Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/05/2023, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
??*** vm_00237202311.htm.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
??*** vm_00237202311.htm.html
Resource
win10v2004-20230220-en
General
-
Target
??*** vm_00237202311.htm.html
-
Size
26KB
-
MD5
9275c87d8ea519d02be83d426f854f4d
-
SHA1
07a755eee91f1819c95cda0417d2b9d5d9341c51
-
SHA256
6a22ca737fea2bd530282d8cc7f6421f1a68daa1c1147fd5e5d2617868e04548
-
SHA512
6e90c00cc77a2a6fd7917d63e781ccc1ff0d19804f327fd5b53592e7bb2ee1669f358c0ce3e03140a612cc4d02ab840a382dacb09fa67c35202737177b31bd2f
-
SSDEEP
768:7BvlcjpLuYAJ0Gn0eoRZqs+6UJKSgpK3szkVkl:Dcj5u2eQt/nsszkVs
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C4C0551-F948-11ED-8572-7E8ED113D2E8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391597391" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0695018558dd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000870a666a60cdf740b71411f8a27f566d000000000200000000001066000000010000200000005a2c1ba22cdb5418744a74247d7a9ddb07c6ac9ac86ebeb9ec2431d36c099112000000000e80000000020000200000002700f1a92a22c24d7b3b6bf30c761cd8aa5452c4bbc62983d01f6a8b8d0bea0f20000000b35245c3597b203e6993768026f0e7d111c742c7f97e0459712d4424181d058f4000000058f6be1027f442dc463ac6bc92675861ce3e9bd5a13d2e2dd43616cc6b9612519e14aec35299b29cc378424185f0228b54eadfbfe04656e57b054df374c3ec82 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 672 1736 iexplore.exe 28 PID 1736 wrote to memory of 672 1736 iexplore.exe 28 PID 1736 wrote to memory of 672 1736 iexplore.exe 28 PID 1736 wrote to memory of 672 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\_____ vm_00237202311.htm.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c798e1161d445cc70d62a2a59de7583
SHA19c3a66c6605963040403a6e7ee40e2e711badac3
SHA2564114b491f55f669ef128f79d36e9cd2c02f3c62e04a1f2fee6ad454a1d58d8cc
SHA5128937a7623d142a8d10b42578bd9caf7f74827fb282e37df70d71d4fbfd34eada09b0841982ba5e3d6fa305a41fa65ab8ffc89da5f11b4deaf8c3ab11832268be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f09cb5e0142c98815ec8ee0c0109d39
SHA18073576e1b3ebadc88bb021bbac9ba8fca89ed94
SHA2566cb53b51b9184b571269294b30be483b9dbd4ee5f8df4ac65445e9e779f7f03a
SHA51282f558e3df5ecaf0e4a10530993da0aa26bb5070d713b1cd4d4562cb779408c04db2c925a227c951f6796408288f91eaa0857991f6f073e909764d975dd3cc8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1142d3d26373b2398a8db48458405fa
SHA153ebffd7b2def0c699ea8381901244d1cafb6792
SHA256932cf5b23f9cce82c723737f59187479f32b50a0f0d53d9b56394d2ee4d8cbce
SHA512593551478d523adfd3f11666f71dd2fb7a564081e16cf300f5d1c98a11a4bff220312ba0f5ae59fb45358072475e6fb3f10445fa1aadfeeb8a7e703653232a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c8dc81b339ac2c48483b85788b5c6fa
SHA12591685afd2d8046085d651d9792bc31ec498529
SHA2560091cd3db98e6d3e82fba0ac9e421d88a613010811c9a96e387e52d745d19a43
SHA51205ef0589479f587e6659d282654fc90549ea1e2800a06ddeb57e7dc96d9f33f981d4b2645378a634418d36ccd343545a60162771c4f32da86a82ecc17ab25ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5390a6697f7a861767bdcd8149aacb20b
SHA127333068061fd196e4cc86b2aae5de9b0c3fc057
SHA25672cad607cf6d6a47fc2a342ff1826e09c21bfe042e91792ce072a18f7127c9f6
SHA512cad07b134085be31f039443f049afa942805e742671d0176f198852c22dc57905c5b5598b9a0b62779c61033ffa43c7b3bc8167a5980bc94cb9ffb02a8c05dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c65079c53c47baca746553ec7125149
SHA1d5c252109f1299a1f4e629ff5605c05a57043443
SHA256baf842c867d99317546ffdd4df4a0b83a111e7eb4fa450fdbe2fa69b8aa1b2a3
SHA512ed2a2d540495ddab95ff4d72bda24b1707cac8645ae6312674955588fa54b9bd769338abdd0bf2ab6e56f7e19981126825b26f06ce2fb3bb06d1b4bef8dc029b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537f66dc96001a75d5456a440ae67030a
SHA1c9a7c5d70108077e7a54766fe9dc5395adf70d15
SHA25632302351d2ac38f2af807504dfb61ca1746007496d33ab12c700223e5bc73f65
SHA512c3eb656ecc12d6b7b8d038f1722893d9a5cdc6ec5d0daea50e1e04a118fc90d674e272ae80ce81ba9fd25ca84700ea34086b8c4cbe757c317a0c82d0a60d2297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ddef1a15da978c247cabc64e052879a
SHA1187fca23c4d84aa46891e6d45af682bbc1cdc381
SHA25609c58fce3d4be360310c6b63508c7ec86b36de527d24a5d826e410ed21d4e330
SHA512ea0084f10ad0afdc044c18fb64beb661fd0ae37fe7ae3ef03f289f7ad9e269c3992fc703faad6ba388d465baf23566d116bb82ae5eb576467a22fa49d200b5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542bd08ddce47142851c1ab50228911f4
SHA1109a8e17cad5889ad59ce83b932b8d6bd1ca70e1
SHA2564472990402c707e53bac0899388fa375bb4de6aba1b68da062f6ff09344758ca
SHA5126063bea9061315475fda2bb776c713308764e749dc840a09c8f12b0a304326b22b8ebdbc38eea6e8c9b70dcf86f221f75402de483708a9d6d26e33e7de6f0a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500fd55ed488ff5f62471126d89e2265d
SHA1809c2c97af954e0b473e8e1974ecbe273ce14510
SHA256e83853751cfeab2854de5db0cf2b26e2fecfc77bae6ee0f73a471d9a6d78dd2a
SHA512abe1b113354bdaa90f6acf032e61a6a541a6adba1807374aee50966fb8bbae0d25f7072ce6153ac3e382a36ee1c788a893d71ad1a9eb7fb4b3f8d17a0f9c3fc6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD5db2ce9864831c24680e9aad3619b09f1
SHA1b27a90f2fbdd1788c35e15eaf6b3d252be6a7371
SHA25625bcb1d4c7b1774a33096e7232a32f0cee1943d4654ffac792dc8d1a0bbf57e2
SHA512f383bd5c6b1d137fe7b272682282d445fe01dc741513c19d94e3969872086498c801d13cf0c552d2dea06b5ab7f2a1f2a89bfb714a76e749cbf3d908a9d258bf