Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 12:14
Behavioral task
behavioral1
Sample
IPLook.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
IPLook.exe
Resource
win10v2004-20240508-en
General
-
Target
IPLook.exe
-
Size
207KB
-
MD5
b02f94fff3d9c5df1a63c6289c658ea6
-
SHA1
95473368f1b76bfb7f02e773015ec4f139421b95
-
SHA256
5450f1c037f82cf5adfaf757e48eab1a1c4990b0cf35b95ffc86ac9786fefb71
-
SHA512
ecf61f1377325109c4aefec93994584c3793fcb7a9c575cf4b66462baebc0be0c06451dfac9f5523e3e89db4cb5e76b6a637ea99b53200c35595a920d25db63e
-
SSDEEP
6144:1tgbh+dKizKDf+6DfgeWfXZArL1mKOzayn7:1QwKLf1DfgpfJiL1Kayn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425998038" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000963838403b047b54974437903dbfa0f7736f60df7c03e0cd57d528e9b11d3f0d000000000e800000000200002000000013a53cd4d34e56dd78ec6d08d8db13ffbaf88f6efa9c05d476c04565dd5a858120000000ffdca5a11cfc3b88ea7057ee64df08e6c03ec7439c2af63944a3a96dd1853335400000000c894b08f19e9fdce9c2b75d1f0326c6f56520d7e77a9206a3954ff29b8fadd3185c299aabb09426cbf4308112efd59caa2e7e32cef2062abad9d361c67d11ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608ba6a1b0cbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3BE5941-37A3-11EF-A0E1-D2ACEE0A983D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1768 iexplore.exe 1768 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1768 3056 IPLook.exe 28 PID 3056 wrote to memory of 1768 3056 IPLook.exe 28 PID 3056 wrote to memory of 1768 3056 IPLook.exe 28 PID 3056 wrote to memory of 1768 3056 IPLook.exe 28 PID 1768 wrote to memory of 2908 1768 iexplore.exe 29 PID 1768 wrote to memory of 2908 1768 iexplore.exe 29 PID 1768 wrote to memory of 2908 1768 iexplore.exe 29 PID 1768 wrote to memory of 2908 1768 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\IPLook.exe"C:\Users\Admin\AppData\Local\Temp\IPLook.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.16xia.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea873b0b913e4badcada65a89ebd8bfa
SHA19cb71c27d9a7932a76bf0e820e28a39bd994baeb
SHA2562921a49d1c44260b71ecc7cc6ddd1d35a91131ff67ded486ae723b4ac2563280
SHA512709e934a9e6e911d56d71596ee0dd54f3475b8491e837e9222e18e1de023ccb8194cac4752d5db234b3d3f59d1861094678a44d22991d5cc7092395537d06613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f49a037c759a73739c4575111269b74
SHA1cfb3e2ef97f9e45745c144a885c4048094cd95a6
SHA25638f235a54a92aa3576db034c7c52347ed3c5dd778f53f42df74374abaa6873c5
SHA512e8965e72e4e1cc7c1f19c538f26de9672bd8d33959d620dc81a7eebf76f62af311774320f2dcaa4cb24f76e1d8192676d174b3b612cf2792fb9771bc793ccce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b0bd8a85351326d1bf262f7c5d92b1
SHA1cdb9c700520773466e64b373ed5ce3c27737ed73
SHA256cee2f89e3934d052641875aa35cf9b7bbbc00641f9a858b0986b1c351a587f84
SHA51297b8cff87c24f5780538511450c04c78ccc8bbe3cae7d88847207f3dab5bb87dcefb185dfe96f12ea9841a101f4bc06c7e79a8b1b7da657b00c22a37ed05cc63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e8977b71d24ceec41ca9b9ae103608d
SHA1933f11124a93c36fe76da4435f2e32a166424e5e
SHA25680315035a8f0bcd14f8fa7d777b66af3f3e1c8f376c675dca67790ae40dec4f7
SHA512cc79ea65bab6f45a5ffbcb45b1da0fa0bd8f270654bf267e76ffd719cc69af1c256b9c1d473fa3cc829b1ec022da8965c40bb6a3992ed302debd98037c874e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a028513cf0fac4eae18d8099f2d263f
SHA1ec5b6bff72c74c0f103506fa5e7eb1a929135311
SHA2567d4e5a707da5a0e8015c25cba85261209eec8b7fdc033b2ed0de1f86be34bb1f
SHA512e1ac4740276ada7d5ad5db0c395ec33b1de15f970acdfa167a08c5e0b8e65a87a8fe0f8e5f99357ca8ea4ea1170fc7d23823623168a39b4a5053f22bc334d491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095d40203a75074f3c806f31239c30fe
SHA104c6a44f764fdeb153eea9f703676600636247db
SHA256139221abd38c399e08380b7b77752b94858cb2aa9995e1f57d2080ad6c3d9889
SHA5124c3e7b660a8adb9ab1780ef6d7af778bf98c6cd235b0d8c416e7ccb1bea2f0fc3c0f40785ed778f0622e4054351ac412a3264269050bc0abcb2e2fd982074a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78208f816eb3894c57e0f739f02748c
SHA1f2805b0ef9f0c53f662bbadec3252a632bf7e3b0
SHA25675e6a82b1b7fa0cf62b760bf7db424f86881db2e582a5c63d9f563405c41855f
SHA512adcb775440aff05358f626b5cefee4a41eb604ff0f235a55011ff473101573dfdf4ee43d3000021d7e02b5eb1e1e82504180e9a27eb1860e7e699b10c102b48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eab5e70cbcfe76a96e4de3d0ec3b53c
SHA11aa7ea9c77504d53301b69485a1f3910056af325
SHA2562359854451336808b144688ea558a91e36cb9c3fbc1d65b237b9106f4f2b3097
SHA5125d835ef66ba7ecadb4254eef43d9b2dbbe13e79e5da1485b2f5cfb99bf3934e688ecdc341556a822359ef6db7b3c842d3fe9ecff0ebf7c0b43d86f41ee78c81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fdd48366838725dfa9dbdcd030a8b13
SHA18d09d120128941c0396e442b4914a1b99bed733f
SHA256d837d7f61164121c5b5fdb9bcd9b4e287d2ca76cdb21273114199b805ba7aa69
SHA512c324f5fc9bcc54a846443b7d32904bdfdb0a8ec484f8eea045c3f5ce90e7a314ae0aa25d3f51b1e9c1cd530496d3ba6cf5ad686614ab03268d24a931869f3f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eecb0550891bf7b558cf707cb18494d
SHA1495fc925f0386b7ab7fd525eaf45917ccc04648d
SHA256a1b280ae4bfebfb0b21e822c673968d467f4548f738c37e4f8c69105f75991f5
SHA5120677690875ca1b5a191073178485a82d8c200e26420dbd05127103d6ed92a62535ef959e52cf23cfa6dcbed4ee3c63078a3ea1881bf1a57f1e5974813d79f90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f294a1208c9b20ce0d5651451eb7773
SHA148d0f57d53d2d2696e31e58158dda0b53378712c
SHA256b691ade79d52d45448c518b1f9087e1c4706f62d1580580b245ca0a173f3bf63
SHA51204498cd45f26c992e16c3957f933bfbf072715df6f411d552ed765f5d15e9019eca52507de49bdc9d3240ac833045ba25834d772d149017413b23f110bb9a61f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b