Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2023, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
identifier.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
identifier.html
Resource
win10v2004-20230220-en
General
-
Target
identifier.html
-
Size
156KB
-
MD5
644dbdc5626b9af503a22f789957ea69
-
SHA1
25da6d1715d11d3bbbf1424c8a51df3428674ee4
-
SHA256
6351f42a07466644eb2d4866cfadb220817746077f063badbc2fe254db5a1587
-
SHA512
e985a9b6c26294b3841f89e8c65f850a127e425da2b00eefbf89002e6d56aa054d0b755b8d77997f60d66f07397784ab3036e5d80f49493dd6ee1e542de50772
-
SSDEEP
3072:6fqdUPcDlmZmPyf//JgYFkfKZGEwj64YrCi:6fkULZmKX/ZKfP6HX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "390715342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D9FF781-F142-11ED-A320-F2A4F945A9C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c0000000002000000000010660000000100002000000071a31af7b3717aa9fe5cfde517ae2e9e3657f1cb5bc6d79d1a13d3f352209cf6000000000e80000000020000200000002c3f49205c0d74a9e73c975bfe272e56b8f6fd6598788a34cef0aff5c58aeef1200000009a1f94ad3675c0b4c4aa683bcacb378194bff861f1dc8df9663377a91b5b689440000000ef07e77d6b2576c317ce59fae3cc76cac2197ce19e42341c31e2b29b1fa6eeec63d8e336ebbc9bfd68ff5cd5a43d27eb3c08edf98618f2a393cb284fd1fd2a28 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502748684f85d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1688 1972 iexplore.exe 28 PID 1972 wrote to memory of 1688 1972 iexplore.exe 28 PID 1972 wrote to memory of 1688 1972 iexplore.exe 28 PID 1972 wrote to memory of 1688 1972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\identifier.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f118eb515877b5f6447f1760085ef23c
SHA1fc5b6ccfbe20518f61616064cd8f30f211ef5900
SHA25654d79206b5e4f7e96cb6eb5815878f1d053826a09690fd104d7d353e15de8800
SHA512ba3e30fb64306567da43195d0558d76188da6d98df1542102c216a1e3d0b13fdff4b823577eb7bc633d4177fa666ea07594d059cdc3cf6065b5f86a48d8c5ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59260bc3d47ef051fbffa72d9f3b48565
SHA1671de0548174448cc81911ebf9e4e0db1260e837
SHA256b820ce6b26bf8972fc2eae696507310c91b501093e85a47474f17b83c3d2bad0
SHA512f34d9c382fec06e30d0db691d3835d5d8faa7b1125d1b8c9663d34beef5475af9cf3cf76e30824595fca10110c005738abead3f096f2530dbb76b1ca9a8d004a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc1e699b5b43fe44614998b32856d99b
SHA137d01288eab34e04b9ffd682bbf057db0dce213e
SHA256a33a5181b1befef24931243e425bb8a083b37886f54d557f7e869ef48ad6f237
SHA5125c35c4a1c705cf9eb230e198aa3e7a1096affd93d2fa83dc9651894472c154bb0e081827b894a52a418dd3eb7fc257dad1b5d47bfc814731c6b1fa7e3acf9095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bbacf71e7af85fc7fd8305ab539cb8c8
SHA15cc0d8d8ba665b947a83978dffb5238adf28d61a
SHA2561b3841cfb15f144b4845e32df5c437ce41d4b1eb35d1dc89306ba3025d92230b
SHA5124080c15b6185e38e5d1ce07828e0524682f43c7f1cfeafb0d31abe3c3b1f730d552c3bfde7babe516c16feb864aa816f3042f2b4e778bdcbad83490bff249db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6cfb7e1ab32e11d6cdc2ac1196c3102
SHA1796bf825461e9efa72eeb36d0ed1ad76aa9f19b1
SHA2563a276e419da7821f93e65175b85f22f6f4ab0b0cabe0da105349bf963735c6d3
