Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
botclick.html
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
botclick.html
Resource
win10v2004-20231023-en
General
-
Target
botclick.html
-
Size
1KB
-
MD5
5343c1a8b203c162a3bf3870d9f50fd4
-
SHA1
04b5b886c20d88b57eea6d8ff882624a4ac1e51d
-
SHA256
dc1d54dab6ec8c00f70137927504e4f222c8395f10760b6beecfcfa94e08249f
-
SHA512
e0f50acb6061744e825a4051765cebf23e8c489b55b190739409d8a79bb08dac8f919247a4e5f65a015ea9c57d326bbef7ea045163915129e01f316c4958d949
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008d5ea254cbc3cc499365b391a5fd669200000000020000000000106600000001000020000000f5d2fe26423dace7caae5c0a2fbff1d35121fd501e1a183c55fb40c7ea91593b000000000e80000000020000200000000c65fd04af8c64d41a2bfa9dd31e69f8cbce8b64ebd31d7b01f9b016e0dbe6f220000000dcb5afffe317ca08fd34e263fc764ce9734379bed33136351feee6634335d79f40000000371c70fdee07fd72623c849f1c6b8fb18dd918c8e555ae36db132461ee91adb006047b384c320e2e77826b79428b8d9e16e061a0ec793ceff717c3ff60c27311 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5264E8B1-8490-11EE-90DB-6267A9FE412E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "406308458" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fc23289d18da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2328 1712 iexplore.exe 28 PID 1712 wrote to memory of 2328 1712 iexplore.exe 28 PID 1712 wrote to memory of 2328 1712 iexplore.exe 28 PID 1712 wrote to memory of 2328 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\botclick.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5fb31c046c08573f86dec0afccada03
SHA1d366a8455714482db9d507468790647dafe19d2e
SHA2563753c2c891ef1a565d85ca47ab66de7b03ac896c52d69eaeccc6a783046b7d32
SHA5120bf8b755da669a696c9c222aff6ae0abb08989267a96a7bb489a92ad8c5d9fad9ddbb92a19c653ec9c122efa6d375d5c478b4f8c92deb959a135308a89e95c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb27e03682c52b4316fa835525343347
SHA101d5a6cdd1299b7a0a67fa997da4e57eb090e0b1
SHA256ffeee0c7a762c83fc5d253f7c312586adab8efcca76bc42676f3a003f9a7bbb0
SHA5125fb904d4dedfb6d3cba6a1565e7f3e38e31dc79d75051c2d44c71355248c2d4d462f2ab2034b8c49657e336d62efe57902fdfcb84e248b61e69550fd03f0a408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb731d31c82715f1f743e2d76b5967e
SHA1815f52fe405abcce50f72a926b0b973dafcc203f
SHA256eb59d0feef591b3459beb055b383a40c9ef67855d52627c67506225d04968523
SHA51223ce127854d9cc476f53f659de3a58509c171713ef7520ce8bc32fc969d7069c7259f97b43676683b4ed9cff0d6802c130ab221e462e922a878beb7389db757e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52090daf32e75ff1964dc3072fd8df915
SHA132dec3daf0d910f363693b21d95433d26b48526f
SHA2560d27092de6ca16f846808f161156fe4572d8d198b8b1708e93c35d3e4caaeb3a
SHA512684dd5825d285c3da398437866576d3ec01f83e61d59c8e111261491905a292e683383222ed7d754d1c6bcbb243fd1f78c772da334490ff9ba086b8845d9b3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c5d1075e98dc5b48c8a94c6a95d3b7
SHA1de27cecd2c20bddeec5252842b14481d7cd435a9
SHA256dff639458c2918b5d847d36e1fe8f6b699afd00942497acd34fa14148941191f
SHA5125936a05e71086bd17c8fff659c84a84409848b6458bcfc092853f4efd3b1b63fa3734cb5be9ceba1ad5d8bc8ccac4e3422dfdfc16dc03cfbec1767f8c564e9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb744de180368cbb914a07802286259c
SHA17d0dfecfe4de5da6115197f53aec3dcedc7bf02c
SHA25663063d607a1110b04e1b96791d4f4e062460643d269db0ce89e6157b76ae40eb
SHA512484c51d380e6d6451e54615ecbdc53f468f39e8d0b382cfea5723f262a482e7095d9cf36af151a26bcae3809a9862560eb44493f15a3932abc3f99937359a114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd4f52231fe593c4ebd1eaadb2a46c7
SHA165a3ddddec106486eafd1c1738b2ea3d30b26432
SHA2562d558cf111c39f194561cc643f188880ae17319e077bb564f8786bd4a107cba3
SHA5123520a743fa639216e35125a46220a3adf7b609603e4429aa2bf6d75857594e64a5a80d826046e71ab31a4e094bab27cb768b8de96313df5bd7becb7eae655b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec3df21f9337d575f189c1b6983a06b
SHA191700d56c68621e62ff8864f5bdeb15c2cdf2365
SHA2561fe83b9a6f89664ff4c8bdeae2ac1e7814d056a0eec1937c1e05014e9d706bb3
SHA512ad50e891dd89d47d9352efa0203f9e063ca4a5685a82f1583da23e085eece53487d9b159db3c4c930f132d2195327c5eeb0f279d6898af22766f7006919c238c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdd2b406b4787f6c6e3eb845205650a9
SHA1e8966658866e287af398b86686a9b55514999776
SHA256972c070cd89b8748b99edb09c4b34c08a7ab8577d58c035fa0c79b81d6b856f6
SHA512441d2e90c66c99e25dba2dfcf2eea327d7aae4b0bfec373da7afb13a575ff22571b7384d68493df158e9f1027c43eddff6f472ce3b04cb6b0a40e6f690de22be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc1741a0546507f851c92318c0253f68
SHA156a3ed4ba0b00ecb9fccf58dc92c0d0e6e856363
SHA256bb9a5f37d4b2c03725cc06c29023d998be8772b74d6f8efc623491402694fefb
SHA51205f958f69072bd10631528e80f2c268abc6c5944ea35f401795a304f4a0ccb0cfacc12a9f928c553005b6143fdf4c203862cffdb7f53190ad5f728ba86e6240e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f8e2146a55e9b714dcd7b1826f2829b
SHA121822f9777d0f3d3507acdd4af9e2e7f0570c4b6
SHA256bccab4131b0d3c8175c9f1ad977fe9b7c9147a104ead49a9d14dae98e9ce6a72
SHA5129a688b25c70c6b52d36eb0299d0a63e94ea45e52219ac1370b6269fa3720acde249aa2b4dac500eec5c54ec25c249db28c124c335f40c464062e66084fac56ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540141112a796118c3c81d254e194f300
SHA17403d8130ffa5983f52caac4a3d890309ee09459
SHA25662de1ba69538db305542ad1ec33ef330eea2420245d287b85b0ea75430c5533c
SHA512201ed7b7d7adda1e842288e75243423d9145d5bfa6ce9932918f547741853411b5a92d8159bcfd52612aea774be6cdcef8a117b54fcfbe77978cca66fe3af75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58849d35d2e1bcd1f891a63fb4c71faf0
SHA1ed8f99b55961b944d4370bdbc3db30c42e626ea4
SHA256de797537eb98a49899a7f9282e168f099af884e96a542a32ae3e19565351f6fa
SHA51257ef501ae58ac373ecf6043d3178ec60a5edfdc25a806bf06380d214f1e3a4311031841650862fb1dcbbc74aef728882d2fd1698e2f80bb58c601324cd573e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523ab500cbc1a3367a34ef11f2ea7238e
SHA14be8bcdac7e65e427a4c4aab125f794cef35cb0e
SHA256573127eeaff33df50ec079234536c4d09993c62221d047e925aa6deaf16ce197
SHA5128cfcd2abed69f2f5d01c4336c16d4597d7f014aa9b4003098face36372df691e784bca128adbfb22f2d110a03f61d074040a34d45b703a73b698d31b12fd06e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d51d5f70bc63376241286fdd3578649
SHA19902374b2be0e84fafe07d289987dea5fe7e8c4b
SHA256d56aca86920ba7c8758cd882f29aa4956165dbea4d01af980c24d0d49fd94c5a
SHA512618ae7a7607c2a6c4b7fce4e3ddbe1a78e75a6bc3b413b09a9d23e629e36f87d5188890cd61579f8454e718e3269bb9a76e86367e396382248af658e2ef3d0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9737095e6c607f15fb953964636379
SHA17e0ffea37401c74f155bba2ec63086e2d112e13a
SHA256ca86f5a4c02e952e99d85a2d566546898eb2e1215fc3906c92e1441ee51b9e6c
SHA512708f20859f3332f3f84b0111f2cc25799d46f603aa220a9282fada429e4a6e1878f331865a496aecd313779160308b2fe422ea4b7efc4490ad20cfe68ac73b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5950c532a57abd7e7c61d7b3169f86f8b
SHA127df250bbe513d435664f72393b175a3cb63e462
SHA256d7a69ba165fc464c306cf2de27df6920cef8c77ba9edc30b6c73b72dbfc1db4c
SHA5122c5f044497f88a92dde1ca198471ac2e1a6ff7eb0a2509f6fad5f6b11270555957e393103d5917441275d443ccb072afd3ed84316be38f298e2e3de61d514a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3b4c6bc56b24fe64dfa435bbb006ee
SHA18eac653342440c9f38aa4ee7cfd2518629a8d367
SHA2563008d279c2740f8bb09eeb729b41c87c1acb55f73b35e11673d7a40ee53c4578
SHA512097a89a46783b3cbb6793a7c6bd0d5413cbb9a366dff8e743f3b93d011664583d1ccf843fea788a0ca089caed6d72b876bea79544b635acdd1610d4795dc96ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6afed7a35e9fe1a5a7f475173600c8
SHA17132cfd6a7563d23f6a7bac053dac4f9de474dc4
SHA25640f7a0915f8ca96220d15d0c21c8609eebd6206ea5944043157ec56e38ee05a7
SHA512a5e362fa2e3218f9accbf5e946acb11c8b0fe340007cd7c05f4eada3366d7ae67f23d7c156c847e333195c1f25b46e8c8a22f1278592c2532808c83ae821f7c2
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf