Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
66ae44155818587daf30ba2c6173f2fa.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66ae44155818587daf30ba2c6173f2fa.html
Resource
win10v2004-20231215-en
General
-
Target
66ae44155818587daf30ba2c6173f2fa.html
-
Size
1KB
-
MD5
66ae44155818587daf30ba2c6173f2fa
-
SHA1
d153f2a9c7f72156af3a4f3e5800034756af3ad0
-
SHA256
2151056460f6c747f98f3360c291170355666a106d13a8ab845509d73213b629
-
SHA512
0f7b25e00eab9e10aa77149944594ef41aba94484fb9c7d112979947038f81e1f1469b4847d6615176e2750877416f08115d69212d99317f7ca97f2055abcd5b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30442943af34da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000c0818f0107fdcfb4d36bb763351ee14702bc540cf676e9a33a31d90307c2c0ed000000000e800000000200002000000028a402cf503b9192cd4378890708cc1c167d78bbb9e05e5c9ef6655267ae171c2000000000194755a9afd0ee112484524167494a117e2fa0f75dab664da30f270516a66940000000ed50cf69153dfcc758631d147ad9f9966781bed1241d6e122cb3f1f4bca3ef568c3cc30ac423d593d8fc801ae0b92551be990a830e7c5a163eee95fb09cae69b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EBC9BA1-A0A2-11EE-88F9-76B33C18F4CF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409394895" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1888 2212 iexplore.exe 28 PID 2212 wrote to memory of 1888 2212 iexplore.exe 28 PID 2212 wrote to memory of 1888 2212 iexplore.exe 28 PID 2212 wrote to memory of 1888 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66ae44155818587daf30ba2c6173f2fa.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35be2a3b470fb2586fe870aa6980854
SHA1463d7130d2e1ea1054cf30bb8397bec7a19b3430
SHA25608e07028eda2b96195cc7491e469fe75601684583b9add874bc225871a762117
SHA5121ed19510d7d24b692a8f0715e2286a7c7cb2e55a919cb0a1f7772b9515c9c9d2a434c53c90ded490a08bdc6dad8eaf8c69298f552312dd71de7896b852376a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa046e168b6cd1333b2e615f4c2509ee
SHA1889293a1514367780e464a4d9e600a3bfaaf9c4c
SHA2560cb64fe8be8898741be72d426a0504ee089829bab54ae7f8984d4774d49a20ff
SHA512a7799235972d6accdc4cf28a4e137eccd9c0fd0ad5c14fba0c934b5396588e08a444aff91755cb7bcbdab2b2f58da20b481d4626c1f3091b8a47c61153a3fc78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e36805c1401e99459a6424ea8931810
SHA121942246ebdfbf987f6fe9899444b609d04f68dc
SHA25658db2fce58984a5cfc9fd3514df1838404309d66958abb0c34aae54265390bd0
SHA512ecc8e0b2423091284754febe5977ecc2595ee90bd436f192518a20a95ec48ba6c7131c20e7704b84f29da5f55310f52275a56db2f93a23f36fc2093312f440dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594d41ac12171274a13449338ce3bd6bc
SHA1e2a0c88e1eaa879fb591d9eaa1953f2465d58b45
SHA256efaab65748ebb2b9508b24f59545823a1133f9123000b280e3485b0e365568e6
SHA51220c92f13b3f2ab40554dff811dd1660ea47f0b877393577f4d46b15b16b92375fe396ef4f01e2020bfdb35a154beafe3d13b8b764da5a33f7634d3a10f4b76d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcc3a3b3e0e27461f0186d577087db96
SHA198cc89d215feeddf8bc241e021b8233309efb300
SHA2567a1ffa6eef31b210af6d9692c98a6bf07a01ef0ff4510907e5b0763c74a8f703
SHA51202f6c6b166abc80c45cad874cb426c75a4fc3dca6eb4c31b20e25147f1cefe208d45482c7ee3ae432260b8ff04f00c7ecd0eb53a5d98c01455fb7b691cc82d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce35d166d3e31d70159abe44986df2d
SHA18375bbeea0273f4464b532b198c919c78dab91e7
SHA256bde1f97307a0a41a27e17dcdbc1e477e92b700851a8263e70b5083b749cd0972
SHA5122df1c91085f56a04c61f5242225674a774844edebe1119283ec49067917ab330ce362c223115b5f70659ba3dcc046cc498e9c4066991399da5c681a14899739c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cba92baea9a53eb9cc8337339557de13
SHA15e08539600a61b3f75150e40cf157aa6d2a83d1d
SHA25656e0d54e0349cf281b404747c175c2df2d998f3e2fa8e3e04af9a7ce52d8c816
SHA51210a31e6493d2d722c75ebc486e9f1ce4d222eefdbf0158ccd9645a7d8bf078d6b41a5c15f621eb44c92f7a88ac7a7c30dbf78967bbaea224c20b4eb622afdafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6e835324a24178906ef452c5a9e7ea5
SHA1a921339a706945bbadf1583c873f2dcf007ce9a6
SHA25644ecc0f806e6fab5c664c2505ddbad29774c6f02ed71fda89d308fc4bc6be699
SHA5121f53c895d319940b637be11e792859244e321b037ae965d9555132849e53c1fd9c6ed51e3c92533f1fcbf13c57abce6430b5a366c3721f5e768776dd4adb941b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325ccbd2109eb51587b7c31fc18bb894
SHA12855b230e1f70808df62984be5528b215cc2f12c
SHA256aaab1308997bdca93b99b33dac4eb58b795a7164e5ebced8012e74c62e759d6e
SHA512901398f212b17b7bb057174d12681ec8bd14bdd3914c689ea2d228f576c684dec2513a50e12e7cf9c1c8bb7c7a07b9fb528fc28328bd1599387764cae8eeb9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5748343e244176e3cbaf59543e72f8c62
SHA1b09918a930f564a21c7fa0460a52cfd8ab3d5b09
SHA2565b5d48f2d559726ee0bee9062d65a8a87e2ac90f5811815762d3ba5e00f5e83c
SHA512c186a9b02f87e8e97696a00ac8a937f0d7d3869372236d9577b3eb32a840206b107fab147a269b1752a88f091d5d159192364200814a9e4800a3b39b262e285f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c399e0416368c0ff56f227d997c0db60
SHA18bead4e41016b8120dd5d46f3ea9adb2e04cb0e6
SHA256b7beae349b18a47457d961de83900466cbe41286d41eb2600285201bd4d3b6fc
SHA51298dc28a824f7e993951a48985c964c4e178b63452e17cf02ff273a958bd28ff30d66ae18948fae62b14d87fabe3d4bd629ca1d6be72472bedd17dfae73cac84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ff15811e6bd22ca62e42772020af85e
SHA1161dc547e948416d5ecaff5b880ec917a9fe2540
SHA25600c0c407d9c41e7a98668208a8f59f7c068907d6ee13c9dac814ec3077a577df
SHA51257fc2dfe4020c1628161ee8ee149ce1bc43d1e0600620745bde5ed6ef2c17af294e4cbae77cc3b4065d31e7b23320b85f9845241b786b68f4a45300631877b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aeab7e1e852283c0da3e5c8a32d761c
SHA14873e1fa0b1f4205d5953b684db4c6abb4c8816b
SHA256cfaaa0170a6e2a91134e30e78536a59c6d7fd8ff721bc445923e7645399096d7
SHA512e4d4698e2ab87009674998ba9562ac1020a47e59f60f1917bd9fc744d7e58ca71e5cf86666eaf4066fd243e8631d561242d7ae1671a6c5cf3080f5cc7fdb9ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c583663bf4e0e5705d4831cfa5b3ad2
SHA13ca9363f53f34c376425ffcd5af76ebe8173e5a6
SHA256b3b124381bca3360e75017024705e57203167676568cf3fc0bc15ea96fd85780
SHA512c264e50b1c582cd05869b651e1f676170349720e731e24120545c2e670e920d758f3747887e4021c1095d9d54a54c31020ac33f47338e10dc65327cacef836c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599af28d3cb91ce78bedfda6579733a41
SHA1f6dfb07dccd48e31e873ec3ae52c77bdc2df5964
SHA256a8c5afa72ebf694cafd02adb180ad685c4eb23855b96da182dbfe2d28db08fbe
SHA51298ec3ded58d9ae2076b9e19dc345fc46adf14161aa782da11006ea290312d3d91662a7b64e202469dcc4240d8af02802e3a480c8ed9762c1223d204f39448afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fedacfcb750bfea8ad5d2ded882df6f
SHA14d7b3542f3927aef6afa193a593f4b80520f431d
SHA2560f47b11f2466463ee177378fcb9f9c542f6fb4a659e7fe74078d6ecd48c1f02f
SHA51291404a09367314415baed25d05615a234f2b5eed6dd67b81934f5afd44b960c2c95aa4b40810927779c5990e0849768307075e43ed1c85747f82028a263d44fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5318ed0a25433b5c6cb9b50b52217ea95
SHA188c78f116f5f33406dc758c3893f1c08e9421a99
SHA2563e03c2cad1723a66b9ea64c0a1b93da950eb8e049ae39cf583457d83fb24461c
SHA512fed11950d16dfde339997b20df9fe5cfc9f3c50d40d61fd9115696b214c6ebffdfbd8f7c8fc9d8b48d0373804f68f783c548ca1d0e13bf8c3cf27afa240bedc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba0f886ae3b1787a0ba7386c9ca87404
SHA10ad41094049b2999f18d76552b17a607a29d716a
SHA2562e163401e7b7fe86c5e8ea01e9b1ecd29916ca8f8f620904c20d7e93e7fea69e
SHA512efe24ee9ba8b960f7195296c5af16a66533487c2a515486ca3e814eab6ea59515d0af6c53e4220d177e1eec4e58762366b7356ec5ec52b2a4c144d58c3038edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a0b104bfa7f3bb890391ee4d2193d1
SHA12cb821f8335a2a718715475272ece2011352636e
SHA256333cea4cac13e0ca75fa2db156e70b732c57fa07d4e3d287b2ea190ffb5f3516
SHA512f7e2fa9f40dcda8fedfe1703e96462782dc4a2897e4a19fd7f96cde47a413be99474fcef0aab8edeb68796e75b47a46b82104087e92bdd9e1c40857fcc436cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e00e06b2e882160f85879af7c82b35a
SHA11c2b812ad796f9fcd9deab802ad63ecaa9910af2
SHA256252d399d0b2a206aeaf1a2426a25dd8551a3f7606d5e26918f245306896ee5d0
SHA5127cc81784aea9643b1d49722b21cb268a86b2fc13f247a3f1ca35857674244418cbd4d5bafd77968e6ca1a7cd128e83b8636268bce853c8c13810fb4f0eeee762
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06