4e331159a182b7734d160649a3695560de0b63dda431425915684f
SHA5122bf5c1e0602a866fee89a4ff891046648c51316f5a4d287467437a6aa3c8e3eb2b80ad3794512a8dbe709c123750697f8a7b4d2f4881987bd91ee79dc5d87ff1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\favicon[1].ico
Filesize98KB
MD594bed0e172b2d893f1a2e046ed9a9baf
SHA1050d1b4d6752dd973ddb31beca55815e300180b7
SHA256ad44b5a49faee0d955620c627d1710e662893688522e7051dfdae10b42984a27
SHA512515e21806859deee755e617bf1ddb28b363b34e65b4cb6853764e6f53014d405184b6fdf333ae33722d8e7a69b8c93f401c5cacce0e217013237ffa475994fd7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b