Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
6ca20dc4a5841141f6ad0be4fa09830c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6ca20dc4a5841141f6ad0be4fa09830c.html
Resource
win10v2004-20231215-en
General
-
Target
6ca20dc4a5841141f6ad0be4fa09830c.html
-
Size
1KB
-
MD5
6ca20dc4a5841141f6ad0be4fa09830c
-
SHA1
0a7019b525c6d58eae0e1a8b396f231e7e4c8ef2
-
SHA256
9fb3c921dc68387fb175675567b3b7a70950465bdfa4637cf2336d61e2d1da38
-
SHA512
b060681cc025d68f3c0ed89ee108ff2f27c5fa29aeb2b4eff7e9840f2a5d41d430d61f19737ad25d1c4ac68e063f96b55d63828e495f97c9eb19750baa5e6636
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9DA54991-A179-11EE-B645-EE9A2FAC8CC3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a4e8608635da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409487288" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000007e9573e91228f86a847078bd9d6be9fabd7616296e293ecd2f96eec7ac6ef1f3000000000e8000000002000020000000b8abbcb07f50686bdb130eec06b7db0c6fc732deb0febca4d63d44b0da8e2fc920000000d1cef859ec82894f9248e3f76c15b1df617cab073c6b674432a3def3395c9a59400000006e00e0cc7d778b4710948022f73537e157c09c526b9ba15ac2ce61f255e24b111913a07062586313b3a9aeeec8bc1619c04edae9ccb254e4481c4f87320728be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1448 3020 iexplore.exe 28 PID 3020 wrote to memory of 1448 3020 iexplore.exe 28 PID 3020 wrote to memory of 1448 3020 iexplore.exe 28 PID 3020 wrote to memory of 1448 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ca20dc4a5841141f6ad0be4fa09830c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a318073cc8cf20a197160dd230cf2f
SHA17ea0f54207e18cb24e9553c2376719a795be73bd
SHA256073e4cccb9e95abfc98ecce5d39f20fdd53c464d5eec5bbead40752873d57080
SHA5123926f8b80d034591ab6790eae5597923543b248da020433c58e9803ba449e8b54cf63573721d0a10d12656066624faf336d1ac3b3d5561a7dfbba465ba7eef5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1662426105030ad596e7d7b15ec0c7d
SHA13e15f273608a0f99035f9ace2a6d5e5e03b4aeed
SHA256ca1449857942ec6703ff746de51195ae73fbdff05fb86a8774171d35dfceb296
SHA5122513ea3dbbd4edad12ffb3e7f5b8c4d7c7ec831b0237a71f0cdd9819d94c5603c7ce3869ce1896f97c4c9424346f19f89ab819e8f7bbde6c93dde3f91915c100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576559946a17745fc72e44273a8267c30
SHA14346a2b059eec5be3d8b7d7eb375753671f0299d
SHA256b1c774f4674bd7a154d71b2010b3d1b441463524cf7c85a860f883a226f2e9f1
SHA51210c071dce7b3c156b45acf1ed7a0336d1e8a3b9f73e56a94cc7b444f0d02a6947d59040b3e85f9715ade33635627aa02f20c13f985b1e2984296941f99c46760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5584d800d379aa898189a553f1f06f690
SHA1f5482592db6e31a2c4d6d5145c046fd58dd8dd68
SHA25631f99293d5542dfae8214d00fb14c49be1fb2e732c20a96f69ebd2960029ba12
SHA5127fed8bbbc566a42430a2e1e6b633c8d210cc25ad5a9dd8830d28fa8cbe80ddaed4de63491a936be65be0a021f1b466179618a2fc4ef6ecf2f0317ff379a85758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daaae6105670505610e131c963b9f9e3
SHA1e260485e790fdb49107fc524ff874af8fb5ed598
SHA2565a9f3ed4d9556076a28ef26890062acbb4f295cdef6376e7b4ab02f78cc6647d
SHA5126c5ec59770f79c497abdbc596098ca18895dc0f4f35dd8c34a6a004a0fadeba6ca7d96a9742516b98a19656302bf83e1c6107325a97301158f72ec9ff0974ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583c90fbb2ebf0e3d1d63b4debc2c2bdc
SHA1825a24669124b6dddb97ff21449cec44d690513e
SHA2567468c813a3190fd9660e22e005766fbfc98ccb2730bbf6e0c416b9de60a58852
SHA512abec708c74fbf18b01bd370c8d32382cfeed92cf86e9a2b454afdce8ec8d7248c49d72c27e77a735ae500d6f5164ff4bd68973380b54acef32666a840bd5630f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55afe35f59978c0ca0af946b1b70ddffd
SHA1765a70e75c2dc30445c732d3fd0fb8984af5906a
SHA25688884117dba5eb681a054823c1362bdec4b0572cd1b7631c34ed56fa2dd3066c
SHA512e247762a4193c3baf394b65827285b847147b695c6c814453db9a795d810153fe44667e125b5215748ae8ab34361b25303d311e10692db7fb8168e3ca9711c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f3ad9ee200f6e82f4722aba715a1fe
SHA10229f74ba94209ede660b4c11a4391e94cb8002a
SHA25650cc39a10afee967606a7ff686f662ae44f9a6f715251a58133c774b262132ac
SHA51220ad085265dbc052318ba1c60534db2a25c3c48e2c9b5485aac64aa54fc82c9a4545e478cf8152a73bc45d4659b12902664be823622a870f448e8a97b894eb61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4ba66077734c5b5aa65eefb9cd151e2
SHA1d5db1d3cb1d79259adf7590e04c64bac3c4a089e
SHA256ad6fc947e0208ee95ca8d03737008a59542de17de1ac962729c7bd5d0db23bca
SHA5120bc61d23569d4d9c081be707f01a0aa101d6d8f675545c0c9b6c6f1dd08a7a19830e68105c6bcb4c3965fc2dbdd188fde105e0763798e2db0bf2bdb8e915d447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af53ea3414838661524ee02166045426
SHA1dbdafb8dc9e0e2499ac6ec1e941c32371d3ea76d
SHA256b1cef4f6f2d50210c7b19e708202338d1a04801b5ec13bce554f7a69d424946e
SHA512d36a12dd08d0d63ca93672b7f0bc2d02f11991e6da71e2d54e5b6763d68aeed572946a8bad17cbe8ca9ba180c729f73ab867f024e5da2f26113b7f51f67ddca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523b8ba5bd5e6a02aaa6544d85d7e6dc0
SHA179b440799b9e6e6b375091c15ff4b11fa6d72054
SHA2564a5046ccb7581bc04604466a9ece1de6076ec75418a5c6737178a64e443b90e0
SHA5126b6515aea0d6181c25bc6bda8fa5ad52a5fd51fcf691ab01aad6631ea0c0cd3f457368e3dea640614f5f9bc0db8d2f623437dde5491481abf91eea90c1fceb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1cbb4d1b8b8902c7913bd9ece1f6e5
SHA14f0aecabbe4bf04aa0d2ebd5ae748e4d8ff4bc10
SHA25689afa677d71356316f6f5abcfca90f9034a494b934a1b54782fe29723bb70445
SHA512f34fd1dcd4532fe3f9dd8392a689ca9b465d2331adb68226bcf0b2acdaefabbab8c4e9d5e2b5e1915db4ced1b5ec1eda3f53644fa83d80eb2e361d9afdb46b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f17d87602e9b4eae85b62ff09ce2cb3
SHA110e4e09367b991f6950a1b011e9632f564bcabf1
SHA2568d2bf7b265f7cbe53b04434aa09d2d36d9922dadd6d129f2f2f7f454ca5e2c06
SHA5120cce2d1b7bb4198750ea8466129934171b58823b5f15a9bfede0dadf587fc9edfbeffe76e5b1c00e7e292d7b8b87b338de46995474308c2a4c0e8d1887dcf0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e85565b99b3dccecc3b5278f0341f10f
SHA1692df70616ce85da453af0e528e0e2b663bebe5c
SHA256acc0e8560938601d59503307e7590044ee490f665353eda98e0c915e13735342
SHA51266bbf2715af2643c435a6d7c849c1d938da1e01fc71a718c01f7ee527f90479627a8e6e479c462c6fc36bb74c7bc5ba0e0d88e523da78496883bb4a3466e46e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548b98a946c3d5e1e50c24b452453a5fe
SHA10a827065bd7d024a8f98d84d23c2de88e9b49842
SHA256d9ec71910f7a411e90018afe81d166446a299cae30181b69beaadbd191b6fb8e
SHA5125061ab478944dddeff79a1e3f36c402b5fe69afa1645fea929f3a8a7b3eaa3c0c73b5356a053aaa23c8589ea9f3b5ce6c7576ed6e041eab145fc662f0dfc4348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3127b6444e11da064d4929e15878528
SHA1c6dbf49c15593942bef43dfccb964764d0e5c56a
SHA2565dfb540ab9dd5985f58724eb96768ee64bb0194fc100c45c9370fa302a7ca764
SHA51214243cc2e4e396186caedfd8521fe8d6b62746e0263a9b8e9013fd5aa8c05b9f7fef695be9a565bf11367ab54b69753fc8ba0c713bcdc2ab6c6cc94047d89ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54034cfb07460de49eda1f02adb298040
SHA13556dda24bbabb8f952c04ba6385692b341d9b9c
SHA256a243d28543899d5552677e4f16fea5cc300cad85e76fbe9faeca8a1080b65853
SHA51276510c3c4eb6d6a0ead426877c9a7dad3bbac378c1f3fd7d2a16236441e6f9238d37a1d1223394ca0bca39c18693fc08af7d71f3bb71da09f3e7d3c8c11362d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5283fde324e39b91acfe0f1e64a224d89
SHA1c3c822179cfb1b9c15f0825717bdd0821c81d845
SHA256aee7982ac79a1ad07b02e8534c44e4a8963d4e758cf797a670c55a32cefab6c0
SHA51206a08f58512303768e7a76c6cd66788d58a6683d914032d27f7491ddc0795d31bb2a4c24add8f9f167502c407aa2d5eee345f635a7a7612de3775e2bc3fc96a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d4ad240f23641afa863e54e748c331
SHA1fb61f9014374d50b32a42dec7521c4d1393e048a
SHA2560321ffaae88acd0149e150ec53615661ff901aff6c138cdbbb015eb3f102c309
SHA5121c0375fcc0216cf3a0fed0c1cf8fff00e5984ff3ea22a3579b2557908c0a6e96244f13243876e4aec18bc1fe590d5bd96ee7fc0a263205cc5e973a5794377d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5112d4a238699aaae94f364b652d216ca
SHA1e40508332d6f0062e0886b5145d9a4046941a807
SHA256656ae72f65730417ef965e1d5c02a3bbeee50252362c833f9738e6796e0a2fbc
SHA512384d51b4cb3729a1570b54ffee44c53e5e66542b27a9258d22aa3c70226a15e147f8a7ce53f2dd636b4fc56fdd4e03d6608ef22970f2ac22587b50d894c476fc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06