Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
taskhostamd_JC.html
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
taskhostamd_JC.html
Resource
win10v2004-20230831-en
General
-
Target
taskhostamd_JC.html
-
Size
51KB
-
MD5
d607af80f1234761a527aca7a6e454f3
-
SHA1
879ecdfdf144c58a7922a4b15939eea890d89f1e
-
SHA256
9903d652d4cb249e28831dd11c84767801e81bf2502d67faa3dffc8e9c9d8582
-
SHA512
5915b8c4196d6b0f0c537f31843af6ccf963106c94d520aacaf0f7c115da38d41e904fecf0f04b7749b2a268c561a739ad3cbef842974f4bbca56a1d88ed30bc
-
SSDEEP
768:/re9Q1E42Wae1QYhm8yysbcodj/dnVvwakPD:/oQ1E42Wa07mhbcodj/dVvwDr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C175F91-4998-11EE-88CD-7A253D57155B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399824711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbd2da6efca7814e97bd67c6ea97aa8b000000000200000000001066000000010000200000000da39fea63a23122915769aa42b145b4daa3672fc6519edddb9ae54ecb8dac1d000000000e80000000020000200000003fb79a6b748dd5405c63bdd341159317229f37b42d4bd5864ecf3d96cb02bc5620000000afd529432d87bf73d0a939550a0161749d4577f769dba638a2663785847fea6740000000ded97d0953f70844d59cad371a23a27704b4f05c317ad6836dc30bf5f7d57c7b5a1b77236d029e786960e83d950db96eaef36eaa84bbbf085a1529f47a5965d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d30702a5ddd901 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2616 2072 iexplore.exe 28 PID 2072 wrote to memory of 2616 2072 iexplore.exe 28 PID 2072 wrote to memory of 2616 2072 iexplore.exe 28 PID 2072 wrote to memory of 2616 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\taskhostamd_JC.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5cc695ffb1753010c1132918dc223a9aa
SHA1b5aeb59cef77eb3e361558663de88fd8f08997b8
SHA256612f102e1fb89a1b002192773cb1f86984e7e183273fca38e227f257bb5187b5
SHA512aac6e69d3bc57eb73b3f0cb2c995d98cb3334217a98aa91e949ac0ead02860538f66e65f20d406ee2c16e01ec6d365f8ad314eb5661c244c984b9dc331b2c78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557da14d769de8ef51521c54a3f7cb3a4
SHA16a411d45ca641d98de21ed4a4bc0aefec3bc0bd8
SHA256278a6ff381daac19f935285aee4f3bde421393c1d4e5100c559062da836c1a9d
SHA51226295f0e1ab06ff8e85307c50fb690c7f454aff316584c7cc87eadd6a839f0dc403bdb6f6b20f36c254fc3fb3c829afaa730943053c1f7854a4d593e866c1515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5686d50007f907cd5f523627de81897bd
SHA1c42bc30fe5d8ea4c2a97f941574ae86f5fd07f5f
SHA256f3caefe8dcb53094596be598b95fb6403b01419f7af5c8d2dbbbb0fdd669554f
SHA512a183e9adff210db6679d2cfc19face07f425b244cc7cf2932545c417498d08e8ab93bd92842bc49f340671edfb4064708aae0eed4511469d6b8951a81bf101ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555031125e742084628c04bba0ed448c3
SHA1386fdf124245c030f005f9136c729a902c394a27
SHA25672f9404fa634fa6ccf40c1c15876eab2ef633aa643609b1a483cd567eea6402c
SHA512ad0caef7a0836d9cf703387bdb0b676f18f96f980680e153039ffcb5a9c5b78d8d4d3516326be95d63c4b2b00174a5f6a516272025faeb69369ccdf86940a65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c12871d821d4701583664d340e86d26b
SHA1b7d6beda6b8df9167ee38374a28e6345a1c0d0cd
SHA256cfaa0d2330fc4624ca3c463d6e1c5410d6f5cd5443ded103667a6c9d0ae96c57
SHA5123b96c2002eb02722753cd6e9528ff9f41d1ba9996379cb19a9919823228172aa0f67498c404e66c4985ae88ffa6500ab34f61594fe3adf66f5bcef601101ffde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5191e84b273048f54105e2bd250bbf119
SHA116bed526091eed3858656db60406188b887d499c
SHA2564414a9c5974417b7b3e256656d7f6b95820169dc82b264ff76ce7ab1a447a2be
SHA5126cdbd172168f0abbfabd899bc989019633ae32ac8d23b226eea467722593eb0da64dcf3ebd15bbf85d32697f57364eee5146947db03ad31d9af2d145e376bdd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c60e4162f7470d9b0ded930b0e5373
SHA187d50c8f0396845f719228dceda8c4da368cd537
SHA256b3344d37cc71476385d0b58999e09753bb717674fb99f1ea359800ebe371c662
SHA512d23019d45ed0fdd4daf387ebb8e7bf23976a71047892082133b6e1e86637fc995159759dfb7345a42efe72988b20b9057e07bfb3e3f95b4d81265db2a503b970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f87a1325f031cb36a26c8492176b99c3
SHA14e1b21cf0c432a0f0086b0c79c98cfbcbac31509
SHA256ac5bf2a97864bf695f31ee81463982dd75b0fd363ea937fe6825ce78bdfd8618
SHA512acfa4e5d863beb202c2db98a8eb939048adb67ffd579bd14cbd85a06886ae9d88c4bb2af0e6101b28445b4db0db62e07f28d7de2020e8312f5ad7ac089ff74ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5356a99b3dc8d2f8f1d932cce647c75a3
SHA1d34b8276f9191c9cd6dc70fba44eba1decd3aa00
SHA2562047d31819bf56934ce447fad3302e326496d88e44c520dd82aa5aa35cb27dbd
SHA512a972b92aba97bb547c1bd413c188dbadb7028d03aab86b30cded8a1af00ed292f381c67dc0e216fc6190dd8fc7fce8835935c4b961c9f30a9872bfd59b8502d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8ba8a3b391bf23952b011df75c9c1e
SHA12cf078ca6acd25fa9ee188bf2ff73ab15e5f6faf
SHA256edc2f1de2262adc51132c65c32b112a00a4bf66cd014011f9a3da54c44596dfb
SHA51287d9e8eee24eaf2fb984c917dfecb9bac7316c0be49cdb31db8c740b8af36e09c2fd6539b2319c0312c8331e6cee9c6bede4f041c2ca2c5dbb1d685199973807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd007658ca9ed210abb509a53e37c8f2
SHA13c29aa9c833de388ac9faffa68dbdfcfbc861c74
SHA2569784f9f6d207cbef0cb109615078a34fb0cb279b60c9ad59f738a85347044ec4
SHA51251ca5adfaff4fad9491e5c80d8b35bc937ea26a58e7ca19926fc3e0757af1b8c4b5a2852c7154e4efd5e75f30ee16145123f6028c298f044152effeeea6cff29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a59dcdd43a9963671db895890b97c26f
SHA13e3764c19bd8238f3dfbb123d2a39b983b94f159
SHA256aba7f4a4e414fa6e9065bd1b16fb3eaf9dfd102c257ae68a6dd7edca21e31948
SHA512427d1a994b5782509e4ecd5f8d5fb81ad5e7eeca2569777200056f90fb34d67152e40e89ff7416c7c04f2347ae16fba46b5a80321954637de7425b351678165b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5323bb61c6abd4e3f0d8381c3e92ad910
SHA1effe910fcad82a2960a19d56e4b0a282928f2b83
SHA2568b3a39c9c0cca1c7a714299afe178af2692db78ee2b51c048a7345409540c51e
SHA5125b30ff9cf78d15842f7da63397cbed2bb136beb26f398efcaf1c6d96f100e8d3eb87f55fa5848ae54dea20a8e0d2272bb108cfad80d8e7bfe5fdd1548993b10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c29639ef8cb905e7459dd1c31b9524c4
SHA12cf7418145470d3e69bdf8e28b436f5b8c41126b
SHA2564baadfdf39a18170335fa202d397c89d22da3cc1584d68a4c363f66e687f6889
SHA512172b50bcb84ea0c3c82621732110cebbe2c493e97ea08bccc49c0c2fab6cdc2faa7eeb4feb43d926c69e66f44c9ba19643af68fa3b3c3364fc5d3cbfc72540eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541ff9058f9ada3e234cb4654363b1c2a
SHA144af1b782fe0e9e11a1415eef0b2da10ea7c5645
SHA2564b931254f1e8b3e8db34c05f037946cbc70e016c5dc8d9a046a5ebac8b71ca6a
SHA512e627c87112a4e0343623ff65074093e5600ba52fd9a2eb57054aec3b09479ac3a6fecab54101e6f6fa38a765a1d8e4b5fecdf2900f6e792f4341b0ece06a8268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfbcc9cbbacda571ab12059691cbd676
SHA1f29cfe0a5c9207aa2e33872f92c6bdeb162abfec
SHA25600b3bdb27c65bc01e1a62e190d5e17123fc58dddb7259784adff77d7afdfa238
SHA51266ff7aaf4c3ae297b1dfb576e1abe341585365aef1b242726fb719da23ea4c6727eb9d498e0e90c1712effa1caaca3cef1652649aa3b08160c74c795b11c13cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6446e777221e27f25926934fe90bb68
SHA1a4c49d302925629cf4aa7027077d60498e9f5b43
SHA256ee906312b9e37b0b76d988012dcb15ef0c875554aca0a385733f86a720a97b7d
SHA5127ddd2409f7895abd6a49923f0996e21be401ffb3ca9a036f5ba41483eb1a335ced10012866d61dcfefbcb7ee582a7aca263056e244c7559b989fa60e8a46d5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc01c1ce7c8ffe8ec6227776c9c47d8b
SHA11b19d492bcc5d9a6646968a1817cbbd8b98c45a4
SHA25644221e37cabac388ecba24e62cefdb7a7d41b8500a6eb45d2df157d2593e22bc
SHA512c29a61dae3bc316a837e7555a5fd3a6b882f9a12d0f18530bbb0fcc90da407e7b29fa817109779cbbe21b81f2594cbd23a961a59806fcdcb986591b4647efe31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef2273afeef8681757e4ef7dcbc507f
SHA13733472b559908199f0cbaffacd52f09a8ef04bb
SHA256cb024f4eea3114f64590e2fb03caf10d3a83bb08727cbdaf40b243daab515705
SHA512011a3a3af7eb1df9202cf5396bcd60188ee658141777ba1c3ba7aa8ff8f3e996d57e8a829669699d760ff85820dcb1e21f82cac05583eaa2482bcd98d9cb8348
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf