Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
uofaDocTypes.xml
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
uofaDocTypes.xml
Resource
win10v2004-20240426-en
General
-
Target
uofaDocTypes.xml
-
Size
1KB
-
MD5
65a9bed80df6e776664386c10efcfb55
-
SHA1
d270c550b12e22a821c1f536eb33cb6aeee67d51
-
SHA256
d3a823e659bd2c06be7380f3dbad0039ccb491429d24e82ec95226a4d92b95f5
-
SHA512
683ab3bfad844ec9f01c305eb79f5c7e73d6dd8316eba380ab83fbf0af2979e789f2006925f3fe16a3d3dd7f47dfc64fc4ea2f1456d16a08c53116768ab29c2b
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14DD5301-242D-11EF-88AC-F2AB90EC9A26} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3000 2256 MSOXMLED.EXE 28 PID 2256 wrote to memory of 3000 2256 MSOXMLED.EXE 28 PID 2256 wrote to memory of 3000 2256 MSOXMLED.EXE 28 PID 2256 wrote to memory of 3000 2256 MSOXMLED.EXE 28 PID 3000 wrote to memory of 2424 3000 iexplore.exe 29 PID 3000 wrote to memory of 2424 3000 iexplore.exe 29 PID 3000 wrote to memory of 2424 3000 iexplore.exe 29 PID 3000 wrote to memory of 2424 3000 iexplore.exe 29 PID 2424 wrote to memory of 2676 2424 IEXPLORE.EXE 30 PID 2424 wrote to memory of 2676 2424 IEXPLORE.EXE 30 PID 2424 wrote to memory of 2676 2424 IEXPLORE.EXE 30 PID 2424 wrote to memory of 2676 2424 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\uofaDocTypes.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2f895a384ef9aac3ff4a5c8a8551e1
SHA1b243664d15a6d3770361b2a4bdbd35af3634aa06
SHA256e5d488dc122c5af5e92fcc8a2e3bb8d7254eb45cebe9dea8de2b70fa771602ae
SHA5121c90dc4cab9782655d622aeeb9347c8a9b0d2c8e7434b2fef7625d558a9675f2e7dd3742736b8bcf7ba9e7d9b0d6ad596ddd4fde11eb0e7288c7595c66985526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c29bd385614ddc9bcb26da1d9b51cd3e
SHA12a5d489a2936cfaf1621c89db1e9969dfc755779
SHA256139901e63e661f2fd2c80b3d3dcf3345f6455137b345b7f43b2e61e3f15f74a1
SHA512c43a06fd09d5d186c4e655dee02d011d88e67c962d9bd399e589b0a27c49d50e6ef5ea1df3723f84c8d8f0e8311ae06a7f77633463cdced40c48adc5f529d8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b6b09e52446b478857baf46913dcfc
SHA1b2a6a148e49d6bd9fb51f2edbd2e2ddf2416fb62
SHA256fbef15e2b04da8f30247afaf22acd23560f836e9785b1e0292406d7d64a6adda
SHA512e4201c51f11e283d259bf492b0f95516fd9a1d9e9ed189ce0d2d3812ce9b7ebf02c68c344560a11318ec2dd7eb0abc9b64d2852f159e3d4d27f1493e960e0799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50360c675e70a71941687496487a9bb3e
SHA14d8166922e31701f996900189371bfc762a898d2
SHA256ad585993744c8a855b34b7aa064cea7b504dd2268320acf989a2dd677b7fbd03
SHA512a9ca631ca015485699371d8e4c6ed458feb0f7889373a5020d2e9a065ea5aca296438421b01322a2a95b3723ac48872035d0a5842e31ababbf82005f836e9641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0029005b6e1dc479329aea95678ca10
SHA148432379a7d8aad649993c810eef92f2bdf98c84
SHA256155b9488bf9ef56eba010c9dd5a25e913b6512896d56bfc038242d0a7c582184
SHA5121d23cd266190eb92df9b70d3eb3ab6bbdddac4d340c8b4ca08125ff0bdd0d364317bd6141a56c3ea0c521f43b3214fea20d1b042a1e8d581fe516d624a5740cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43230f1a508e0a16d69d7ca39db8268
SHA10ce293740a8cfe0a7724ede63649cc9b0b72e7e7
SHA256e2834cf1df249f5111442f3f534ea533e2c059eb56e2f00c5719a048b8692ba6
SHA5129b8b932ded1240738cd896644ccb3a931cafdbfa13d8a7ccc0f58d01c6d855085eef095c273fad843f317c6d5cd1075a22981f3ceab5fb7e8465c42efa4a41aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cbebf2844bccc68ee3e8755f6850d4a
SHA1789b4fd5e76a147f829245d83f5dbd919a0494db
SHA2563b5a52b4055ea77470bef005ff1e79ac98fb2ff10df8f1ed6af9cc9242ccfc04
SHA5123caa79b215d0e43adc08d3f4f6d90e448b017e66dccd6768fce83b57519f899f0ede5f489fd1e9dd9534f6b0b15785ee7f462bdd5351d9f6ea61626a2cd59085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81f9deca1bffbb909ac183c20b64493
SHA1864f4174514d8db8d069878170db34a693f83f7f
SHA25630e30a9d7b4c64cf0e07e636dfdb06dc8feb239f88abe7f4d7bad8ac3c6b1dcd
SHA5125f149e560bfab3be313238a30273994894b4002f3ba2f1df6cbe63a6f9c80bbe91992e50e065f45cc297a9f5c3477724e453c38ff5c67c71357a3a3e19e83201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f69f6d33d02fc93a62f6c95c40a840f
SHA1875556b0e0b29a3d3efca9bb2fb71b19329f11cf
SHA256714835c61f60491bd757a998255d3b76f0002920e476783a6b96b78eeb1460dd
SHA5122a2a9b958e60478dc18e7f6c3a4e8abfffef2b1a917a01c549fe8219f42d2ad03330101825702eda1476857da33203ec8580c71679073e6adae1aef287f3b6e4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b