Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
nkrk.html
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
nkrk.html
Resource
win10v2004-20230703-en
General
-
Target
nkrk.html
-
Size
124B
-
MD5
369859a199530f1ee0141bffec632138
-
SHA1
1550def794294b96adf8f8926f7b13c752f87c47
-
SHA256
d0d36947c6eb2116ad8bef6dd26ecc1f67e6aabcba560ba68291136362decee2
-
SHA512
dbc13082ab3ac98070bfd6c6afd00cac56e53b3c7b6dfbc851477b53d71817c440f9fcb670b7ead238a548864506524cd7ef828df0ccb8c27aac78658b462dbc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395309439" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000079aadbcc12564442a62aad76c0e1e2aa000000000200000000001066000000010000200000005137dfae9a99e0e438a5253bdbb933dcac91c65340c9f3fe65fd511c21d1cd30000000000e8000000002000020000000f81c73bd217089b6130335119de462a8be4665de194e5559ba0b941f4c8c5bac20000000433cac4dc540954932d4a8f11644b63c62c95343cab7a79d39980b450daeeda24000000001d7d997accea44ec1b1a866d5aa88a67ac7d4b834631bc2549c6cae358b7818cf7cc86d001b1e028daac3b4a6e1a2b53c076726606b508f1a5cacc734935a04 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09f7bcd17afd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{052541B1-1B0B-11EE-B001-6A51C30B8975} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2352 3060 iexplore.exe 28 PID 3060 wrote to memory of 2352 3060 iexplore.exe 28 PID 3060 wrote to memory of 2352 3060 iexplore.exe 28 PID 3060 wrote to memory of 2352 3060 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\nkrk.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c9477fd1c8caaa5239b1df8c337afe9
SHA109e139f1737f534dcdc104f3173236e6a716dd1b
SHA2564371227660ceb758c0fd55471feefc0e74b49b9d11532b79beedb076247eb6e7
SHA5124206d5d1550b1a5e4edf5328cce4e86c0c39a6942b8bbad660871d43f5723668ff2a122941d99d9222a08e8f66a1b9823e5986182690fa63b1656b34c87ec956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534213ca10b1ab7493faa73ea781b9b95
SHA16fbdbbe8b1ec6310c3f523dfb61153943ad757b4
SHA256bc82e588ce00fa10d02c2b3f64303a01d4c7939ea93dc88b5f3adc6d0e7fa60f
SHA51233a221126b6956a2738ba056473060daf55b2350e364cd9f72bfd00aa1ae62de765a0eebbede1718faae6eddf94a3fc4316ce2b098953019df0452d740572641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee2a00b6ec752b324158001422a9c58b
SHA18a065b671fb6c296ef6bb2d5d8a95b284a0cad63
SHA256ed016849b5d1d95c1d5bf8c2d7e541285033755aedcb17d1bce24ca47796683d
SHA51294a75dc08832753cba91de697de484cbe13e8563f49fed52c77b505eb2dbae4186cc51023362530a95843ef4f6208405a86620f82364b0bff1a1795f31cbd883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c00db122dcece449c9a795e6e8758d4c
SHA1b68cb03d9cd2bbf67448fccfcd8594cb4b08f0b0
SHA256a9ed1d9510a21c731fc7f7434c24cb080d66e1a667095aca553481749f58d3e1
SHA512729c6f62fc60bbe4b512407174c2ad66fbb84c0a973b053667e9281f9b80170ccb5f3deeab9d4ac5a199ab2ae491019d15b414e62563580410d85f06ffc4e223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560165886bc9127f53f78037b5fafa5a2
SHA14ede713cd6ca182df5176e7ad316e312f16fc9f0
SHA256373589df46ba1edf931fcbe3b85a63edc04ac40e7fa7c11ce13a14864817a22c
SHA5127a40ce8f7a3092d170c1250428c4f08c363bb72e07df3f5f07f681d8c4fbdc4dda0311518aecd47842b90fc9ac1d59a42a069ff1cb7d340b5649211b965a1f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519039522f5ade2cdf16901c9866905e
SHA1e1beb9d9accb8484b98d60736b98cb4b3765c85e
SHA2569f38ecbbb1e8fc71e0f6dc97cba8d35994818fb2c919d5de3493903d2f7b36f1
SHA51213f33a748cd428bf56ac3553a56e91528a974bf14be038a8b9a17c685ab3753142e2570be891be0668c5650c080592f45609f8aa44cdeed994de56fea6a29cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510283f4149a44763c292cfd7c98b92da
SHA17ae91232e80e0030a30ed0b13ecdc75fcbef7285
SHA2560d709a2fb39a76d6ca3f159b7582c9f4891a5860ea64d9af3938d2c8df67f0a6
SHA5128eac03439253ad8ba35674eba75079769fcdc76292d5cf9ce8c1d31b35730c9b19c6da16821cb5f10463987e6f502334866b3d241ca7ab6f4eae7ef4427c159d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54809bfc2550498dc3e953a77e6211b35
SHA133283538a666da848feb84d97ba0503b74e22c27
SHA2565b10bdae677edb11a381b6812521a070d81dfd26223ad038f3b6b68b9c36d7ad
SHA512eb18a783e27a6ce2154b5d3e2744e190cc2d1428725ad263aca59f621705e31dbe26dce54988e6407224e83d31d6b0360fed08f3b360e4441c418312c7e82d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5842be7929d803a4c6ab8f07950efe956
SHA19dd2ce96dd72cc8b3de972d5f05d05845d70c6e0
SHA2562c9b7278ed7eccf142264156b7d155353031d19a69e4ed17b4219fd7e5339445
SHA512579424fc4c0fd743145074c6b761ba8031055a6e052c999a30bcf7a17558c0c37e6baded80096ca63f5f2e78e96de2bad4d02505f519a07ed0fa9a5950c2fac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f207e87ca8e3d97b83bba93e75bd557
SHA1496bf294823c8f6786bca1b751fdd5aa23f51f44
SHA2565dcec74c189b14a0addfd78c0920015fada6f0a71c8d0b4a115ac9d9d6a6c8c8
SHA512c926f01fa0af481465c01b14ad4ecb7ceecbfad37fd4a1804fab8252b3fcc1e97d647d4342a0c7669ef1ad205c162e0e29bb6839f48e7337becd0a065ef1b789
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
5KB
MD5249fe1e1997edd2b6b0bce8f79a000e4
SHA17ad002f945c376fb94d4f18520ec474fd6c79035
SHA256e8abbc2bc306f0a397732ff8db65f90a72ce1ce8cefaf5d957198e49e9df4ef2
SHA51257a31505a93b1a77d6f8dff9ebb6c4f8baadc324e01f1fd8f07e92ee707e4539be4e1f471393adf9bb1fa6633b8a6d5acfaa82e7a966248a3b5a0923baa19928
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8DEHEN72\favicon[1].ico
Filesize1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD57ec8dd4c7514dd61c2c7fea9d63f9be5
SHA150b63b3e9dcd5fe47e2715abeb0af254ccd4a85e
SHA25632975205b366aca12f9114f163c4682c120a2a2b3578745f60ca2a3b8036a478
SHA51214c081c123dafda7efa54375f52a91b393891190626bc232fe62335f6a96f3efd6ad337c57ffae5f574758740f6941ad412e6f057e74cbfd3b28358086e8085d