Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
8f05fe008cf023bb180e244a2f0c27c5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f05fe008cf023bb180e244a2f0c27c5.html
Resource
win10v2004-20231215-en
General
-
Target
8f05fe008cf023bb180e244a2f0c27c5.html
-
Size
1KB
-
MD5
8f05fe008cf023bb180e244a2f0c27c5
-
SHA1
1ad9cda6528aea24deb20bbd61680028f72d052a
-
SHA256
998b63f5bb60b926062d6d2907e9544c5892eb063451dfb26a81420fdb8485e7
-
SHA512
ed025720e6c356004131d3f35017bf85e487a7d1b30e3dbc66c5f2eee7db3354b41ca856ebe02101958c26428c0fc3b5ec9fc06e4248f33fa4ac30dbe4c8106b
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409507840" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5056893ab635da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74A73C31-A1A9-11EE-9317-F2B23B8A8DD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000a91a0e72f794427d758de33a5cf90bd0086d9ebdb8fd82f1cfa61d85b147cb86000000000e80000000020000200000001dabd0b06f9130353cc8ebe6bfcc528c18f7ead68672301949b245b4a6408ade200000001d59da36e1c1870013343103c8b2e1a950524e175ef49f14f065bd8b9f36ef0b400000009a25fcbc753272831043b8cac118f88bf6822a40c83258dba08549b6bf02a799c3928e70a6276f076ebf420e855d61b62a4002d5a363c9a9539274499e22e07d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2104 2056 iexplore.exe 28 PID 2056 wrote to memory of 2104 2056 iexplore.exe 28 PID 2056 wrote to memory of 2104 2056 iexplore.exe 28 PID 2056 wrote to memory of 2104 2056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f05fe008cf023bb180e244a2f0c27c5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521548e3211f59db0475f23261d62c7ac
SHA18ea59a697081ff763d25f78dee1eb47128ac7ef4
SHA25644b68ff87b50f0ea2dd12af4db737cefb8c32e496472bad09a018dad3eedc6a1
SHA512ed0b361adf0ef3855bed18014179073877ff0a913cdceee483792eb5f3c2bce977f43e335b3270f4204d7cba789447e80572231ae0cad59cfb57f68368e7119a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590f8ab314bd92fbc6b6c1ea0f01f46b0
SHA17a029fc18be7e885edfbedca13c712b2369346bb
SHA256891024de46044db17c9f400c7e867737de2315f2c0f95fe409844aa1d0b61c04
SHA5128d5baa07ac6cb48d6d5b7415d7f9fb66e4b80d3af27defbeba416898799e21e2f425d4df188857e5fd0c4697653693a132b533fe8a28f63b140b9f6bb8af0d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f79896d99e6016a1e415b74d6f5700fa
SHA1e69710195b6714e619061a6b85a6dfc08d6294ea
SHA256ee2a6b2c70b2dede912d93ed8c4f85022aab8600ad44dd00f2f09170db99b731
SHA5126cb8ac67b8d1041817ce418ea497662b82b7072dd1a7546fa024150ccc8cb23cacd16fe173a388e0d7bad7c0ec1a7d26868b674da687bf4a7ede6a78f9b485bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d51525d8f17c1961b9b19ac9d3317cf
SHA1869fd9d390b45a1fd370bbb168ffc60674372e2d
SHA256b485a1febb8924cd6a59158e75e7f8e2532461e8229c8b635bb08e9e28cffd16
SHA512617c2d35a9f1d4f978ad8802271eba218d495548909b00832a4e90a173a4d1c820dee095f877d7b7ac13c606ed80099ba4330ee970b6c5c88bb5de4395ecf4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd25a57474c21adc5bd5a7c3fe2c41e2
SHA14d5332eb7cee6142f2ff3f85649759a677584662
SHA25638bbaafd4208236857f245eb8d60b88f6ffb1d6dbf02cba06630315b8994a135
SHA51233361b3906f7958916fca185ecd8c9f50f4f595811b30c0a119148e4e4fc8b5bf717d61ff0b671abf7953f514e0f9f4e2eac0e43810f496521ebe38ccf84d2c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
76KB
MD5805addccf327370cfff55b5ebffbf6fc
SHA17cc90520067be5f66702a1df54281ceb880e81d9
SHA25695238a96c563642a0e2a8b2c5b8dbf9d573501cdd163cfab028492796ac9eb69
SHA512b35366025ace368440d1775a049d8ef3bbc193175364ffb227ca00cb4b56479e55e87574ef1744461fc8861c8c77a813d8e9f9a498653efea8c4abd11a229ae4