Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/04/2023, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
email-html-2.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
email-html-2.html
Resource
win10v2004-20230220-en
General
-
Target
email-html-2.html
-
Size
14KB
-
MD5
92f88f7b9ee3db4d215bfdac75251670
-
SHA1
f2da5bbc59e51845c54c9e2a9a1a34b5e81bcccd
-
SHA256
3503e2ef57f3368d8257a569d668628f257cb668b20875fd10658cb710fd8cee
-
SHA512
58970b9cc5720c6082ab9cd0cf698ae2a6897f0a418b41a6e408faac1c602a28ae35ff322c574a3018979050d9ab041fc2bc6cee4f9f9467a5803d3faf177913
-
SSDEEP
192:R6YkLy3Wy/eL8uetHPMdpt659xVtHP9dlp0ytHP9dQCymyc8bsIpRQDwyVa:E9K1PM169/P9Lp0iP9CCyEW60
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{488E03F1-DA57-11ED-BB76-C22C4A0458E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007837404bb2ac374381d657b4bfd4f9e2000000000200000000001066000000010000200000001e4414a25d9c2fc8a3d3ac3123cfb4b8abc41dd7a7507ff131a60fa74a042f72000000000e8000000002000020000000b114bd306b965383607e75be20b74760ea27a07cf444bc1b23be3c9d27e29a162000000075b4a5c4761f1036fc25b2da4d99521cd9f81f619a0f3f2ae10b26b48696c04a40000000b2a2d2257938f2398c2625b08075b6fa8b07ec4d4632f3cdcfdd7bd5fdc24e98e896904fed8dca269eac2ed19b7403c096882dd2057f24047a256cfcd8025bc3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388195369" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309a9123646ed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1096 1708 iexplore.exe 29 PID 1708 wrote to memory of 1096 1708 iexplore.exe 29 PID 1708 wrote to memory of 1096 1708 iexplore.exe 29 PID 1708 wrote to memory of 1096 1708 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1096
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e1841d4b00c8d6e4a320024c2aa9c1b6
SHA152d47fe099e45484693c8856e93309876d6b3788
SHA25670303a872b940ee804983c29b9f7d21bca993f14625b74cb2a2ad133754138ea
SHA512bef66a46d3421833ed40f003bf49445e15a9b337f50250a011e6af5a4bdc4d18c3f5acbfd433ce5c4ecc901831dae818aba410acd3a9d1b884b5c6e8534f83e0
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD511a360a8dca8ffef1ff13ef85f5abe05
SHA160912f467446e13cfce9d2de315f007d0d992d9b
SHA256f876269564d4be0fc1540cf56e159c2f5c0faa9de6a0e3ca6a41a9b319f57270
SHA51213f13958e09076a7e0e25e4bc0fc079490db3c98d3b9ec082969222e83406977a087f5fed09bbf4ebea1178bbf7942b466c65bcc4da83e2da1f1ae52c9efd2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058b600b8260a61233c7720d5c005743
SHA13c09afce11ffa08e77bcab48043943b71cba93b6
SHA256e3f898a4726bbeee9ed0d332124ea15cee2ebfa97844754b124d69d25d57f832
SHA51226a4fd505b176180e17f5aa1ef0baeb5d3437a5fa802a1fa664b30a644d11cc790538025fab4e6ce9327ea4799c00e6b4efbe62aacb35e7798c5189a62687e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5202bd2141453b853e8aef56c0ccf61
SHA1522ecb9c15d8ca37c70b99ea3d6c03d90be1cbbb
SHA25603f2dc18f764822d306aeaafd72e9718eb2593209ee0e0a704d4e52817d098b9
SHA5126a05098cf4366eef57f16388b0523fa15e384cdb4b4c70e1f756a619a3467846cfcf50948d2484c23912732868f9d2ca480c3cbcd718324fcbb079518e174ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5895c1ddc12ff2b7439983761eb48729b
SHA1925b77d5b4edf02d71006d08aebc327d29a1ea1b
SHA2565d80e9a3b657666db842fb922d9e6658bb41aa76134046198486bb7856c9c18a
SHA5123f71786eb707906a78404883e0a861c4b9a26fc019b5cb00a7e6cf18c178c678588807612cb6976d08e3b6d77518fc59daf01b406b78eaabf44f1149ae562a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1db596e6a6b2a0cdf5db891d2f64c4a
SHA1e13ca8959d88d9bafbf2dd2bc728ce8e8e30c11b
SHA25673ae72d07632a67e35336328dd90048ef6bb5e0065d965d235d938932adb4d46
SHA512fd8e9f25aca2ebcc4214556422954a42c7c6554e0df20699ea41c124071aee1f9fe0e4fdc4b12ea93de176c16518134f4244cec295bb4e731d21946336c597ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ff51eff2d8b4ba04f545c615164c06
SHA1c1b394e25c425366d98d57dc3380245d3d81a5ea
SHA2562328aaa1087b461bbf8f05a4bb28aa22d252d9d6e6a9ba476184e8bc944f7d0a
SHA5125868053c0181ca2c81ab52dc90aaf0586c52f2f69f27101a6d53d05347acb9753957f417009e9d69b684a7a6398d57e9f176c7265813ad78c66758e01ca807ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c841db6fc6245dc905181d9c4703166
SHA1db94a9c36e715973d3981da0360cf8230f5ae50a
SHA256a50f0001518f1db709ce9e88623af23593da8a205a8682a9450187fb20a4817e
SHA512b3f6efa770ab924a43499899fc49d4cfc9db68bd4add3679a88eed1338f28838370853eab2873df324a393764422adc8fd473eb7f627cc126afb4d5f3a2083fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea334f0c6f96ccee9f92a941ec8ae34b
SHA11a966135837611a1e712a19076cd639009f5e868
SHA25694d9b90bf9f7ca84d190f6873bf03e237ea4c4c9dc390acdd0b4891522592399
SHA51257221e838fd6207ced70e79281ca2923d09ca07fa39d0acfbac1e5aca6f89f39f79f2d4d11378da4e72050c00fb709ea52dd8c2c24fe74d6176d88de202abdfc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
599B
MD50eba01aaf1cf72c00fe79b1aa815ff38
SHA1fcb583dfee3535f2e614be00424db78e245b5010
SHA256a40f3eaf155530f8b3f2d5d49a409669b4ab2f8bf4831e27d38c5bf948d06ba4
SHA512fcb9add92392b18ddaa57a02c2ff188dba7396e4c0f7a87c7649d55ca81b003cd7c58246418abfd619dc3ae53e38ec4548cd1407740d979378590fe791a5821d