SHA5126bff20f0d3fa81e63d04b156249e2ee6a24763cff0a89e636d817122abce505cf0da13935714e8d735ddd07ca9b3e9c8a0690cdcb5165a1f91a808692c92e154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5872ffe94fd8d1d8abb8eb0e9a3170f03
SHA12fa21a2cd6e1c6ac40ef0dbc90dfb154111267e7
SHA2561cb71d96868faa98a95c692442a84eee0baaf7830cb22ac9c8a9d48c225ddd4c
SHA512b26508cf992b7ec8beab05b5e803dedc155efb81ad6b0ef80dc38f0ddc22479956db2ce4e2e29e07c4ae6c6b96c601035f9cbd50f5eef8a4cdc1ffa29aaf3228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5872ffe94fd8d1d8abb8eb0e9a3170f03
SHA12fa21a2cd6e1c6ac40ef0dbc90dfb154111267e7
SHA2561cb71d96868faa98a95c692442a84eee0baaf7830cb22ac9c8a9d48c225ddd4c
SHA512b26508cf992b7ec8beab05b5e803dedc155efb81ad6b0ef80dc38f0ddc22479956db2ce4e2e29e07c4ae6c6b96c601035f9cbd50f5eef8a4cdc1ffa29aaf3228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54017da2386290c74cf37ddde0ec6d337
SHA183ad20fed28edb229e1c53c2ece31bfd252f31e5
SHA256483328f128745b3478583ad558d3d4439ed310e82e0600cf3e03819b20f687ac
SHA51247d13126d2e9e9f18a90bcf76ccb3e1d895e83be3ca5e52c0deeadf9fa4866affed262785c12cd24b86094cc3f93a3d9a4462aa4596edd4adb33c2340ab6831b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e10adfc1a149a41fd0fd94d75eeb9f02
SHA1cb9a09a58603f010e0ac3a39900a022f423cc0b6
SHA256673998fedfb72cf76c970b72cf53435c3a64d51dd95b54e30f5593022f07e524
SHA512b3642c562b002871bed05dc7645445d7f323d95e643782d1384d8b625480c87b0a61c1343612b215af248dd9c8ca3ba7e679c4bdc8783117b7007eae9963af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2088d83ce4ac128438d7330088b17d0
SHA179980d4b461b3e06a9c9e422ea8e9e6639e21d87
SHA256e864276f0ab1cadc499e941aacaf84a42c0b98fa6515f9d83eab432f5c8fa21a
SHA51261ac3d4b7f45e8abb116c01342dbd40c47a5d0db6d20ac05bab982ef4955db71f30b4544dcd2da445ce2e1362957df69775a1c3b64a751f44f27891e3cb42c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD584e1c5f1b8cd13d08dae91689f690916
SHA1edc202969b267da3596c32ef4f7cd0076dc64ddc
SHA2568e709fea8145ed211b2ad662ced9d5fcee3de46987084486a0d2ca53c0018c76
SHA51221bf24f0758975959c4eab09b1090d2cecb65531373571cce3301ad71fa4982e9d764d000ae4a9933bdeb3616e2821db0f7f7e404986ad4f31cc03e1a9c77608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5e0610f616ccafc6e91bd6b4eb752d214
SHA10f50a86ce593eec73e25fbf503bf6aa1836dc7cb
SHA256bf321102718d8619ac0784ef71fdb5fe1fab2c198935f9b2639af623c21e4fa6
SHA5124a4386689f53e3e9b882b3c89a935ebbd3f578349bb37cc715634b606338f1b1f6ab2b78225621b3818aa715d6bd59fd2fdc640f5ec189321b380a44ac3c9f64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BJWXLGAS\bscframe[1].htm
Filesize15B
MD5fe364450e1391215f596d043488f989f
SHA1d1848aa7b5cfd853609db178070771ad67d351e9
SHA256c77e5168dffda66b8dc13f1425b4d3630a6656a3e5acf707f4393277ba3c8b5e
SHA5122b11cd287b8fae7a046f160bee092e22c6db19d38b17888aed6f98f5c3e936a46766fb1e947ecc0cc5964548474b7866eb60a71587a04f1af8f816df8afa221e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T22XS5WA\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
607B
MD5c6ebf64f3565935e805ea58c5df5c73f
SHA12c701dc904a501df193b5b1568945f425dc5d982
SHA25653988c5d93f99ec3a369395efcd905771f6fda17a2f1d8915e514d576dbdcd0c
SHA51220c3bcd330d1a457dee85a5f6528477f7bf46d809a53537fe715d162fe3b61825c1d8f357e4253516a869992742fd79d735d18cb6b4dc8a357d82bf2cb10024b