Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20230915-en
General
-
Target
.html
-
Size
22KB
-
MD5
7dbb2d6020fde57a61bb10c0d33bb770
-
SHA1
1b0e3b7ec960c0ca875f16eea839970defbd0b86
-
SHA256
fc11519bb3dfb0daffdada3e58f8c88c84ab3613136c7f6a8c37fb7c03efee75
-
SHA512
c2d61416251571a43e5cfe340bccfdf13c65fd6454493ebbc6adc59fd5a0e8744d3aaa62d53e33756eab14de9c2cdf55cc36291857eb951394d70ceb9067efb1
-
SSDEEP
384:rHXlXB4qrDpmReVoOs4An9ylKeGMBUhHhhbojt7vi3HSfoEDQb6p3HSfoEDQb6T9:r3lx4qrBVoOs4A9yI1MiBhb+9jg46g4/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D14F9431-698E-11EE-9302-FA088ABC2EB2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603284a69bfdd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403339129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b000000000200000000001066000000010000200000001026791a27c48734e4d147218898d827ab8e05a0a67b9dcc60faff21a39fbc55000000000e800000000200002000000088a7b9d3cd7e8f0508ece13c52994809b2685c3c1a9fdad1a42fc880f265b34020000000938d513e8e6f98a8f5286d24aeb9c18915a6fd96dc0a04c13852852723d080f340000000abbe0c66d64db197fcd74fa008680049bf8840ccb1632e37780af81983cf63813393fa55b70b6f540729383fa96216917e6264ca5e6c60e03a85c7743bd4e50a iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE 1892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1892 2040 iexplore.exe 28 PID 2040 wrote to memory of 1892 2040 iexplore.exe 28 PID 2040 wrote to memory of 1892 2040 iexplore.exe 28 PID 2040 wrote to memory of 1892 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5900ebeebfc60992fe54d7ddf6135dd16
SHA1f469c8959be4156b62d766108c743c6fb31a2354
SHA2561ded86dd80ed224798f657c3014c097bb6a5aa76f8dcda7c6870473f8f7a72a2
SHA512b09b3e69046244ed663e2d3e8df18090bec1e4ad8a7590d2f30362061fe168c86e7f1a311c08088558b61cc84f91bb7a032c8281d6860251968df5dcaf52719f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57669b983dcc6e0abbbe5530497433647
SHA18179e494d38d51678bce5c3f1ff8bf39bfd8c117
SHA25616a8a9270458f17d4f61f703e5d904bd0949f4e7ce48d8e560dffc37ce917f6d
SHA5120d8f1ea14f18ab22c87f4e7abed9079c9a2c7c888e8308c1fd4ecbecff473d7e102ab619e61ef4bb6429d6f499681c930eea79a933f77d2d24b9180c5ba597d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50857bd3dd56f10ba39e3fcfbc130b1da
SHA12c854bfe9acb972028175a9ad8730e3e741d0b66
SHA2564ee39903d4237e8bb146e59d1146fb26fe6550cec46cdfc354c0e2f767d3eb74
SHA512e02e4c16e3832e907ec20ab66121f5e9f802c4478051219c3fef0c5fdbaf1f889150a195d215595dc52dba0ecac2cc87682bf624a3e415a83a7ec47379a70294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD514f1130fc4dd4e148660fb9e32d9cf22
SHA17e968928d7e59f24b5b8f52d34ef7ab77ade7db4
SHA256c889c660edcf865cba901ba10c3c6911a9e140da5a497c0d8d72291b2d5957ee
SHA512656c09e3c4c8e6f037eda82dd45445f9177646bffbbec13b9eb733c6c0f1e13314586d0ae8748c9ca7cc283d666d0e488b911c55363facd56057dd61ae142b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce9ebfaf1771d738c82cee1c3aede8b8
SHA1e2edf8ad028d490210cf029c75e97b8120382a18
SHA25609e4ae1313e5556be9440509d7a5d9cfa6b33ab5b3996ab0184c1342cbb638c7
SHA512a1661115791addecaced2aacb810d0e3c81f833e2c6c4f89f59dec852bf4b9f1ab190435df93c299799369d7074a332f0d54538e74da8a83d85b1420e66dd222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD569cbb8819e3167977dd98e577d1e08fc
SHA168dc7be9b486a0356c702d773ab978ded833ebd9
SHA25630fcea868b1d4831bb9ac13dba9ca57549b4b7dd26cee6e13c9647f5f302df52
SHA5127d93495ea230202552d51f8f16fb97106113cb2381887d64e5677c956981cf121debeef34e472d0242537cc0f353266f2b04439f1472c228b499b21f9a2021aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0ebdf1d8ac6c6e7f19607ede9229346
SHA1dcaa53e96da24316d6a4b5936f1e291825f1e2ca
SHA256f496cbb2b8883273cac9413445351a95c0b4d79825bddee63907aa63905ebb9a
SHA512595ebefa73e96eeca3bf210a7f2e22f9240b01debfbd173c71890e7c905e4ff026dd8a50310a8bec8380fe1184ca8aef0a6c4c4671abcf4ca983211c2e37f8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b24854bfd92b742501b71af47254af41
SHA1d29a53650c328c598dc5dfd5fd9f0d45ed35c425
SHA256b62ab6bb560c2c55e40ff5dcc767b76203aa51978e43b937d1e01b8be71246a7
SHA512368e1119adfe32459a8bb2a2caf09261045d9d9cd99477e53a9b524c2290c6ca12b7c9bbccf50914d3f684296899d79b631122a1b40f7d58b53bd3005657763f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5527501ef129f21a700eb31e9552e9123
SHA1ab1cc3e57569a0a8e87c43855db7e4016535fbe7
SHA256f27153985851be372e2065f1751600a7939e844fecd6762c2b97f377cf0f54da
SHA512786e62292da43a04cfc26280d43f94710f3d2affba1a7244db95ca45ad980857bde2685dc545f69f436777b5ef92d697c7de78e21a007f01f624928c3cc890f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5452c04940255ac82b95bf3fcdf1a2f39
SHA16bf5cce3a0ea86e491fdb0eee647c7be6d9b1ef8
SHA2563438d3ef0ebe7dbe70769a62edb6d1ffc4386251900f2ee4fbe80bac089e3168
SHA512e3c6d037ad537d818dfc4944e0a1267d76260bee2e995f0938bde97b46299d28c0f62b3a283a0b595fe1f9d171e1232973b94b736b5cdf15776b84d3a6ac4bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e92f26ba1ea8e84d22d3c3cb48953746
SHA1e8b35d2be1a77a7d5b1b8fe36ac6ff6821a76dba
SHA256ce920ea6e81589558e56264c99db2e19cd956b49b235218c9dce292a64536e45
SHA51285d90db2950831c6b542d8199610f751a30a9d8c996ec7a9436a132511481744359080dd5bd30d2fcc012550d76688fe6f943041080e8ed6754a02bfcfc9ad9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5132dc0441118ef20a6819a7b91feeaac
SHA119d4cf4e884d49d31991494cede5dca4e3543963
SHA256b374b7fd2c77bf64a6a5c0ada4a2d66381671c8dd38ebea03f11e1c539e52826
SHA512f4313267fe7ef71e4b340761f067efe99edbe2b7858d4a9fd7c297f69b432c25d4a884ebd2506ff0ec6c15e2b7303495cc5f3bb56519e4857bd57ca40f68ae28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3d055287c8ede710187cc7ef52a8579
SHA12e6caddffdc0f5863b6013c15bce3af2397f52d1
SHA256392a44eb0337826544f6e5899b2470eb92027af0df6f3938cb42d248f7b304ae
SHA5122203e40ef12b551ef32b5db5762e146c345a84c0380def1a7972c1d66ef30f932ce6c860bada2e8fd143e40dfeaa21897384f68072bb7aac5e8ad9e83e4b91b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bfdc6077beb0efe0dae22cc441eed29a
SHA14ad3fc7fe70c91e02c9b098f238afbe79cbe9c20
SHA256077a6f962d4d0abbf2c3114f44e73e96d0f536f76f038af56b8fe1bb284a3cf0
SHA51258198e405c311a4051cabd88899e6bfe374325fc12c62c55b4441bdafd11ac8d057254e8886cba0c3e993963e61e3ee988d55973c471e04b13162c37752181a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ab3f95527aa00d0bba80d68a5a9a6cd9
SHA174408021e50d2e9c39c8cf403f523ed3032a3993
SHA2562054ff8d5e2eb5fbffc9bcb6eadb9664c4157026af1a86d30f83540a19c8698d
SHA51264c804d46006621f0c2030002d18e7cd1495182bc0b64572a0d776ce998c0bc5b8a07c130d984d264fcf90a0e611a6aa2c38339c3c702f20ad63ce7df9cb53ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5696b77750344e4fef5a98546cf939538
SHA1c2e9f7b528e0169ad4355d6ba29441580bfa4235
SHA25618f6fb232e8a113ce1896b280cf194277df86e7785c3f59817dd30781855fd59
SHA5125aa21ac37b729dde276713943dd0177add15a9a2bedc943798d0a8bdf064b07b640c9f723d7ff19fc215a15c01bb7b808f086f841dbd732dfe9284cde5657072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ad2a370404659cd108e104e8d6d5e662
SHA133e212fb92684b8426b35a38af337ca58174dbf9
SHA256e9cebc448fe713e52f002dc00ae5689e741ec8ab215cd5a50e72f3b7a035cdf5
SHA512cea07998d37f9a39c0ba3d379b9c6a1ad5c1e279feb82d35bb2e508859b524a4cab6eadc8ffa35faf685a8a69bde8b5ad8f9850461d1df5946bdf1c1d8abbeb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3d0eca3f8e21c0b66e6cd246abbf8ca
SHA148581fa34f6b8484fe61da8a5801756caf645990
SHA2568564479ce9eaea488046d4cf9b036b657b234f62bc9e0b00e92566c01d5247d4
SHA5127bbb51cd51a3ddc12e15b9ac9f333f4ff4d9ef0a7816da631c03a4f190e3283ed24afbfd753380f1b8776cf161b384ab3cabd9a65b6a488d7fae167308e268b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f708f0834098f2459011bcb2353c196
SHA1931f2f2481ef53d0326fdf829db408adbd27bcc4
SHA2565dae177f5e34891c09e2647418ddb89432253369aa19fefbcbf53640bfdafea4
SHA512f8c9315a979a4cd525f2dba9da6235e13bfb9c7c8d6311ac14e34be397bbe7653833936a2c5a6b836a9c37dd595807e75433c6f2455e7a476652733eac8eae9d
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf