Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
ca6863a77900ca84207ec61bba756a87.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ca6863a77900ca84207ec61bba756a87.html
Resource
win10v2004-20231215-en
General
-
Target
ca6863a77900ca84207ec61bba756a87.html
-
Size
2KB
-
MD5
ca6863a77900ca84207ec61bba756a87
-
SHA1
fd9f02c4a44e42ecb78054e1b37f435743f07df7
-
SHA256
3f17191639dfe7ba4babebb9c481d76517d4eb313673362e9078884c5b057f17
-
SHA512
eeb711280600a187a3fd7b7c72be6138f5779842461ba51b249940737f9af283ea46ae471f8d6cc14d357d5a0ebcf744956a304c889b2f06dbf8b7721e6132f8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1035be080635da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000eda2d1503791fdd869479a864ade0d101f32d98f43798325ef578f467e5ea96000000000e80000000020000200000006c7f930d6f38cde2cf0f59c4ce1e7391c69767286d4d830bbe5a01264f80df5d20000000f2d1ca04e5a4046b18b2d4963d2227de09403767c5efe1f34787642e28ad52d04000000081574f9b6369a299dad88a6f7704c6bf7ff54a4e3f49a736334f13cc4e68c0930914f8421cc3a8d2f2f3bb7b7d8c3582b4efa62fbb47f47f4b6ea45f073d6a78 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33656D11-A0F9-11EE-8CD0-DECE4B73D784} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409432135" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2648 2624 iexplore.exe 28 PID 2624 wrote to memory of 2648 2624 iexplore.exe 28 PID 2624 wrote to memory of 2648 2624 iexplore.exe 28 PID 2624 wrote to memory of 2648 2624 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ca6863a77900ca84207ec61bba756a87.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef254a2822fe914f1354109f940f53d1
SHA16e1e4c2a3f8c225418eaea14bc5d5075c434249a
SHA2567bf79c18d413c58875f07ad9473b1465015c23562e0dcdac3fda45bee98b336e
SHA5129115cb456ada821eb16ff3043efcc36ada4656a71f7a7e29d940d5cf453ebd43c388d87eb5e921a27b388e06aa6394b92bcf013bfcd9ab65c254c5e66c828180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbb9d65d4d710cfa55e12a489f37c8bc
SHA1eb5ba879d373b434cb4d73c8210446c5d1f08d4c
SHA25619fefcfd51ce26166159f0e9e51835c1e5abe4f6846529b6a917a5a6b3abe443
SHA51298645a15ac4cdaeeed6827a0ffe9c815f3f676bbeddc6d6b48cd65541b30f7933350cfcb895d6b1cbcd8c8f43fe967a9f758a51a985963b94c955fd3a34073a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e3ebc233a97734c3a77f474c07e54b
SHA1b6a8278335481c37f8493b83e12a435c180f3fe1
SHA25624ae2fed02ee0efbceffae07429275c60bf9a0a363506f1c1141f9f75ed81cd6
SHA5125f117f1c5656fd2dfeb275733b1cbfbeeb47eec5ad4e099c1a638a3dd7a04ed94a5779939c12ef2939dff32281af1c38cef0fe60a889ae35b04a557c7fc52acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f073f56fa4a237e1593e13f6c93a72bc
SHA1237679663b135e7e34b3618c7783c8a611304b80
SHA2563158720c7957f7ac3e98bbffe170983719bccb2466cf5d4f2e2509bdc50a2f63
SHA512f64dbdd30b0de83e993bcde32fbeb089c147039db2435f1242c8f365bb49f4911644926216d1fd094a92e19185278abb09c0a383c760199357498156d8adde2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef50f323e907361b6d3ac7e571dae97c
SHA1f808e6d54e62344dce00bc96f03b9e7eaf3fcb6c
SHA25698cc4ae3464f6e4702d9721015663f47811f3e0606a2268af3e2241d5c6a2a88
SHA5127ded80c9794f1173a8015d3b45fc41aaac9669077cc3bed796b393449ace3e64b19457db9c333a71b866cd78726f712e9f60547f7a153df556dbe4604edc5a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e670758df10e586177fff4959ae222a
SHA1f72de6c87a3c84c78ead8c0404adb101759fb397
SHA25600941ac11ef6e2e50402f148b71cda75f60464968af9e12594467e328f609c05
SHA512f7af79f25e230be043b608d854bd28b6153e036a472448999fe2520f0b45b1d4c427afb149d9039cdc5926c35fd633b590056e9bbef9eecb4221ec14017d1eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbd0982648926a047f3489054f7370c
SHA10a3d2d66609b4f23bc7636effaebdcf1f7d77e62
SHA2566248225dd727b8b5214e2194a0173c5c3e21fd8b004382090ade72f68c1da263
SHA5122245a291954adbb30e9cbe3c803bc929f80d5be56c1f4d57eec50d94378da183085e6c41a58341fc0f0eeb2d5834579aa54d12501b0b2722dd8d2bffa3d368b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5551f0d94592c015c4135c35dfbc9225f
