Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c782cce5e9af638a475a3504eea0cb00_JC.html
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.c782cce5e9af638a475a3504eea0cb00_JC.html
Resource
win10v2004-20231025-en
General
-
Target
NEAS.c782cce5e9af638a475a3504eea0cb00_JC.html
-
Size
1KB
-
MD5
c782cce5e9af638a475a3504eea0cb00
-
SHA1
c955950812e629003ded8cb0301ec34ade6484b0
-
SHA256
b0c2b90dd3b6adc0c407452bb3efe94a4a26179470f88a87498560c0f0288992
-
SHA512
72219db93ad3d200e71a8150b692cf9700cca57f3aa65dce2a0a9351d31122b877f4552fe21c166dcebff743031e9228c01dc9a6e32cf63963307a6459ac6b72
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21C473A1-790B-11EE-B323-D227BEC38C3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e819f7170dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405041789" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000099b8a3c6ff97044781f9dc0475faca410000000002000000000010660000000100002000000093a298ca71f05f1e5afe3821a99c35f09aac9941a3b2a6858e4969f95057eadf000000000e8000000002000020000000ddd8cef3280ee47c0b8796746810282e3f0362c45e9320919f8831f24e83246e200000001f2972d7c83d6097cff7d21db7b8acfc48facf7ad95589c420c901761c7d4d3c40000000dd07db48654e9882ffdbb2aec702c2d3c98faa501c5f1e1c5be0a090542497af3050c0bbb983a23acd75c21b431e7da4a1c4a79764064d3b848c67b472657fe6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2736 2412 iexplore.exe 28 PID 2412 wrote to memory of 2736 2412 iexplore.exe 28 PID 2412 wrote to memory of 2736 2412 iexplore.exe 28 PID 2412 wrote to memory of 2736 2412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\NEAS.c782cce5e9af638a475a3504eea0cb00_JC.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e264ce3c5f654c7abf7cc7d71200e9d2
SHA1bc141c287f539709b0be3b37fa00d4be5737e78b
SHA256ab214ed7c48f4efa7b769339030e2acd294a664595e1c7af326fa540108d5c0e
SHA51218f0f4ba3f9092306597dd6df2ebcdc9eeefba45de9ec461ffcd5c400d256d4f35033a1974dbe9dfcfadcc113180c40264e05b789871b70a46662b2e5adc36d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e24b00e3f0bf64755f69ee312bc237ab
SHA1457c9ea1153b3d120f08da2b45eca63f693d0141
SHA256a705beedd0037820d8a094832e2c5f82b2e305d5434d6dabc6f248a4f27d7023
SHA5128f015ccf0125ecb262c1c25dcd1a1cb0dd7f44dcd5bc0654f036c9c09dc0f7c65ef0fb046d2f2a3e463f647951180691acdc82ac05b87aa8030b4e35192c8271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcd367d998b6505f7f86ebd2402ba384
SHA13179eee0d84a1d247af73a934f28caf9cc671208
SHA256a5f7fd32bb4f11560c45ea635e1a3360f56c4d827bc25592bdd8fa69487d56af
SHA512469d68d4aec2e1dac041d653e027c0e96d9f2cede514b1b5115f6ceb8cbf4d5db793e2a28de8530fac7ee3b0b38ceda579be8c713cfe214bd64f1c522fc910fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af1baa8e522d54d9d1ff136c3be1597d
SHA184222d2b1d80de7c31523a4da67a211ac91bf9d5
SHA256d59fbab81be53467bf7dd59da7c45a12f8f4e89bee48183fe596a6be2e1f32eb
SHA512d4b6652bb5fbe677d307d6311f9c1af9573fbff4a847bbb66ebf9c18fd044530e08738de3c3650a3e9beaee0eea977681548bd19473f393342f39035cd73e247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc4b24542b02624df5c9a383c405f980
SHA1cf5fd9c53a78429eb74de02a2a0be4c10f989b4b
SHA256f5ee5eab018fa93c648c2321c2b9ccaf5055397636d14be0fb7cc3b13c26bd99
SHA512b756de220d1cfdead190464c875508110ceb139398a019ef2865f76d637b8462341c5ea9579ca5ff4bf5218c3ce7a20590e02852187b3ac3cb2926f47b641dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575716ff9e00dc7aa8c637918abf25b57
SHA156891f23bd83e23e0948f694eb3d85446b5c845f
SHA256702942325a7a99c1bd50c62e69af73e583219cc8d34af011f8e50850ba2ce6cb
SHA512d83ca488b1f6bc2425d2c7a309fd651afac6930a3de210c557703ad323609e41addefe2d653b33011af8411c7d5cb04231f8f63a2a631e2c3ed3d4f1d8a4bf8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5911be3cc516560e6831e34001e8b797e
SHA1bd4e5deb08427d36edadcc10d8f01e5291a9e9a7
SHA2563d4eb3283d0621d68112a43fee4e22c7f55d0ec14826e709c918542945e3ad08
SHA51265bac6fe823f158d7b61a6dd898c8f8dabd6864e71089049d020f865c9d049f2dfc583c07c065dfbce371903cb9f084fa12300d84089fde98c6e1b937044866c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e767e6c98a9be9c68ace077c660379b
SHA15291025ccde2837a1fa72e35d06acf981e67ec87
SHA256e4356679a3052cd531551a1e701858cbbd650c940c562b7f8ff3a04f45996f27
SHA5125b0d89ca5e9bc8bed3b9ebd2c068276746943677153df124970d05ca480781d4748c0875926df5a8e245738053d71c55e25b577a2c93eda519710cdecfd5e765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2bcdab6baed10bc78b71e03f61b592
SHA1fd3c1919270dc7f001c919bf135769ea77a7c43b
SHA2568b35e1541cecd0e6e828fed02cb222cd7a5be2634c368cab83c835ec3e258507
SHA51273ab744c97020ab2de8e898b064cf04e5819c0648793ff7b50aff4b290073f36a667ff4afb07e680a53fe28e905c4e75df6a984554d290ce78e174c37957275b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e62caa628963ff6008a6d032a660d836
SHA19cb21e7f8d280f913dcf45055a1c64bd0f2034f2
SHA256456dd789017df5dd62545bfd62b14b3b4fd49482bce3c6e730307cce9e160e91
SHA51291054fdf106279d5a57ce6b41981f08c5ce1a9f33c36e029cf8d24e3cbfc07628d38b255bc1d53be86b8d7b5ee9aaeff49472d7d0c61ac617a2ed64f6afae1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5488ab5e15841be443c4e7a3dcf9f8cd1
SHA1557a205548ab80081cd5dcc396d65261b753e6a0
SHA256a0d3fdf96d166b2fb446bdc6257a3550bed871dadad0d6bf7b946258d9ba6aed
SHA512c38d245f8b10d79a3246f37503ab11f6031831394339953c5ba7e12b50d650be53f48bed7ad5331c5dc5fe93f8b6992a9e47ed8c8fc542d37bc863851d7da91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa425ad0bf95bddffa2485c8b4679904
SHA1f7f373719bf6320ea20684f905e26a47b81b2618
SHA256da8117a43c08debb4bd756c6368cd64701603fe9beca59ce6007a5b2e493bbfd
SHA51279896d0013260c62105ef1cb9f90ba00f8607e498a272f77a5ecc78c2a9580d71f0d8d5108d6a14faad83048d12fd3e11f2b6d8072a20d58938af8af9b46503f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4717c161df6dfb8c7be9094486e0ebb
SHA12e17b6e2290e531d87e9ce9916d8e6527026abaf
SHA2561a278d9f6ac6979584edf4c6eebf8b839f8bee59b25c8f9898573a8292f84e0a
SHA5122ce3a9f57e046b35eb14e2398fab26a9f7707b55a3e5268c7ef473223dd6c35b83c9734d4bca224590ef571ed996a84765c92ecee3666bba5fbd1cbacccff188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d7db40f5d207ae4d7ecf6d6005cc62d
SHA1377a4945dc4f981235dcf30fbe173f2d8544e713
SHA25676f38bfcf907038c2589b09c97523a7ff66e6b71cf9553cea82316650de4f79d
SHA51243a661722c5378c418c91c583377140af12c79faaf44dde269f7d8ab060423e2201281cd99f2a5d6e1ba76844532cfc3ecf072732f3049eb0cb89a01fbb25a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbc2590b8e8c219233570206bfa2cd08
SHA1b341e995e8b4b65e5132504dd3a9bb9c5ab6674d
SHA2563f1eed9077632997accfc1c364b666121cfe4b0492011940a9fed1a9860b58f5
SHA51243bfe5391d5f9535f95b05179692ff478a53b5c82d6aae0a73bfab87fa459fbbf04e886ef8fc20c7408a0e1d7ea4e5dd40125e1c98c2402017d18632f7ab9ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1caf92428fddd3d3016c8e07bb7b0d1
SHA1d9e820e583e528917990bbe66e74defcf98e625c
SHA256a8251a6f39294da1ce7bbb052d190f48b94f72e74c0c88372d535846e3b5f363
SHA5122af74fa87ded63c74681478ac170d6f92746f299dcb6cff70534a27483e72b4cb25450b029325c8aea3ef02a3caa1af336f0756be565345f10fffdfab5b4b659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51326e5f0f6fe0c74d07d5dcc1f4e5359
SHA1caaa018fbca60001f9a0f6f5ddfe24418d255b39
SHA256aeaa6885eae12762ef39fcb76dcf2d7b44f6e070a8ca04e0808ec9c7132753f3
SHA512f666a60fb01d348824d029eb4239ec99c1ba6baac86572292b223499e262d78f74002478af3828fe08f9efb772b6005da354e7d389e337475bc49e7c2fc78eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5779a2520a33f7f111b51e3f851260cda
SHA17970e745740a23ead50cc4377f7f2723fed4f932
SHA25679668da93164d0cf18c8bb6743b6595210fa1aba5e9e62f6f6566927b86c19fc
SHA512b312f3dc2976768fefd4f936d0e87d30b210d64dadc8772665723870ae570fbb09b9a9225e762ce72bd25adbf2541407ecc02b5ddc734b82e9faf2b8be6f2611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c712b3e5a8bb9b67bfc7fed3bf443f
SHA12f6700150fe95677d80be3462af978b4b152e05d
SHA256cf0017340487c1fe11875fae1978777db5fd658d2e243420312598c7319df93d
SHA5125e52de777c93e04561097d67f14abc3e6509191b970586e4a1ddd3b384152a7fe11d76f044cece5e3ce06e26c89649e0af2ef4eed05fc2588ea6a9e3493d2a42
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf