Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
You-ve-received-a-document.html
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
You-ve-received-a-document.html
Resource
win10v2004-20230915-en
General
-
Target
You-ve-received-a-document.html
-
Size
262KB
-
MD5
40dd3751bc81cc2b0600467f967086a4
-
SHA1
1619c6cb8d0eb43ec3feefbfdc43989b12e1cdc5
-
SHA256
55d2a99c28f7e0f577bc434f438e015e41277a020e20fce078c029a30009f901
-
SHA512
52e43ca05e0a5c6c01b7be60091d7e94b4add4100da19147c03e8b89a4808416c5087344441eefeb35f124cc6ff40e0e5b9075644defbafd6bfac1d7f0e3e73c
-
SSDEEP
3072:EClpG5Opmf7VYgxYDCcCit1QXgFQFKJG2VRGs9YEA2bbq3RARGmbAw4PS1f0zqwF:EClpG5A/EE+cWVN/EE+tJT0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{068A6941-5792-11EE-83C0-7AF708EF84A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbd2da6efca7814e97bd67c6ea97aa8b00000000020000000000106600000001000020000000be316b99368b300f1cae10a434ca88e4066b6c5f6df19618f63de6d9f76e3725000000000e8000000002000020000000b39280bd8da7bf3e1cc039f940b4a378d11778734be9a7d2cfb1ede2e553327d20000000d9f6a45aca0b39a124e87e4b0616a335e3f1a583abb28e4b6d0c3384c27a05f340000000a9a39366e7343cb435f467deea9da6b89f05171fff4d8aab6c3b58751f5f8bba99240ca1a9d1d470cbada556b46c1d6fd7f042cb2ada187408de0809594d6f68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "401361387" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8002f0db9eebd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3064 2544 iexplore.exe 28 PID 2544 wrote to memory of 3064 2544 iexplore.exe 28 PID 2544 wrote to memory of 3064 2544 iexplore.exe 28 PID 2544 wrote to memory of 3064 2544 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\You-ve-received-a-document.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e51374d335ee56e07a14a8073fe699b6
SHA17bbfd57f3c1ad06878db447a93c4f2d4797f949a
SHA2565614a348ba9e49d16dfbf6b1c818c82c74893bbd760847d932fef92259a630a7
SHA512203671f31e03f713eeab11fe7e0052e45f1c1f3997138b4810e8d2f8f2e96a50149757dcfcd5865b5f5102c7d3486978215b40c5cb82ad71d44db0a7d698f442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c868c67138bc857dfe2861769d5a2e68
SHA1cd86366132a30155a5602f79173bda17d43314d4
SHA256f756e84fe90f16a8e798140cb32428ccf3423ec47f5aff1eb3e480de24c6f75f
SHA5127da3b0cb0a4981170a2881a424b355abc7963afc3d67f906e909a8c56033d2f3e2263e74089074f09fcee1ac14d6b3eab46dd98887233ebea8ee319f8d6c746c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0979ef49c405ecf75c120b4f1b955be
SHA14c320a0fc1d5b673a8b309ff1c317ce74314501d
SHA2561f5dac66075a056dab4bb86ca051d6280468b7d0efeae66b77d2cc6255b728bd
SHA512659f4145c5ce20a5a09f4316e3579ac68554f4e7c147c226eed207cccd011949111878cf9b54f44771a65594bbc3983a41ca0e131f3ce5cc6eb4f69ab1ff0736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5a3b25d97c738600a493955801425dd
SHA1b2b63d6c5d69c4cc6778ab64d73fce104749bd98
SHA256d45975861a225c78896e5f7ea594902028622fc043c456b07249dd97f26af857
SHA512dcaea6feb7556afd6560203dd1852c9fb8eba619dd03a8ac966f3fa75ee742aa05c4916d40405c6fc6dd2ca688aea3d2120112ccfcef99659fcae880d6517ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c9b2f50cc25b54d2ae6a3ed31a8f261
SHA10b6d7f127391b4dfa9fdcf0c7dc5a5a01d4cd635
SHA256f1ef26bdc3df2c525018fff4d40b45a907f878cc2449bd70b7016d9a40cd35f0
SHA512cfdf124c78c5974244e97e2d2f5b0699cb3a92cd6a8ab4263ae067179708771004b61961dd69a8d22c0707d68681fd39daac362e10d09e483cc99f990133fd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53437794825b176d475fd40410fa98f15
SHA1db693e2e16edb80be7117a629981d805d821a905
SHA256ca47220a4776bff88e28a2dffb1b95ba9b2cc7a390c0c81d9719cfa317d945e0
SHA51237ceaa5f36f32da33a9121b64bd3e99f8b4b3cb1369355420607fad14945a855b7b9921c8148747abb21c01be1e92494a75b90fae0ea4b9d69c80bb96ab48e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c864a5e875464ffd53aa21497971d36
