Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
e91c91126093ad3f01170013b511137d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e91c91126093ad3f01170013b511137d.html
Resource
win10v2004-20231215-en
General
-
Target
e91c91126093ad3f01170013b511137d.html
-
Size
121KB
-
MD5
e91c91126093ad3f01170013b511137d
-
SHA1
087ee9b8de481986f2f14c1450893b49eeda6458
-
SHA256
fb15a13015f0e5c4bdd7095d1359a959a7dfdd9739e96fb1b2d8c62ce296f4cf
-
SHA512
2f64c5ff1f4998b11bb05f2e85f740446e4f33a95776f338537719242971bd332be00ee3dfdb5e35efa773508c468c2cc407acaef44b19549f75d8802643a159
-
SSDEEP
1536:wbIRIOITIwIgIiKZgNDfIwIGI5IVJ7S/AFd4u81Jisbzve9pAuqqASp+SEFq925U:bAFdO7IxaTzlPyy0S+95RXxvfJEgFaYL
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409442461" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C6CCF81-A111-11EE-8495-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2376 2204 iexplore.exe 28 PID 2204 wrote to memory of 2376 2204 iexplore.exe 28 PID 2204 wrote to memory of 2376 2204 iexplore.exe 28 PID 2204 wrote to memory of 2376 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e91c91126093ad3f01170013b511137d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e96673527b55f8aa2ceb9a90ba850ec7
SHA151b279c644df00808d203d61b02bb75a0db7fb28
SHA256913f312b9387bd697c7531722b583f762136c8a772a33b1f08eeaf6b8a317517
SHA512bfb5fa49cabb1dd2b0abf68981b751fb1b094706824eab195923941feabb9479b649b402c771ae204fe22472743b43bd167a26b006d6caa8525982146d1b6b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ed3e13f23ec36449689563303a43730
SHA1aa32c651ce6f28e3350508a296503c429f78848a
SHA25613d433262493efc3c2dba307f0b633c7a99c01b782c8089c5d3eee6dfb741844
SHA5122c94961f6296e3b3dea5993210cb8365a0becfb4b053cd0731afd7516ac10b434fa2e34f949eaadbf409419914e707d4ade1a831be4392f1aa8e546db1d37a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef4e6e502b2f761b015e8aa1352a62ca
SHA11122014906dcf723d72bc0b873810ec250a233cd
SHA256bf99eb4c3d690cc31520bde6d4eb101154efa85fe577a1bbe6e69d14442f1bd0
SHA51203196154ac7a1b734067ce41e1a714643349146e83a33ba3ce604a56b19a735798495f5b83b893df233dd8c8d3a20bcbace0287f294c928b1cbeea3b3ee4639a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9babe8f40dc17f362ec6b26f1e2f17b
SHA170268da97e2dd26877a2f8fbbddc65d123cfebff
SHA25625d738573eabcc5f8f32290d78f1c434380955cb3c9fbf046125198acc173768
SHA51230b48126a47ce244b875ce579ce5e5016acfe74ae6f9f1e0139672d2e7a95818f7efb60faa583823d370e926f8a132091d7f80a022567d1461f32c0485c3884f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca57297344b398cba5c9a14ebaa257a0
SHA1711748e6e3559c10214ee3d3d2110b1ab524dedf
SHA256d0776d53d2cd74fb4ed59210d107c5d24d03214c9ecce3ecfbae38628aa768be
SHA512a0fbc74ecf55f87686ec91060c4c5950e4bcff45cc48e5fa8c97fe6f407cd5fffffef0b2e7db9247a4a4402b8098f4542a13f6888879bb5d6cea759126f7927e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f2003e6738e55b2c05744ad4475d4fb
SHA1fa6d29919881fc244cd86829a19d28a626036529
SHA25698efc8afd4f64b39ab26df1577162650891701cb7c843ab43f8f4f401036f187
SHA51249f8449a0716aac78fe0c491452c79dca649c0a63251806495b3b33f2b9142463c48b808560fe39f23f747492d8e72b5f0444b31131720c3faf413d44f277514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9bb4fe712254acf80fe82d60b476b6b
SHA1d5b7d32dafaf32102e8579a6751d2d21f7d4a980
SHA256a96b5813f909b8cc2ab25bd500f5067e0bddaf4a46c12f82b6eaa7751bd6b641
SHA51281761e79a230a3d48555e767be16a8417d3eed4bb9dbda89e13a2e604bb6b7564c0b24b151a586ad88a10ba0bded29aa345586c9ffd075891bfe206eb5d97067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075893c1d2989c29479bf85b73e03f8f
SHA150b9018e424fd3b904e53cb45f12dd6be4328635
SHA2563de0bdb87a44baf9771cd92b50aa5a08b8ed87f0c5005d5e15c9e2f4f5e111ef
SHA512f206f75685b24bde9461bc9f03aa0f40cf7b6e43cb50e9c6ddbd908ad42898ab74f0baa515ed8c71ad98e18859b273cf33446549a6dc8fa0e4b0bdae304546b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d74c8bd3462da9cef731edd14fcb18
SHA17b8267e8b60ecfc336815ce6f48e81b0950350bd
SHA2563748984867552281afbe03f27ac51b330f22b314c3c9845514a8121e5e6ec368
SHA5126787c5b2f62783ac99ad285fe4dda809f76dc649b76784b10100ed20bd55f99caa65cc221ce68a3c366df28860d9c2eff885bbf034dfbc0adcffebafb9f4eadf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\jquery.min[1].js
Filesize84KB
MD505e51b1db558320f1939f9789ccf5c8f
SHA1c72c1735b4d903d90dd51225ebefb8c74ebbc51f
SHA256702b9e051e82b32038ffdb33a4f7eb5f7b38f4cf6f514e4182d8898f4eb0b7fb
SHA512ab3ad9a98fe431508461ebbf8029bc536f34d16cfef8b4c62b8a62b56fe2b30a426e3c3186c994c2578bd585da1c89a9b421c6d2f27053b2f2ed13b0dd9428c3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06