Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
16/07/2024, 13:29
240716-qrq75axfpa 416/07/2024, 13:28
240716-qqpynsvdlk 116/07/2024, 13:12
240716-qf18ysthlr 10Analysis
-
max time kernel
77s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 13:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http:///
Resource
win7-20240705-en
General
-
Target
http:///
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000003bca32012d30cbcb42ecb98d2004762759c483d0129e740a7efeefe44624d1c0000000000e80000000020000200000002647486298b831c1a0c5e0942b44457ae41d70144d4b455e23a4409b54c38b02200000003ae20308439508caede7d7f962d80fbce85135ee410e8cfed6483fb5c72707d740000000f561429ddd91d699ae00ff6f337191e4247bdb93f6c0719edd1032826b108764a17d808961a09fa49a2b3b302be1bb6172a73d5b49e7b9f2eb3152251df3e624 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b82b1684d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427298363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41A02431-4377-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2208 PING.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2400 iexplore.exe 1236 SndVol.exe 1236 SndVol.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1236 SndVol.exe 1236 SndVol.exe 1236 SndVol.exe 1236 SndVol.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 2400 wrote to memory of 3060 2400 iexplore.exe 30 PID 1628 wrote to memory of 2208 1628 cmd.exe 35 PID 1628 wrote to memory of 2208 1628 cmd.exe 35 PID 1628 wrote to memory of 2208 1628 cmd.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http:///1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\PING.EXEping 8.8.8.82⤵
- Runs ping.exe
PID:2208
-
-
C:\Windows\system32\SndVol.exeSndVol.exe -f 45745300 190151⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f286a4ea2cd6c218532ee89704ee6731
SHA1d14e3813a697c86f38e34aa7ef1fab2f801a3954
SHA2567fae47ad97fe39b6de225b0b48ff52c35fb7488834c34fd686207ad385f50aaa
SHA5127e1cc112b57683129480edcd720426522dbb5a6a1226f609de568e1359f92f520f3466efb873fb7cb5fa65c7bf555ab658652392575ed2c790c0fb3d3523501f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9e9699e30e41c0afe5faf0b46fde3d
SHA12c2614e3b3d79bbb445b3aa22ebc0bec5c4fcda1
SHA256d12fd6babcb4671f0805d98f3612865ac4f2c6b4d5ef51e775b66b69f4b824db
SHA51222930a3ccbee0211f9afec5608f66a8de5daf7536c64abc1f3cd7a4386f6a8d633a24d85b20d5fe3f589b4396c321f12a51fedb72b088724fe18feeafc9a7e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4e93f963dcdd84bfe0aa0bb55aafbb
SHA123d83a4c666ee67758d2bed3e84177ba84d2515c
SHA256b1d8af50f88981f07bcc3addf480e404e473edb5b699b27211f04e32190434dd
SHA51285922001d9b13ed66fe95b976793e42551d778d70facb7d49de50872866580fc65f4a2d814a0c4c24ce64e0bcfc88b9e9cf901469ab7a869059a9f1a64534b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca41c6f9dbee2fa275f4ee45e343e55
SHA1746ed3341f9c2adb12ee4d2d5bc2697db5d1fa56
SHA2565ab6d7f1ccc4ef962d37925c26eed927dac267b02dce9294a6fbc182bc8941eb
SHA5122f24935086c52c1919defd735e2ee868fff4e812f8f0872e551a4fa94cf9173b15fafa6dd643602855df7c5591100690c3aa371c123b79f159a52c8f1a7d5197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc84c94fabbf5a88009c4e9754d4ea8
SHA177e1aee2e308d40e6792df0232bbebf89b7ab435
SHA256494f39bff257f5f8486f436e9773f9c1c522791e83d1fa5f253a72a1078cbe1c
SHA51277c08252eaced94fecc50de7721af49dbc883619bda6a1f83d600e4df969e644a82d76f953a212bd16246dc467d31ebe9fb102c3978b6c8954ee483fab16e574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c9e594e065e50e2bad2a033c0abbbc
SHA19daa98a18f78cdf64e5e089e9610c103f8325fd7
SHA256a7ad9a511def15075fc666796ca2541fbc8b39a86263ed8e00792b00e5245890
SHA512a9340697934728b29de5867e16fd4a20ff3d1da9301529e6a447fbe472f527dd3c66f66a86bcd06a76a5413312a67f50ddb4e333f0faede735138064ecb17045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ecd8234ea7874b49488d2b064a32e81
SHA1d2c6680785feda05e674f7c2188c4d09d9fea571
SHA25646cb7a52cf6cff88fb31c730fb5bedd8e2ea9e241fa9824cf48760243a8b9622
SHA5126dac6f41ab41f4fc60bda2f9c1ca5c89d25c4443e13b35cfabe17adb2fadf43ac386a742ad6d83662a88d143e835b823700790bfba9a49c3ef024f796f41f53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482540b0aad0c58da312cafbbbe317f9
