Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
f9387e0ec5e8eddab6f889c574631b0c.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f9387e0ec5e8eddab6f889c574631b0c.html
Resource
win10v2004-20231215-en
General
-
Target
f9387e0ec5e8eddab6f889c574631b0c.html
-
Size
25KB
-
MD5
f9387e0ec5e8eddab6f889c574631b0c
-
SHA1
2f40ca4869c03535a822dd9ec657b2644e27a88a
-
SHA256
b6344686ecbd5c61faf31bfa7efddd9f7d9552b2828c19aa02f6fad028b18a2c
-
SHA512
e1820444ee987c374791c00aff86834c845151d65621baa1d909eb8a483394210444e7802534a2c8dcf92e6964fac98f146c43c5dd08ca39dde8b592d87fa921
-
SSDEEP
384:aNdg2H8oW1GwsBZhOUtxKTeBfKTpO3YNBCRtVFpLgWQQ/U4yhoy7jfIWrYc51IlP:Ig2HlW18ltITe00kkRjNG9p6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e7594c2a35da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77EFECC1-A11D-11EE-A497-46361BFF2467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000006713f10f7e149e8e102b22c4d8038bcb30d42a8824fab2d8bde0be1615a98d9000000000e8000000002000020000000c5e934ca6e4190fa8db0d131b638938bd464e243aa6b49c3ccb4e3fd3f2dc3772000000080069cb83574b9e5218fd3cb21a38a78ab984f23190801adf3f3d1126e06126940000000688a5d587891ec2fa7f272fad0a373bcf4b9fb1280cd28c2f8a862df6c539c7ef70bab36a987d829358f9140e6066b11b0c551e91756bc8c332b6800f28bd4c8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409447718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1108 iexplore.exe 1108 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1108 wrote to memory of 3052 1108 iexplore.exe 28 PID 1108 wrote to memory of 3052 1108 iexplore.exe 28 PID 1108 wrote to memory of 3052 1108 iexplore.exe 28 PID 1108 wrote to memory of 3052 1108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9387e0ec5e8eddab6f889c574631b0c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5771e90341f6dfd6a4a2f1d6ce74adfbc
SHA1ec8edb4a409912a8800635a12e8114960375bc90
SHA2564756ebf7aaef6887577a9dac2f3f0e55dfdc35021caf0842e68ba350404b040f
SHA512406a2800587c5971296bbf7dfdd9474968ce71d6b41b3a81d4e697d07ea70221ae0d43f02596727400c6c846d3ab46867b2278530007931fc6693ab3fc56f4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c94e82adfe6eb84a48fdc6072c685ebe
SHA1d316b31ce05d7ef262b36197d985fcc7f3d262a1
SHA256271987406acade913ab606e764bebb1399665ef4739389a5c0491e873fd34509
SHA512a4c7c5c073cdcddc8009f0b59b394cf3f973b414bdac86a0b91ef07ff441c1c6331f02d66b7f9a61c1f002a10b71b9d7536d1385482b9b8f7b291a15bd3e1932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbffc1c713dfc4fffd8e7b5fac16d83e
SHA1d50c3ced318ba079c6a84e51f469e7a3dc77e1c2
SHA25625d1a40b17df82ee83ad717dbb5cc12eda480cc600559aa9762310a0e23463f1
SHA5121e460003d1ece4df450b4f30e783432567c5a0942f9a84f1afb27e2d650471e7db3b7a7449647e13f4f9277c328d755ba4e4b6f8b5da045b4af9846767361ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570a8cdf40ab3abac8248ddf54c10694b
SHA1e69a08301735bc45af18f2e26251711859c1d15b
SHA25686cf85dfda7492bff1ab45cfbead55a450f6d7e4e50352db5faecce0f3bd6b62
SHA5121b4876726e774cfa37a59bf2a5cde67a356017b018c8daa2139fcfa187610a3ba9f713e7aadd41c6dd22869ef5ebfdc8b00aaf593639e4f7d155d13716d1ada3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c25e9f0b6dccfd26ab6713ca29643dd
SHA1e983e3d64e31986fec36f300cf3c1fe7e129e657
SHA2567016efba61884cff416ee4aacf19bf53d6dd1411ff57cd5a8fdadfebdf098ad1
SHA5129656fafd54e2bfe16c1283435adf4abda523c9a111edb3e89695eb7c3d12f3374607773e5958a69ebaf6d1d54bf6703ff22f667649526d90d3eaf43f9d3ef6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f380ea5f6696ed0915fbb88fe7785381
SHA137ea1e7f1e8c28087fbf1937019821c03d8ee4c6
SHA256cbacf9902b3c667076b49a551b5b3d7ce2154e44a4319bd138eb3f061e79142e
SHA512f34e286ef0ee7d894b0dcc7786392b0037e382e0cff39db064e03bd7e1fd9e3b128873bf08f85271a70ee9343b6f0bbaf6a69420dd53d603d5e4270dded1d825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b8e52280e8a9be6941a4b3390eef2cf4
SHA165e257c4f3c01a088d98fe65af190350db366079
SHA2566d7794fc5a752227e0e5637bf98e7986fb1293155eef1287d6f425e0cc09675b
SHA51257ca0ec3be6723dba4562ba71806445ae74cc09d9ea06d824baba0796b4f91d373ab2a27d0b8e2970668c852e0da95f7e520ab58f2e705d77c8fbd9da774f1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06