SHA1317bbb882cff50be2c4c97c30f3aa5dba76ecd9a
SHA25642802e5631a4c09ba79521a751fbb5b1d7d550d00983861d982e288b9f3e3f79
SHA5122401beecc6491f1d80c30e784b4f4a782b18ddd769076359d1d31586aa248d6281a778e9b46f094c9286b73f479588973107e71e424d485e03b3b0a30fbbc29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ccdbfb0593a52ea99c3e1de8c74b40
SHA12f6ee5855f5961b60eadcf47c6f417bdbd5503f4
SHA2561433ec25e778cd046d2cd59325b1c9f72c4d00c2d0b2b586db8fe56c64490cb3
SHA5121cbe1cec378f21561c07b3d9c7769ef5f38b1177c5b5df9eaa6dd3211363b707f9f72c4ec802ed697797d8a544d725573ca2db12f2c2f6f1742ed4faaffa23c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c2f341d41ac79566557aae3c445abe9
SHA1063d7c29145f99bc61e10ed6ea0d5affe2959718
SHA2564a2272a457e665f1fc15ef09a822b51cde8a563252563d537038f53e26753837
SHA5127384f348c9edc9db2c4e11e3c5458abddd8721628e8772ae49bb14a2ffd7f593c890ebca157f34479f7d680d435b4d43368564ed500478f42948990b450f68f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f49ac0307335682553d755779512002f
SHA1a5c9269ce8122076b049326c0c59fa7a6fbef899
SHA256bff7c056a4ca6cb0f76333d661639dde3bb3702fef583f6fae63c22bbe3821be
SHA512f1c35a1b23fc017e5c07880e5be1bfb25af8247b0596c6e229816bb3a2bee7761331587a260512bed55a02b1237f13e4b8dbf29dee5747fe2de61dfc7986cceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58079ba8fb591bed1c16585281ae98d01
SHA15bbffe2f56509a42fa9d5260000b59c4621e7886
SHA25668fd48979c1ee94267523c9aa571c5b85e3a744d2c8cb24ff9b63babab474ec9
SHA51221d5d1ea04a421cd586e993fd355af4db2c8a74196a209aca54056f360faec3db45aecfac583b3019d60e346932f178666a2011887f6ffea2701abb5aba046ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f684221d75ca1d4507e3b1181f39234
SHA138500029398663c164846b09682ca118eda86dc0
SHA2566da2b4c2a93da3947b663e5d1cdba708c96880c306022820a521b78d8bf9191b
SHA512abce78c0a41a7ee0acfe2ce90754d1a395ed02d7ba6e490b3b75fc91a5275a1a6981c14ddba7a2eda9f58d5cef30f0ce52be7b8721a79cc5ab179bbd66b98a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a3b1e91aa32a8311994159d39207f95
SHA170d8c8dae2464415918260374e78dfb88039a7f9
SHA2563e3e439dfaeaa088db2fbe6669096dd3d387798db83fb207d41540d55261fa1a
SHA512e3a6129925e8f13bc16e70b9cf077328518bb038a348d61c316f38c8b1ee9846e296bdaf55fa05e67a6ae642fc02323396d0a239782bd7ef8175c809b66a0214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7a6b7f0e23eb13e11a041b831f5ead0
SHA1dd2b9e1f7569fce3d496dd60de6ccb2465908287
SHA256eea56936661a8f4eaa659c2e584b578581cc025a344d6ce02da0e283341ebc26
SHA5129cd56aada278c04753c4f004bec3145f0d2e617455855b63e271bb8472f8491b3215f6d7c5f6ddbf202940e102a41a3f6c642144ebe755da712e716c43a377d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587742cb59aa47a14eacc0f4d0fa0ea94
SHA11107cc0d1f170f0485dcce07ae619fae990d3dad
SHA2561b4c48d8229c7cdc82491a40a37d6fde7a971f02103162b959133114b4380809
SHA5124669626783fe8866ff62f53f7d029dccbce54b515bea5558a5a8d53e5f0c7d1eadd0d9b984bf9271ff339d658e2ad869642de697924e9c63be0a2fb9a0d2b676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57982c2b3aeb23bf50ce79d92eb1d96ed
SHA1b26a522eedefde086a2118e50bcb535fef8deb86
SHA25697df2249b013b275a1693ea88dd8865c028ed414518596cf238ebc1f7b87801a
SHA512549aa98d7231e15bd2e02f4a7698179b217b9fd890466f62b50430ec450ddf45e031a76c8d71d33559288067af81405d5d3c48f8f4cf5e77a5fd03da62e005e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d67c35f605f623743501be73c88de31e
SHA117afe57c5321cff877c2fa99f95ea53807ec3cd5
SHA256f0aeda631b5bac236d81636d50508622947b4209c757fbd5ba5579649eb18b9f
SHA5125d75aaf62dfa835a796644a7d98331b26e0214a1bdf64ff2bf73e3eef27632b8592d2336882b2fc5f8d7330fd4ea0fa66a25230111ba5bd710fcc38fa67975bd
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf