Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/08/2023, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20230703-en
General
-
Target
.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae00000000020000000000106600000001000020000000b35fc2788bdc130a69c61a79d2f69fe9d555b29912362c5d7d23b082e31a6987000000000e800000000200002000000055bb5c12a1120be4d0e00256605d1fef079474c8a55c0b416da30cadf30586a22000000048432af56366c2fb1f9e6e01152fcd64ebd22dc630bd9fcaa836fe092517379840000000e7d28246fc7b1fee8fb97fb1806049be93ef7bd013ed5140bfc44070d53e8fa37c7f46a93ed972a890f6dc05bf7ec9fb4fb495651fa7e52643634b1b55ecd85d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398848895" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C7204B1-40B8-11EE-8482-5E587CD0922C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae0000000002000000000010660000000100002000000066f8b003c583e8c956c193d711afe9de11cc8385e0781869dfbe0e275ade1583000000000e8000000002000020000000a4628e89362e98c251cadb3125c572ec99c6308c916e0c9af3a60c0279c35e06900000006f537f7c87dfc822bfe7acbff39434cd28fbf4f929070aab9701e73a187cbeaaff51225743342919ed240653fda0efe2d782220295f57a1a1700c9f3a0bf0390f058b3fd79d8575b0205c8971b7948c71488b49488b3053e141de85877eb3196e908711ff526f444cc500d5a4c050914d52a85177935e86b8995b0a31c068f8a20deb5775599408e273d47bb2268ea7440000000b8d811dc01903e721d307bbc98cc34835cae903aee8964b20dd7b51951893b18da3359db4dcc786cd9b8e7e1105833ec032d646cb20d8c7c3064942dafb62257 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03f2601c5d4d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1952 2276 iexplore.exe 28 PID 2276 wrote to memory of 1952 2276 iexplore.exe 28 PID 2276 wrote to memory of 1952 2276 iexplore.exe 28 PID 2276 wrote to memory of 1952 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb2e9ab6327be4e86b3dbed30f89e48
SHA1bf56fb7e8f4167dc91ca382f698363ea7f23f065
SHA25622bd9a56301f2a69eb4d6c33b45e4491ca8f5202b6aef6b4dc4ec463f82c2267
SHA512aad1edb4d2dd56a2f75977c4ddc0eebf7556c3e608fad5fd242f386055046eee00b329e34a5f41f0cc4e7a94004f891885eeb8e9089bb843f721099c7e868a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c372366f44d1f6f891249ff64422573
SHA181794b32b50e039ae9f5c0fc9a911b7a07b9b255
SHA256e80fef9ceeea75e1f4fbe59fcad32c349bb8a16ac9011b7b2b8a3a0e64962d6e
SHA5121c26e6ca4515195ee99a55e600d5ff07b92d1b7a5c9b6be2039c773d360da792bb555d29b5b85e15e67a4ce00a0f79d4a3621540ea5cd3a3b481445ecc95b373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57463da302261146a6b155b74540586d0
SHA19771e208d34589fd1dd9e1bf0bb45ebea017aa15
SHA25605d012595ac68ebe2c76b5cc745af80b21fcda0efbe4a742096c41fe672c26a3
SHA51278fe7f5904582576527711bf04e6a5fa513a0140544fc284f0b128c0310d161c8e7867f1551b2023bb8e7eee06131f9ffacb73d17a5978a1848f46bd6a7da353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54494cbbbd7392b644534757fe79be14e
SHA16f3a761fd9af5a015ccd4c38d9249d9c50214e52
SHA25693696c926c2cffd0712ed59970d5f80f0b89969147f1e977fb86de3599e9e991
SHA51268fe1aeacf1845af2e4de6d4944090b24af33df77db235d6d2cd0a98882290d4eb4ff6a7056517965531ad1b42e003ec7dc1e8b731295b1ec008c2c0e7d2f225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb7422025e7560282503ae64c2bc312
SHA1abca176b17eaa5774d2a68cedad5783516b6d714
SHA2568caaa7b4282cf21f17e7d9c77b1da2a403e8a0941855a138eeaa1555cdabce08
SHA512987418eafe31c2cd062577edaa06a2cae9e56cf1b7e3c6c4d1c2de02246c91a1d64299fb5d03a98067dd5a595c5947a76993167cc1a6b7305e4e572ac2bccd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ac17651dbe5fcb423b9f6ba8edc78e6
SHA10ae732bbe757f0ce7fe6899060c1dbdbc7a57bc1
SHA256f4c8cfeaf2f905cdaf60726f0ab0925edd9f19d3834fb1047442435c7225085b
SHA5126d870451f017e982207a2b97ea7b7a79deb712ac11c067aa4d1b3f1fcbfb225b453a05abc40dce2e9bac79e593d2be48772738ac560c9c8e6546934f47618aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f3fc5ed3f375b1e97e4996b603be2e0
SHA1f66dd0d0cab8a44c6731b0f4b9f9aaa4289eddda
SHA256e5f5c1bca73a88aa17f3365dbaa300ac65678c5c46c9f0ae1b764df6e889a32e
SHA51224b83d83d12c0a301ec15482fe891268e714c56e2430671c58dd54835691795b13e792b2fce034cb50c686091f48ce33c7e28fc500df27571f966190361f6a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5475fad51a9300e332b2c8ecca1e9b12b
SHA101a0658df17328ec8d296580d9907f83100ef087
SHA2561f0bc926e3ccf6d8536d3e5555e5d6a79b57ae1fe64b731cbb1715f217318079
SHA5126c19291fd79502590ca816c4ac8eb6fcb752046b74b3a052428a1a8e541db81576a5c4c93e4bac3cea290e49e03ab7ff334f9ce9ea2fa552e387e08c897b7b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56151b22617532e754ed24ded9015d56b
SHA1040614fc29603c5f91236d4a02b77b0fce33095d
SHA25641dd746b053e2536ebd6da9f6e0209032387756f4dabbddca6234cbc91f791a9
SHA5128bc628b60f935f7bbb12a7a74350e99334fe2df90eae974aa4329afd631f8a494291572f8254a274d2039388bcd4ddb5456cb18f4cc466f1fc1dd8741cc724b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e70a561b73c190b38c76f09549aab009
SHA17f50bfe44e82f30afcba9588b5f72f038481202c
SHA256b44844f372360d221506d37952c9dc7b5ff00e78038e23f2a645461c341b828b
SHA512073ede4b2d11da67028394cb8d9563a9bf62e8c6154a358f9703598d878faa2a97b7cb4e5183c40cb4e67be2c1ee57de4d69f968065bb2184f6cb3f4a05db547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b180a6e32f39e52186c0824259f6bfbe
SHA18b48721a54740690c3c607efec984763659e1a8e
SHA2568d9f4b6b6bd0e30ccae9d119bbff1aca643b1e4f8c986f5a3679bb8990bdf309
SHA512fda92945f3663ad0d6678066a95c0e6c3109e5d71a1ae879c229b15f961ce0c1d4c703b3b3fc4c17c01551f586c3a225a72a6b3b5532ef6f1eed577fcb40fdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53495b382b69104abdcc8ebe38c8e6062
SHA1958dc91d9269a0aec1994d72082513846d7b9caa
SHA2564bc5ffd07ebb031232a58f8da2fd129c1c15e90877bfd1f395667a2194d29e64
SHA512d85195b7656fd0192051eb905413338af60f0e6d63095c6c7340b136528d96c0013cdcf1f4c48d616f07ede78aa754c62daf69507d555a29a6b27747d4692f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276e0080fd76486bfa037cacb7fcdfde
SHA11847d9446cc6f5299e3826023687a537f93232f5
SHA2568546e39ff22213dc622cd0c0ba5c825bbfd4c46c07a4aea5766c9fd20cb875a3
SHA5120eb3adf072fc7ca8f8c1fb19dfcad7538255c4f3122b480f256b4160b1f826651459c65bd481a8b05f8b6875f9798bfa9f0eb13468bc65cb0fb3ed0fcfd6d53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe7a57dc75921a1077ffcba73b6b3058
SHA17351ccc95ac7032f9cef5b318e28ec8739dcdc27
SHA256ab17651949f08ba212e15920ce62309e58be9dc0b71dc78d5cba8d7dd11fd378
SHA5121bd29b0c41ecef8e671e17f026db927b803362a11553bb5e68ff101e2ded7b76f6cc4665ae98a8bf50a9c8aaa05bd03154759961ac7aa56e424037b4244cf89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5776f927455c1fe9e33372772f40456f5
SHA1d2703562e383749e28acdb3f36cf882ed8a0e9ca
SHA256e397161d3a7dae86379399d53da0186831a12be1e39de48d3622b5529e6d788a
SHA51237d02d88be9c1f9b97b4dfc1cefcdb65b704e5167035ca01bbe5184b99938b627795fc0cd10469bd55d00a8251ae32534d1ed3c0c43f39e50a0bb65ab3f04624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf3fabc9214b4ae74644b4d60532a7c
SHA1a1b088666516084b01e125872aef25446bdd7351
SHA256439a903957f6d8372b25fc9766090de6e4e699d49eb7452571a74c71a406f901
SHA512a6f7e1694fa7fc686828d195c508e59bce47f23900c87e62c7423c55a254b01286408770f67cf55597811e077e13f5017e1c385a96ab3f3c65cc141055bc86c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5562b23b111ec162691f0c05e39a600
SHA12802231cc115c00b1a4285928a326cf051137680
SHA256d9a3080c6ba324bbc5a45a863e07d033819a3e176c66ea0d300ec04e7b23ef61
SHA512ccaacd2e84706a6476ba371241ea262e7627bd7af6ff33a329265940747eddb288d4c3dc13f2f88665b73f346a0c8557f2c4564779b53933d8456a95710b5adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a38cdd5ac1f5d2780617242b5737f0b
SHA1661cae924b1b08df3328f557357ad387b7b61e8a
SHA256e92d96882966944698c39e403e998bbe0dfc73dcd1812d7e46c0610d4ca4a805
SHA512d25d3273238393056f2aab06a3638cfc53e364295d5e9f6df8778d9d6391478727f4a26b901f12811dedebe03fe8bf1141d26ac02a6c1617d0fd2e1d9eade7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a61046f3b5052444b2119f389922e4
SHA1f269da8701e7e28b249c385eafbf7dcbb78caf9f
SHA25645455d0ce42b0932081521d9e1fd4760c76d03392987a2753507fcbb542372ef
SHA5125d0b22b384d9b614cc02b3b14fc0b2007785d5317393a5d6113e0a4f19374dd775531b2dc6272ad8665ac2eb20529dc15ecf3e3e30f7728d494012025555b9b9
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27