Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07/08/2023, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
eInvoice.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
eInvoice.html
Resource
win10v2004-20230703-en
General
-
Target
eInvoice.html
-
Size
5KB
-
MD5
d57d73c26c5cc345962537d958653640
-
SHA1
73a18eae34b952c10cf5aff6f428729970177676
-
SHA256
d4aee5ddf791dffc0bca7fa295490a9d65cd8205ef6f87ba8e9ce65f8de6f58e
-
SHA512
bc7711582dd164216a09dddf562a4e9c2b21974d02887f4f6913e9bee672fc15013f89ba04eb1e8119dcc75c3f5bab9ff90ff2590ec3e59f60bac5243e70c668
-
SSDEEP
96:h9FTdXb+xiTb5NLTbpvNQvR3B5v+mbBg5KJL6w3q99q++t6BVARWMDqxOtQ296Ht:/FRL+xiBNLx0XtK5KJL3qPqztaVARWMU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BEB0951-353E-11EE-AAA1-4E44D8A05677} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f392414bc9d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000a5cc322de0a38ca55f73bbf1b7e7845a486f9a596d9597aaee76072eeb989332000000000e800000000200002000000064807591728f19af63f8e95c220b0234a82535fff1518bd93527244e6ad6195220000000d6564a2f91aa767f4f82bd0822367c90e76778821a97d17d27d89fd719335b71400000005a23edd87f05abeb3020593f3cc89639ba06b19477ee73789eda61707562db267f9d4e8284fb4ab86e079b52f0e2ed449d1e56589a0ac6e82960d8112f25c3f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397587140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2496 2108 iexplore.exe 28 PID 2108 wrote to memory of 2496 2108 iexplore.exe 28 PID 2108 wrote to memory of 2496 2108 iexplore.exe 28 PID 2108 wrote to memory of 2496 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eInvoice.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc9e84a0c8714db8458c3910635bd06c
SHA1c7b91c3b252342c14fdeb68efc1751cd122d945d
SHA256374c9ef086b5892ff628d644de5435b57fa4c5b62cba29207d1ed45361080195
SHA512af0f14ae001fbd6cdb551f7f1b778d8f42e83bd337bb000728857bc4fe1a7af1a2180b9a1bc6347b6a61999e3f97c31b0e948516c01e72b0c729341f8dcfcdbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523e55cb33ef06af67acd3bb1e4ac4cea
SHA12f24d7e7ba6fff60f532637d127c6e22596e09c2
SHA256727bc9550fb1900d5b6f5c367ea5dfb6b82ac2b9936b4bb1bfce5d3e4b343302
SHA51284bb1b353c4e0b171743c5cac3df4327fe01530ece4120671183d5d632aafd6865161c47775d9725b9568da5b4c937dc94cbfe2715e7d216d16c6fbc3930af3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f67402cb2c48b2c8a40be97953af6e0
SHA1449278fa36ff6c2fab3491405ac1ac1a4e85df59
SHA256471c52cc5fb207fd854d4fa65b2cb3e2489a564fbf3006f1f87dbcb1585db646
SHA51215770e0ccb2dcb4774e6902c9acfae88329d324b092402bbf12856803acc9c76080f5611adb888a75c7ee8ec3fdbb7ad179f78a5ca625e32e4c680e921b95db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d94023feb40ed51672e38e194b2f4f0
SHA1c33b9eb35930868d95f394f4c3c66ace486a6515
SHA2567bc33994e66681cdd591840ffbc37723a40fd93ea86d4fced20d17afe4f6d976
SHA51262b36713e72986ddc92a402d4a093474ff74c247d1cd925a0490c9052e41570c8742b863ff97255a31f33b7c59072ab71771e9238f022d9223d898f968059bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d482c150b90a6ec070befd8f56b41ccd
SHA193ea53b5b995bdde3a3fad857d35a4a2c02ee1b4
SHA256b1fbfac420205bdfea35c2e699ce441719680b62ecfa97afc52a5905fb3305d7
SHA512fd9e9163ee2004eb25de54797dd9b6c22c94cb98134359406f4e99d641d2717158ab8fd9e92e7d798a02e109082d7c6a2affd03cc87f90085a492b2fec28e203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a03dcec1ef3a5c50239dc4c4451a3f3d
SHA14ee8a0c8e4989b3c1d59c9f0a74ae1532c79ee3b
SHA256a13fe91c42f8281ded0457a6e320acf5aa7114a4555ac118ab8e8fe7c9fd900e
SHA512d7a3b18127f4f66c9edebaacdb8c3a2e3219db64a3da98b99ab08e8e1655dd599e1574bca9954c4261d7a4566b5df80b87083a01ba42668c2524404391f08926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a4909d6e907e8e0c1edcf5022abe6c4
SHA172b7cd4ebd5748c0887e470f67da8cbb97605085
SHA2561b50524ed3cb66ac86f86e121be69c919b54688f96d1deae31e307111e3962ee
SHA5122b95c927f68c6762622dd7087c26d772ab8b898037288ec1b08f32e6175da9145acc070ecbf808a304ea3b3c83cdd86a92c7ae4020e223daa5219e6b84206859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf68a57c47e731a8b416743f2176ce2
SHA14ddfcc4ffedb7aeb46c0b070cacaf1b04d538260
SHA256a4cd83b9740ce09739c7472d1d48e2277fb9aaab0e57b89512e488adcf3ddabb
SHA51257b2d7985e835d3f42dfa15f6c242b4f66a87256eab32a1e5b3306b1fafbd5633a619a941d071e9d2b1410b73aa740a5621c481192a4da83b3196ab32ab7bc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d1421e7368fb73f971a8761495223ae
SHA198f046d63113bc5bf2726898a1097167201923b6
SHA256bd2c019bd0e687179597e3cb0efd7001fe351e7ace0d3d11825e49a2c978be4b
SHA5127daa64035c8b318c4965ed5e6c7f77e173e27ec7d8d63fbba0b38b1bd5cc7b7a70417467b8394f180b1d0a3740b033da2f228233ca6d60f5cb30ea8a9ce38167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e51960759738c1d9bb13a0adf7989ee
SHA13be68e2d176295f44a57c82bfd19861de0b75bfb
SHA2565139ce425702a366fac7cd303addfde0e6efcb0bd97a9d654ee7dce56304ef90
SHA512c3d3aef805c65843552b6897911789d7302233ce9a3c878ac65572a97ba3906b8564fee9c4c3026038d39716e29d5d3f5f24f04dac341a6f0defede38ee056d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3dd784b0092ce1252a362083608b866
SHA15bbd7aac5d2946567531c7062efacf5f307aa050
SHA256f09280b1955eb7d9e8dae6fcddedf0601e01d63b55136ff3cd01f624931d3970
SHA51205c420aca2c847e3496ef86ede682be797470cf0d565a883f6760d31cd618a5bcf190ec8eb0e17aa6a6f95d80dfa53d1481070ec568ac387bb6663d583c1a773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae21b351bcde4f11bdd7b483720d984d
SHA15ca340f886837195adb69c230c9f65c79bda5a87
SHA2561e6ce1492283ef1f753e646f0440023d1c0022be93cfac03d687e01361b6c164
SHA512bb7d28f37217f68a28a1828550278be0fcf67956ed3b616177c368deb1030f04d191d78d5e88ac662b5f5e6b0bc235f45c51bfa644036e53ad37220d477fb76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57531381ae23ac7da138de28e4869f460
SHA1e53a0dba7ff5a532858c3f495a447f24004be69d
SHA2566c50c9af9abf4155b2b235c664d814296202afc5d2a21003ff8b00e27071982d
SHA512fe58976df176a443e866d6877da31d641412e3ccb1a3fb8afb8c970196e8f0c81aecdc691e9d54df2ab61e0eab0458dc6eb4f5af12c54a9afb126c6529b433b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5160e57b83f976756c1d02dce953803f6
SHA1cdcae7c91df99a6fdbe82fc9b224095d205483fa
SHA25649f76c62bdfb45f6b579d2ddc6a757fdd5a51536e9d3580f3bfccaa3e5d47012
SHA51287397d0c436cf41e3f75491c444235ac5bda1efc62ea0945b670a1fe67a1df2231f7babb3b72851bbcb0b10f91424cc29081e6f2b68a68575de073e0b9da45db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a767b9332521e8750845e675c9afa3f0
SHA1c6ae45fef13b8af72009796847602353d6d135d1
SHA256cc3499e67ec728ce76765ea13934eb304b6ef9acea1df0745f91c26d68f07a38
SHA5126ddd8e0edd5b6ca6fe8e9fa56eccb855bbabf7e8b9c2ce5a14fdbd2bddb10355ee2c52cf4adadfd32f6739bec5c2e4bb6e5655e86a1eecdc1c019f94134c4980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543954649fd30db505be948cebba6dda2
SHA107ce920c10b105f3bac4c1fd04445195ecdeabf0
SHA2566736e23f031db3ebf152a12a92afb2c36c003fb063cc93751fe831c4f9846ecb
SHA512ee749ab7924b75efa6409aaf39c182f6309e770a25a6dc5c0ad42e54fdf8367068fda5068c17f3e97434b33f705fdb0d7609da4d2962bd47bfc65f74c308a885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c434ebaf64e65883af2d187e9c70dd9e
SHA14192704502c8180a2d1aeecec972b350305b8662
SHA256633d8126194c8a9bb25e4a17c5bc30f748d468693a001aa4a3138c7cb3f4c56c
SHA512dcc0132100500d50021f339f10b26fb9922d1e4852ee719fa92d743d9dfb7e087cadd67897f01939bf29164cb8b85e27ed27fbd5971e16aa6db8a755fd9645f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5207c4726e614a38d65aca728841f6a8c
SHA1e36026246f38a381edbefd0a177ab64bee0c305b
SHA256f48ea7f44de763c6f5d715d895aaa6f0a79d424658040999620af4d2fc73f9f1
SHA512919fda81e0c272442ffce7c5e467b0727467a91e0b264b240dfa8471f49b038817b4ba1e7867f61dbcb3a962d35617adae26b8cc560bf02a782e28d8b26cb3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fa66b52980effb334fa8a7fcf0bf340
SHA1a1a24727c70112a0cd1640ffbc95f3cfdb867c25
SHA2564a7759b633838e26ee072ea9232b39816c8689ab32c1eedec6597aaf56e61152
SHA51244e252aa2636de7110888bac5c6c4eb1f5b169f5f5a340a338cf2be68c88bbf37a13f0c8b15746653678597d261e2db3c6d4b058981470c5ab942b48498f0274
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27