SHA15afb0933eaa98b930b48b5dd1d68a7b71f70307c
SHA256c3d4f51eb5cd6909913fc10a7cac9f2b3dd41868a1f2864877f6bb74235847ee
SHA512aec8f9f201954319a4d7604a801e2b268c7d8b3396f5499d1c90e8ad10642d0d208a5060d9e8e1040c2d03dc7bfc98fbf432523cbaf6b418809287f2475c20d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763722b4ecb16bb136ffb923746cf944
SHA10bb08d359daf6c347de495c7a0fcc61e574764c3
SHA256a98f08aecaab827f7d8989822a09e1a14346cf3f1f3ff8a7b14d5631033073fb
SHA5122673e0d7898d03c4b8abb1aee7683036f20a47d04ca45de81ebb2db9d29b54e3694c44c662d07157040320ee0dc027543e0a8de3d5526ada37816e7074496339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2addab9d24bb05638719f655cb65c2
SHA17e4d294ee2b885f8ffdac9f4dc5e8d5466849f22
SHA25648994c9c246db3412959458fede9019ac2c32baa6ea389b7b83f230951f220ff
SHA512f1a13ebdda891bc646104f95ac73f042a830e068bb4a869acccc02b7f918268fe201980dd2f11d8eb518eb545f9970f6f070cc9522a5e0bf2c9e339f22ab65d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d14da7437a476fb8ee6383415f3b915
SHA1abeb2d755be7e96cbf4c3219c35768d0fd9766e2
SHA256eb00943c9b9f39fa0fbf8095448e5b8f0269a729522982e7e8fb286de9cea689
SHA51272f2effefcaa077d3644496f1e339f1d5872ed17af17d3cbd74b2f79c8973cdbc6eddc6da96e8eaa0c53a2d16777564454fac29fb1a824a15c45933bde41b79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc9cd7673a0c07198c1a86eaf22a3f0
SHA12e75e2e4ee12d31dd27283d92bb4369673de960e
SHA2569c81693e4fd137d468fe4bd9b4e9d8a9037bde68c762cb94847bc5d6757bec32
SHA512ae51e9a79fe0bb0b8412ab06a4cbc11aa4be3d2768bd65c1a58158e6f8740f3d2adf8fb6e74db757ba3495989b4b9aaa8f5f251e8e03e08bd93cc453cdc5802a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570e03eae2e60ca2d8c16d3b6287c434a
SHA14c31bf468025fc33af802c91cdaed828699de1d1
SHA256add13dc818dc8f8d3e6d74d9f8517f855ab24436cb5b78414749e7234209f50e
SHA512c059b238d2b04d63c8212185aaa4b953c52454744a87082a0a68ef9a69701b6502dd391bfe6271118bffb2e31427ce4cc4c4eb5eef59bfb7a6b7e4e92042639f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56f1a9cfc90983208fa76080d174d9c
SHA186ccc1569558a6a02e73e01374c449713e3e0c12
SHA256c83a1debb372bb5954c61fcb482cea75f37124570ceb0b1080960e8f679a6d7b
SHA512f023e5dfd64420504fe72926fd837a437c443308613b440194471887de0d3656c3897ce08d1c7234ace61fe31282d0477bb71efb6edadb9061698bb8f7fd5fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b8070dda05ed1b0da73b02fa31a586
SHA1f2b0c121ef6ecbce4568ed6870340525bcc0925e
SHA256bde026b5eb82592a29291ccc2b7e44d4120d90704e50aec8e8a57bcf7297d712
SHA51290055aa40d27888f495ac558e74ee11f831cf2a5758dd73e458168c1e25457d63ff2382a8f0fcfa8dc328862e945328e02baacb9c1fae0cc5e68e2e3035886dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25880a85590633666886b0a17ef5ce8
SHA157b9c330d83e5c07f874f05f65d31084c9801e4c
SHA25631f42f00c07e38e51f768c7dea9b00c34a62426171429435bce345723aae5bc2
SHA512459e80d91b11327058a57bef8aab3e7793f384559ed2d51f4cc1c8c3ea8bb0439cfc012b089422c459f39c4680c8ed7e7b765a9af3bee6d5dbd39b1d5e31ab5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568da249a674010af9f884cf1cb388b7b
SHA168513299657ff470a3c82ffe229b32c278989050
SHA256afe9dcc1c336db6c0281a040657c496385379e0261970a47ac597ef91a05b0ce
SHA512a30a72958d1ca587b287f62f37513cd2371810ed262e934c7638e60cc07cb5da5265511e70a8488dfc50a2f2dda29aed6e684f603a8abdea1638d59f5f24b1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abdbb4b6ca83a39df28bcbe70ccc6803
SHA1b15c144ee5811a6d4a0b8ff4744715c2b61e42fb
SHA25616c36f62b16606df6722e84faed166894c0f87b5587b547cc0bc27a97e046bc1
SHA512204b9fdcf380ef59bb4b25f8586eb020dd2713296cdb51c49c928ebab2eae8766fca5dc3ac5289623aed2733b0c59996263e09607b4ed560b50d266506b55295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed38a9bd3bcc9076b48cb414b217f0dc
SHA1801fabc5750312909d7320bce08b23c2f95dad54
SHA256b7cb71e4132827cfd1845567a65efac362601487e9df67dd837a3cec234710a1
SHA512ee740584d3bfd78d5c6a20a6d5d29dcdefe0c0a0344d41f0bfec754ed75ff9508c283ce243da735f711338ca00d86bf84ac32ef36b79a4d0770b974505bed1a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b