Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-es -
resource tags
arch:x64arch:x86image:win7-20230831-eslocale:es-esos:windows7-x64systemwindows -
submitted
23/09/2023, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
test1.html
Resource
win7-20230831-es
Behavioral task
behavioral2
Sample
test1.html
Resource
win10v2004-20230915-es
General
-
Target
test1.html
-
Size
314B
-
MD5
54061017a555259127101e7ee3d05cee
-
SHA1
71a337f65f85b7f18d1b45b506ae9d37b30fefd4
-
SHA256
4aea4fb039368cf36833aa9968146ebc07361c246d230cc45dd6f69107475c60
-
SHA512
4029191e7fd37377487afb5274f14c3dc11510cf5e5cddb4a4afc6cc819c39f5f95f57c5b82c351993a6f3310224453551f8b99835af70fa667d4e91b47a4497
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c009e07052eed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B868E11-5A45-11EE-A0EA-CA962B822B82} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b000000000200000000001066000000010000200000004dda7eff464bd5994ba1b5e9733a18a1b7844d6dd94244c710ddfc92c8ace690000000000e800000000200002000000072f26bb39d1fe20545d11bb164761e0a0f7b6e19b2837a02fc522e6ad5faa70d2000000039b57b2b8a3d0fad1a1136bacb6dae0af4b7bb2074307402ecfdd7436edb4db04000000082764c80d91fb572b3154abff0bb8fc6a57028e62d3eba68c9ff8edb1afed8e50269e3dd2278069b501102b88fcd0ceea1cd166c982f46c53cffef472aafce3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2800 2152 iexplore.exe 28 PID 2152 wrote to memory of 2800 2152 iexplore.exe 28 PID 2152 wrote to memory of 2800 2152 iexplore.exe 28 PID 2152 wrote to memory of 2800 2152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\test1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e6aaf9388fd7e5af63a11bc6a6a7f4c
SHA120a6b1ac910d93d375919bb3fbba0568458f1358
SHA256880aa8ed3e63e0194aee6285163600f46d6f9474e244986756ad542fa93abae4
SHA51246f1858c905e977e119889f37ad40a3ac55077bc2499b418e1dc6589e5f4851956f22c9064db76b851ebe341cc6aee78f53c28de621fe050e3968e230bfee1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59896445167f326b654a943b339ffb73a
SHA1052a562387922b69639d95ca75b75e210ca73d27
SHA256c9d7ca4c75c1c90868f6ebd6c3b0d96b655fa41c2b7f1dbd2e415586cd05f558
SHA5123894b4ab68bda8626355c4bc26a3c30815ed01f275465178992de88870f8a221a955398fb19e17e9f741b339a36e9c18bd965fac21664ac3ff71c398b054e00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD537acdb24409d7a4feaa96c0f44efbd56
SHA1d3fa1d935a2d7ea70ac0e3af3d501393f3b08b25
SHA256a3bfc317d0525b0fa65ef69d865bf58c12618c1d8c9eb8405ed1c6ae22298ac6
SHA51251c2efdf4d35a0673b4ff15825dd26b2a0b57509462270b4fe2db524922bfb1af69a2db185cdf97c3264a2096df9e0fcf5813be115d6f01915af123ad7de1d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507d348d0ea821c69816e797aa8daa718
SHA19989852253132247d2097325f4cf7e9964cae49e
SHA25631737867e470d3e2b88584bb728910ed2bf3ed327a05d518872f5fd9ef54ba77
SHA51232cf102422c81b5e242455940a620c7dcbdc73faa7dc5f9ecf844abb1278aa7aca978a7bb200e022421abf7a028e2eec93df0dac08136fddd054e7aeb2aa1b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD564b91da1ba75da457f7512284f9f7db5
SHA16d2c70f9c313fa7624006cc0f655204dbd624f3a
SHA256ac01649e04bd89966a67eaef8155adeb8002ebdbc8e965e1c94545480cb7d059
SHA5121dd53c341496f7baab3d09513d7b681d6b78fbd067ef57d0baf800f55954146d21f4761ed8a49f6dd7eb63504c1556a3112d36b4225a903c26e6b5dda578089a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ef7b3841f42a88f85e536b7d863dcbf
SHA1865d4bf4f106d6699c4d90e7202f91c078ad1674
SHA2565be0adab6ae0eb0407f5e122519c5139a32c812dc80b5a16e5bcc27859d9ef52
SHA512e62045427301fb45ac22e037d00177e7baf34a8d1787395236ef1b60a86f574d5492b4e5f801bdcb1f63c93d183c0455994d4e775f55afaf0c3041077b7fbab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc34de8f3fc96a13c3cc654518ae348a
SHA150b8a32585d0a8496944d065f9aff7a84d451544
SHA2563fa97447c9ab0823ee012682fd789b75dbac99dd66c0eb476d77a31841cf1286
SHA512f592cdd76c3fb039f4ecd353ec8c9c31fe9db65aef5ff5c88df1a42fdf1a1f84ebb39a5ff6165b5ce7ad756763bddc62764fce7b9a70b3bdfe28ec53f34281bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5778721945fbcd096210aba0eb9f92cfe
SHA1dda202348fef769c5153c71d272f1117b68fca91
SHA25609092fdd0deb766983a33d95bf354f8f42da539f3203903258e3237f9df19b8e
SHA5126d7290c923b5205b823e8ec927514fc8449bf7770a863ecf011b29864bab6da0819ea2d63e0ba2fdb1788a4b6a1f507f79ae7306b6213187d9cdb317829a0cd0
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
16KB
MD5eaf9b7f26988053a3d48545d13105c48
SHA1d2fec918fdd584df91f5e48240f2a6d9caef6456
SHA256a6c2efbd9e52a5dbc5afe505418953d3ba1403d7fba6aef829d1921ef423d604
SHA51284285af58675af2cdd08af047cf995f09ecdae43a710f5ecfa62277b234401381aef77906dab7bbb09945b7f11d90900e96474240303c10c6e088890a20e934c