SHA111543d25cfec52ed49e87ce56c340570c2f7ee16
SHA2565a1d09b9ecf42eb0616260ee539969e59c9b83feba5fe3a2aca9578bf35be024
SHA51271196834f77675b57bb72d340c448a9c3eec597dc7d255600feb4e085ce567268406074118c856bcf006f7dae75838511a5e0f63cd6cf9bc1cb0f17ced8bd2f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd6b58a781b93aa215085ce65828708
SHA1896783a3de989add484a157554828b42285a9e02
SHA2564da9d2ac67ab12d586870c6a74d22d824ef88e681997aba00b6d902911eb3d78
SHA5126bb7c3fab5648a0611d7041ed6e68d51da77046f5055ed13b66a5db949f1b5acb2bbc1c8bcd42f4079e264643a790ebb76926746f4d0c2d88a8b6f274a81dc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e895d9287b7c2240c8d1568b79f7e8
SHA126471ad07de6959070dc296af73f8280d7e1fe6c
SHA256efab7ce2cb3c6461f21dcf21a2d9c37ca9a93c9e1c29e93b2dd166cdfe3f006d
SHA512a02160106a931e6bd63db6562a3903cedc172b88bf3935f30c20af6c3a457334e40f63ba9fef61edc174641536b3e8ae1f917a8e22aa86d0af0143004fe7ed7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8ceebff96627672172676da03cc559
SHA15c90a43a00583546c7547774f4a51c7018409d28
SHA256641881253f756ff9b6e2a9bcb4e27622c0dfbada1b9a113c94381211a4ab77ad
SHA512ed44b56fbbfa8422531a329a62d63e3d66dc0537f2fabf10fc945cce94ec7df68aba7735ee68e0dd757eaa32459ba428a8b8991f6a7cdc3f1c4724d489814b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb735f46bc75cf2a032a3536b9945be5
SHA13a3ec59a4bc08d7200e5ddaa7a2e47aaccc1f097
SHA2567908c49d434d5f4ac7c5bf37436ec2753d6bfcae336f93b633a98f5f1b91381f
SHA512fbaa4294b74c25e05e9c9c66a104f64d23fc3f5206aa4b84e6cb7cd69514efe252579ba220ebf1a219042b572541294f59ca5f29d6c6986c7602f2ca1a460334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514e4e2c232b1a15eddd65fde73a25804
SHA15158860415e269720d9193926b228e2f7939a92f
SHA25670c71fc32a5d3924c062c60d2b7da9e82747eb3af678d11e4b7e768441a02bf2
SHA5120b246e544363fd15d25f447f61f42e0f5b4b1563ff990270f6ae0fb0b432862f5b42fec758650198ce5a2a061d3c190ef1f635f745594fcec38ecbd46d92e052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e76be83f3db7384cf923ed778366283
SHA17491a619cc31d8cd9423908fd70eef683c8265ac
SHA2569b38ad0ad0f95d2ff0622e1c75dd8227649f8441d15975bc9fa81d7ab2db91e8
SHA51290af289e1c8761e8a6f8e496371c58b7093b0c3bcd9c8373da10f41920a5380088d23515db044a964191241e1f480133afe90ef84fc8f24e9b2eaa2da2dae176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5146dca58bd79143363d5493cb5f56e04
SHA178bc48a5833d854952ebe778022a50bea43b1e36
SHA256c8d8ce4a0f35109d32aa295c44ba11e8552b50e3f270885d777ba62f1fcfdb98
SHA51226e4ec175ac48450cd9c8b9b52a3aaaa70553fdc14606e8890896c8b32e98e89982d4e150267891cec224cf0673d9cada3c02725bc974a013e224b93144a48a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee4b6a40a27b6c0d0afa7242aa4969d6
SHA1ca33744ca307c5daad1a9a98cba4a732a5fe095a
SHA2564ca42e42772bbb5b03b547670e70a74b2873f45fb082d90cff0bd1e6990e310f
SHA5128877f987fb57dc8be2b859441ddde80ed8dae6636b93168ff20f8a971659ef29250e25a5459dffb7e45adb758d560f6dcfb560a0335a2d7714a2d0bde33e8c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5065ed2cdd3784a624c58b2c9365bc691
SHA1bf77f4d79ba19fca9cd92ebdb8711ad55462521e
SHA256216421cf024336413e72aa6809b6063366b635546da814f568ea8df729dfa19d
SHA5128768a981a9695163c41da7e6232750356acaa1becc4e1cfc590cbc9433f0327e6460c30e5c4ea16b570f72fd475546c6509403b8095bc5fa6d1063bc3eeee820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5601da7fac34ce1d90ee244673fecb43a
SHA1a95c7102880ff45ca43b30e27198d14845c7674d
SHA256f053c0d7fd395c5d596d70856edefeca2bf99b020ec4c93004ae91bb2cf13c23
SHA512564ae338e07ec8b75519c547c31e1723bc5b1746a297f8166f5fb38a79de626efba20e34ce021c56615900a319e46b8dab390b9e3e8f9775971c529700ac26af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573063aae0766fa34abf7fcef2706959f
SHA1d6e9c71baf2a91c605f98c63ccc924f65732d000
SHA25637b5617332e00b275445b8b4c6b1b855a946b652c00a004a11d42d4d684e9261
SHA512ed267e0deb49f152a6e85a081735c65eaf3aab450289665a8d42a671b68f073efa5e10ed1520492b65877219cb43a8da2d29a311b9eb12af5c1ff961a286677b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06