Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
watch.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
watch.html
Resource
win10v2004-20230220-en
General
-
Target
watch.html
-
Size
682KB
-
MD5
85471e43edaec61c1a6bdba44564365f
-
SHA1
ccb46cd49c436db8434570eace37c4fd27a5d4ce
-
SHA256
1a26e17217700524e432b12993a16cd3cc70b6da59feede35faade0e9fbb392b
-
SHA512
5620bda7eb84508e9bb9b932049db2b64be806a88d150865c1e6375ab5849f035e15d136c26b32e5af2686f1f53721af87ec4139444c29bfdfed2f3486c330a3
-
SSDEEP
6144:qRUBhBNBUBFBSBkBxBoUpIcd3G0+fJ0iknToEYn9x6e4prz342bXit5T2tyMNjxl:qmDz+f46/ysIwG0+fJ0nt9DpX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FADA3C1-09E5-11EE-9A18-C6A949C40DC2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e095653bf29dd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393424100" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000462115c6959c6b43ad7d37bd986f072400000000020000000000106600000001000020000000263fb2bf03b0f7fdeca357afeaa7807ded3b35fdf727746d09464966bcc2f902000000000e8000000002000020000000e27b20ddd3ac15a132c2c954046c5b676ed3253c3385060e22edbe74b593fb0620000000175b8193010608b0942968fe730e582637f987c37012f968cb27db547c2b6cfb400000009f16c50a486067d4087f4d288862f469958c7c37a5e0427eaaca7ad9b10c8d3263c81ce6c1291f1e4b83753fb795bb71d32af84919fd58897f8bb1c9f613cc79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1392 iexplore.exe 1392 iexplore.exe 916 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1392 wrote to memory of 916 1392 iexplore.exe 29 PID 1392 wrote to memory of 916 1392 iexplore.exe 29 PID 1392 wrote to memory of 916 1392 iexplore.exe 29 PID 1392 wrote to memory of 916 1392 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\watch.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD50d5f0b62878ef3acc4ee90551a3694cb
SHA146bfca9b42f93920c5b8897582a9783691ba3c74
SHA2561e79b184b1721daba2edac19fa59dbf8caebac6306ce5bc7a07cafbdde9bac57
SHA512e1cba12a9a61aa0fb66a4b3ffed212aa7297a34a7eb50118a6adbc74f11b70111c4cd058ac2e4497106b663eed973ab627d826de62ba8b45328eef674f0dd4d2
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5aa62f8ce77e072c8160c71b5df3099b0
SHA106b8c07db93694a3fe73a4276283fabb0e20ac38
SHA2563eb4927c4d9097dc924fcde21b56d01d5d1ef61b7d22bfb6786e3b546b33e176
SHA51271724e837286c5f0eb2ee4ad01ac0304d4c7597bb2d46169c342821b0da04d8597491bd27ef80e817bc77031cd29d2182ccc82ef8ea3860696875f89427c8e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d0bb437e317b7d14fb55535060b4fa
SHA1211e9b1a70cb809cde8a7270aa405bce538c4495
SHA2560cff1298c7497beedb878474dd75c986448837c85bc65117775bc801d296b07b
SHA5128799bf536b07f6d0cdd9c18f6007aaef68cdb4469ca755da1e5f47b763b6c3aa02aafa57b8dfcea5d3df75ba3d6e88bc4bf608e2a54bdf89c37553afb7d1163b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef73c35c5b21d49aba425b45317f12ff
SHA15748b0a5df24aade371179ef56f4dc482fd3d570
SHA256296f81d5869a48aced3ca81c13ed584cc48ba80da284e7068afe32b4cfec89be
SHA5128fab03bf1ba7cbd88138931efbfa55e9e69432d54eccca6688b6b993cf283989938abcb0d3054383b60951524b55abd528ce40db877e7ca8c40c490eac85b7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d228d177ffa08c407992f6ab6a9f30a
SHA16d3daa12f98d36272ef5d34f81adf40aa61170ee
SHA2564f2d354adeaad627a55d9c801f71430958d82b0b87ca1610702b8a6483d80328
SHA51223e8ae178edd7ebe3cb5e8c364efce4ace96e0131a6245dee3361da9d991ca729b622d0a483b302aca012a818c9b5cb303739644787718291a1b2bf982e5831d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ff6510afbb28c03bc67e45d6db60a94
SHA102fc35a0059d954f731fc2e419289b54fc68ed8f
SHA2568cc53c9d7db24b4dd521278a561596fd1d37bd749d9f13d6c0a6f4c82e095e9d
SHA512171cd17aeaaa4f7b24482b7bf0e177413a16aa97ded9e33d7c31d37543861dc4bbdf21421764c821e1c50ab54d0fd82e2205488fa8c50222e37c773a075f331d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54076676ee66cdf29983be7839563f6b4
SHA1fe6e5d53d894d3ecdfb3808b83fa1658baa13a08
SHA256f80d1289f07f79dd4267099dfe5c224964077c61ded0388b650bc63e4373c276
SHA512590ae4b414599d529397d508c0a81f540ccfcc900353fe70e9f1ff1895077ada1c0a2727a958ddbe3de05cc3c6fcbb1d1106020b0d22b0e7e237519921670bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fb78543f876f69012c239a1f9ee7ea7
SHA15568ca78669a01aaa5fe5852531707ad81d319a5
SHA25623c28e9161fd2ddcb40a3740ac77760a1e4aaed2c5d4223e22121ef5b2534e21
SHA51287d80b76a91d12c91fc2759dff37e91a967badb845c36fdd0d145be15d4fb8a89fb758fb799028abb2659dd4d21f5d0b5e604a97f31c359b0cfbc968284e21f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf5ff912cb1dbd84e232fad98be635b2
SHA15c63a2719d1fa4a3e7298f69eef869838be23d99
SHA2566524470383e9e0a1b31af765f5b12ab9125c358dba4cb214cc9ee9ec9ae25837
SHA512dd9712eeaf42b3500d726ba1d14c98219d4a1ad8e32f008df13950e1b6d1266b992443418657a5b6089be4b304976fcd419559a158fae4ab020e5cc6c4ab6034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a478e336cc2525f3837219cbd649f1e7
SHA12bfaff9fa328ac2482b5ccc9b499a5bdd5aaeb83
SHA2567736875afc9ed690d5a40c086f84b8be11cd47e54c0c6a8411c4e46714980acc
SHA51240251d489dd79c4874f48d45334a7a5bd842036371130e986841c45a639e9d428e577c48b3bc253cef21818c95463102b2a13e2f1cdcfd3ff228d1aaa9a39c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5b141ec792bae7c36e2945e4e2dd52aaa
SHA1e73fe83dbc4436daf01b5466774f23910e3fefa7
SHA2566a27d0cd057330c2aa6bf58b5dd0f7be1932f11c987fad25a63246ddacde6698
SHA512e216975d80269faf20979cece1830d663b914a96556188e85909362b064de4cde492c842fe4ae54e0f6c2a836e9395d7c6195b82d55990c06dcb79982dc86ef9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\03S7L47X\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5902959ac952e82fbe982b8ed4d33bf31
SHA1f61f988b4cd07ce56e2962123d09b2d212887241
SHA2569d5432938f6a038d9559bd7e7d2031c5529208bfc39c2d75994cb2ffccc79323
SHA512da0cd7bf5ad77e789cb97feb6c28243a70cf1ba87ba862e573d4d6077b84f395e74867fc68560e65515569e2e1d8e037551e28b5636e15628af2a80c4aee5e41