Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2023, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
adobe-photoshop-2023-0061.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
adobe-photoshop-2023-0061.html
Resource
win10v2004-20230220-en
General
-
Target
adobe-photoshop-2023-0061.html
-
Size
213KB
-
MD5
68eb1001814401cd98d3faed46322de5
-
SHA1
34b56e13aa2de74b1844512ef123f59078c92080
-
SHA256
d21530b907e786a6f3de69d37ce333af99adb82e443bd7613c9924344b51461d
-
SHA512
bc4b52ebc165a059e9fa22f78b7d03676a05cf6bd4736dec4ebc1d18294958c5356e13b9074af92f78ce09d523adaf27dc2a32d281cad2892013ad6c7bb695eb
-
SSDEEP
6144:NQG7m/auA4xi6O+DkZySCAjLCT6AycLxV5KJjUJwGfSuUJ0SIa6UjWU7RPPwDGe8:iGCIZQf8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2654171-0955-11EE-BD11-E6D401764DCF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2016 1992 iexplore.exe 29 PID 1992 wrote to memory of 2016 1992 iexplore.exe 29 PID 1992 wrote to memory of 2016 1992 iexplore.exe 29 PID 1992 wrote to memory of 2016 1992 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\adobe-photoshop-2023-0061.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e2ad65e8150a0b4c3f2ed43cec37886
SHA11f2abe3010836d4e1bec05d43ab1bd662e479129
SHA2567558980557a2dc31a3310bd235c777c69343bd1433719de7e8574e2c4e0a9875
SHA512170335a35ca046d522faaf1bec1963b7453032f96dc53ddbb786346274fab1dfeb35a6c65d909ffe0c300e6a2f51b37f644fcc4174af487be71ae72746bc60d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b1e3f563949decc49ce489ca915b58b
SHA145b4b2156d029eeff5a9e1689729c8170cb555c0
SHA256e39c6eededaf904b9e02b0708eef3503f004570a00496766c4c4b405c2748036
SHA5122528ed93dfb8f7ef3b9af3d4a5c44d1e96db18d22d02a963ca2e63820836510fd4185e88a972a84a68802c04e1af4a60beeff4fa2d613bb63058cacaca8b26ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5babb3a13ffc7dbdd7306c0aa005be546
SHA19a3283073e9f65d8885d93cf96a9abec3d477de0
SHA256d42e2ce3dc89b8a3e859b72292b1fad3d2d487fbe2b2a627573c77bedac76102
SHA512ece87c1c30eb738fdc5f95a8b3102b0c52fe689d7464ebcbd715fd538a97e34e9cc01952b895f3875e3c9b2c13946f6c4deb3955eaef0b20f7bc55c69af5911c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dd080f3d2d7c9b45e3e7a213d0b5953
SHA146ee903251dfcbeed598e0041fd912dbae750a3e
SHA256f741afdeed637a2dc583f3adb30a8f15f47eb4a594b5ac876bc2d121d6cabeef
SHA5124fc4cc4b3b51879025e85777ca2dc17ba593a7455811e8c6c9ce1519666786bea5ef44ad963e2234932a1ca863478af1f43cc3bb74432dbd366fdc02b51bced9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862bb02571eefc9b1e7a2173955abe94
SHA16ae690ffe1d8dc3ea72c7d2f19d6046ad79fcb06
SHA256e0ce7280a90bbbe00dcfc032a2513a80976eb87d8ea1737316d073fe8fc1638f
SHA5127a2f5c0851d15dadd1a247fa1d17978f5ddaec8c05453c2a7cf4e9a6fc1dbb5c4dfe44393d5e32460c2881fc4b8b4ba47735b5464328f25ea0cda77ab0f7d71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517fed136a8416f284a3e56d73f914c20
SHA1aa56ad6926fddfa5a002716b23009c27f0e52b4a
SHA2569febb2b34b3877d5e167dce68c9928f16c66370938e2e2dcf01af658c94a3381
SHA512d6bc7ccb667b342ada46ca05fe3660b87c639d814562387a34ced977d3bdbd53d51c7cb5dad8a02bb20777b84eb32ec640a7a698e4a991c35818f4b798054c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c95670a12fed5eb675217da2a21960
SHA1d58852d84cea3b8f999534ff35f40704c0b10c48
SHA256e2c52b8cf0bfe5ac7452b8ee3db10503aa7ff1c53c5bf881eeb4fd1c5903ed3f
SHA51244c7a75c6fa87eb5ea3957183ce74613b5a8f9502e60e0392f2d635fab41732087fadf91e687e12bd056b15dab1d2fab85298515031f16434ede05b72dd4ff68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564a2a6c321fd5b2313304d8e625ec5f0
SHA1a23bbaf8fa3622d6d9aff3f4ae35373ad49d89ac
SHA2569df8e9f906806d1b62f678f6d76501810f27311e93e797a429892ea2cdbaead7
SHA51257f8f7f398870947cbc0384e4d90c6db3d4cd62449b0a5c77008fdc001c7f30085a962ea794c63a2b5e1b62a1e5d4c827ea78331cff6848abf2e8eeded3db057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56006d793dd225633b8f545d7432f306d
SHA1fd4d7f9c466b62e78545b5847a4de0c46a558d8c
SHA256044098193ee7140c88cc5827d5bc9217514beb949b3d34776b02d133adab1f6e
SHA51237de10c1f9ad562aed6d9333b3294c78ac187cc0cc24dd9655156f7f4641f559caa593d19058cdad85b8ba1d95abc37ac2b625ad68f7721429d062137a28d231
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27