Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/07/2023, 14:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
route33.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
route33.html
Resource
win10v2004-20230703-en
General
-
Target
route33.html
-
Size
315B
-
MD5
a34ac19f4afae63adc5d2f7bc970c07f
-
SHA1
a82190fc530c265aa40a045c21770d967f4767b8
-
SHA256
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
-
SHA512
42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397145641" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42CC7BF1-2BBE-11EE-A0A9-EA84BFBCA582} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081fc177b9287ed4a8181eac127bbbd690000000002000000000010660000000100002000000016b54cc1390593d834b517477b442c909035b22828c53a9036d4f996fbcef08d000000000e8000000002000020000000f6bc3c382f12ac24d88e94fe5bc0e76639a5ea67ac6693edea86f48fa5fd549e200000004af189e226b4ee2063c33c6f4b124aef903e48907e7583171262393917fcdbff400000001d1638fdbc94ec64adbcf995a91498474240deefa261efadba6c9267342b6e09168cd1f57debc367e64ced0e22703d325641855ab4140f50a2ca64fe216d9848 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809cbf17cbbfd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1280 2492 iexplore.exe 28 PID 2492 wrote to memory of 1280 2492 iexplore.exe 28 PID 2492 wrote to memory of 1280 2492 iexplore.exe 28 PID 2492 wrote to memory of 1280 2492 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\route33.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ea57e9a74fbd07aa859759de109b48d9
SHA19d45ad5d77e4a23d6b37bcffbde1bc5d16c7e4dd
SHA256e1541783ab53ff659b58c7aff77f63faface0cd211f8601b0de442d9f52976bf
SHA512698b657f202178b6051f9db8e582b7ea2ee1c54b2936505b40532f4501a0837cfcc1a7196e870a3d2ca92287feceff7d0265f11b8c349bd53924c0c5d236bd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5634f7f0284b879d4482f1c99bb6d9b96
SHA125a6ab22b198e697abf2bc2b3f90a6a84a72e974
SHA256badfe4103e6711757b71c8d359ebc68936018d97af1e32bc2907dd1f5c176e2b
SHA512053d8eca33744183e85ae982518c8fe9e625f21affaf11d6d0a21b98c1d141965797b20959d65023402107074db67dddb0b3b1edb85d81c0c7a3607e4e8268b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eaed78bc4df9afe8c240d0e6b283a6d
SHA19ebcbd8cfc50fe984d2592e19e25dc045356c86a
SHA256519ba4b82ce4c8ed525d5f6e7f7f8a6a31fe2e3ff1993a90e3e81781b4be1af6
SHA5129f873b3de2c82c1c069a3fbd192449f62b1358a5371b1f7e8d9dcb2e47fe9fed1ebc4275097aff9e9901543fc2988845d0329f344e1700a18e77fd571df93802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f18eae66478c49014bbc0e5f4fed1e9
SHA16a0b8ee3c5a35353f5248e52f430dccc45358a1f
SHA2567d84e502b19e392c2a2dcae9873ab28968e793c6bac544ecb02af9d26f8cb215
SHA512c7481630bd00c116ef7f870d8f0b391320c9448f77d45748d92e522ef3f4a0b84b662be1d091781f88c117bfcb5d1a4b3e8ec0a2ac4bfb82b2c8d12841a1f3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5864887a209334ab6179065c0796a57b2
SHA1c1169a5ec1f6785aaa15def9d3ef31c4a9c9544f
SHA256a777c0df6df617a45f147f0e34c5979122922ade8a7eb3252222d111f992ea5b
SHA5129435a28ef87b977ec631f1ce8d0b98ae42dd1a368531dc181b1243cae000d5a4818bfdfd8f8b948366f95758bfc98d9ba96b018d2537761d8f06a3ce012d67bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51516783911cd1fcd7158b64060116cd0
SHA12b5b9e3c792079cfe8bdaea2d99379f78494ff63
SHA256e4decc745db53921d17e955a82317f73ebbda7a04160031227bae15e64aa10cc
SHA512982762974e4e814dbfab9620ad24f57dcd3d8d0cb39242c5eff452e48d5c9ec9568ec5d8376eb8b580f9c32ad4d164e0fc3fb19153e230be0b60aeee1ea143b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52196b56641c54663264e6b04cf6521e0
SHA1964ebb6ce826d8372b9285d09fc3190265f28827
SHA2563e54af4529a0d8b9f6527d996b0e60a49ff93f61f03bea3dbcd37cd122e2edfc
SHA512103a8cb4405a04d4b7d95de152a59efb5373e205acf4cbbeb2b39b319d46c270a221d1e2882a91a561300abc085a267b0eba3b20fa2bd50aaa4d8cb465769082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcfd1e883ea48d79d131b0492b460de3
SHA10851a063772a3935ed4c255331a9c4a4f2f4508c
SHA256e363079c78cb5c3a643bbef58241b47065496e4752e7bd906bfb5d0c1d0a39a9
SHA51240d359df0e5cc9772bf1d3723aec57f5ef58a48342788e43d1ba75f45a4a04faf671c4999d1836a0904b365e02bfdaf7e0cd8e1d8bbd70a1806714f1ad0cb88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a4e7310132079062832fe033a3bfdda
SHA15b9c015eb976eb0ba2d7161823009231543263f2
SHA25676c792d47697bd21253caa31737a8eb7919dcf23c5da4f9b62ec4f409a8c011a
SHA512b75f0f8c63ca6ea4d1e26ed3796ed139a93d126e6e2b1c048e58ee9ac7a6aed6f0de46f7a1b7b8d02b992a99f500f82c67accd3e219bf68902036db01dd30077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5634f7f0284b879d4482f1c99bb6d9b96
SHA125a6ab22b198e697abf2bc2b3f90a6a84a72e974
SHA256badfe4103e6711757b71c8d359ebc68936018d97af1e32bc2907dd1f5c176e2b
SHA512053d8eca33744183e85ae982518c8fe9e625f21affaf11d6d0a21b98c1d141965797b20959d65023402107074db67dddb0b3b1edb85d81c0c7a3607e4e8268b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B9M1KBX1\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD500afbe8d0c1d05ac5affb253a6c5d41c
SHA1e31905f8fa920c1d2c6bed1e5d02400048165f47
SHA25633b93144d78cd81a4f00fcfa6bbc49a781824ef89daf6c8422734a94b7e3d0cd
SHA512639d87ff3bbea0fe2f381b6921aebcdbcd0c9689b82912cd5cce8b390d08e56f95f1483066f5931589c368929ef745b1d8a0ce1a692d1171e832c21eeddc98c7