Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
164545b8da62b63b84464e429c0b250d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
164545b8da62b63b84464e429c0b250d.html
Resource
win10v2004-20231215-en
General
-
Target
164545b8da62b63b84464e429c0b250d.html
-
Size
1KB
-
MD5
164545b8da62b63b84464e429c0b250d
-
SHA1
646271a393269dee24c534b50a9da2191a347f08
-
SHA256
dd3efd13ca0fbe1161d3e1aa75e4521c718ac88c57531e71c52ca3c19683d884
-
SHA512
15fadcf2ee13c48c59d7fb0853b472cb245496092fcbf06722db76673e4d62c56ea664a19f1bccfae0e484ee80b56aedea61ead04562c79bc627379ce5ec30a9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E168AB21-A37E-11EE-B449-5E688C03EF37} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000c9d1ad775ca9eebcf1bde70c32aa1ccaab899604a2d7da64b2e07c1de2ce0b00000000000e8000000002000020000000ee44677f3842ee07ce66f66f609d02f79bc5ac6333cd3b8395fdeae5ee5b936320000000bf62d75bfeae18e0827b7f6829b2430b4d6bbf98f500499eaa3e428fe5378c93400000002a74c3f92a18282fb7833015765d42eff19d44fac548585517e29cb19481dd855492537d70272c45838bee14eaf945a22ec845ff73ed224e53a31d0f4b092476 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c89ab68b37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409709455" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000003c76847d77812fd6e1aebbf5d92c2233fbd487f4d36cd6b513b4af5840516d0b000000000e8000000002000020000000100fa15899d20f2fc25bc7eb09c5ac4cb5012c8ccbc57964984502d0723a612990000000847864a38d0eb1b05b5a3143663534490b2045ab1e0e5ac38a803d12c8eb1f40117c4c414de077c602b2b961b29d6676923155cd75b5068632c4dee5464fbc325e6fad07d4bef0999ca11a4f79a95d57130fb2178b76b02d1c4c3971e7fa71653ad2a4b254a200d277356341cf194f436fd372b5b8e8df4a4ce1c77724ff0ba6f277f34df65d4aca42de401b5f5dadec40000000dec226643e6e2fa1f0018900c1c548105f06d2fa2bd42d311abce3b22828ee4292c5044ed2c1409c46e3f7c093987278e04874e72ecfe8c65bc6dcca1f96d355 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2728 2556 iexplore.exe 28 PID 2556 wrote to memory of 2728 2556 iexplore.exe 28 PID 2556 wrote to memory of 2728 2556 iexplore.exe 28 PID 2556 wrote to memory of 2728 2556 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\164545b8da62b63b84464e429c0b250d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1a1bc3f76d3c025918f0531d7962d6
SHA1c581ec49e6c69d9d640bfe68dd8716b105694bfe
SHA256754185c692e29f087ddb1e45c74ced523cc880f288352b473df4993f176526ef
SHA512834a31f6057d78d792c98a03dc38b467b7b97ea24d9674e683e23043c3c750602a165a393b056dbf25b86f48db5616ab0d04125a8136abe79bb5987d9d71959e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5806d1faf8b5e27beaf52e38571e860c8
SHA108bd0799bff3ef96fa741c99a3eaf19093b7edaf
SHA2565ff23404b77027b8744a341cf254e19ebc06668e8c27c3a6050438abc32da012
SHA5127d5501e1c5ab44cc84b1788b364af87286516bc78b92b3d11d65b37dbc591bed6d8fc5bd52185427953beceb78f707a75e153d63d6cf76a84f8f59d91b43bc0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5366dd5058334d7e82cd45a8adff75
SHA193bb6c61ef5b24b12c941843cec24c68c53b6652
SHA2566d90f32139cd8b4ede02119e8c8c321f1888e3de039d62d9482d71cbfaf97451
SHA512a850c2b37cff4f280f90dae8bdc77e6f059bedc98c6da35fbb593d631b24cd1fc17efc27da6132677f85b0d887f92d4df00d93bffd5be9fa566b85ae673d56ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5285d8cda7a4c2294ad64d8400d4acccb
SHA1fbbcacc882d6a908a7c8095a998baa8fdd96566c
SHA256896d6c11861d5f5736aefedcd241d69b2d0911474295d236a0bae0e689541677
SHA512d950391ab35883883eed6cf2bf6ce564490c89a30e7eee9ca66855a26448e0fdf5829679ac02e01074890d5a57e06aee47b3a065214bfeb5a020ff1c7ca0f501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53551a4a5d9f101c7ff5d7691e9083d14
SHA19ec42c0f6d0147415c96aa5739f481cfb536381a
SHA25606fe035755b625d57bc77f34283ece7b032a57d404402446440344aac024ccf9
SHA512c8a48217f78c19701295c7e8558879363afeaafd4b276d4c11d50f83daf7ce926a2ea77d66f4b8175427f22bfa47028b0935d5204321d403b1e2a04f69f6961e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e34f3fb68cc6c899d8c268a8b7b28e0d
SHA1acb1d9a17ef17537b0966782eece12758a65623a
SHA2569c191617aaf57009ea6290a2b9d867cdb2c853b7bfac398af73476fdfe2e508f
SHA512a2b17f783d3c9c4867b5a34d51d29c9bf0a0f1d1c0087ac60b0b1861ef241631e68185ad3cec12a27f56acfe431a70900567b39b0f5d60e6fc901332484100dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f0ce8448f24777efdc1d2150b9e2782
SHA1f09385b0c04008193c310d6bd04461791fd27652
SHA25682609af6a5553f8e3aad3e15093b38b933db010e63b0c8788c2a7375db72ab73
SHA5122c5c4f1748e41f44de5bc716a277f8cf7b786f8883491d906916fdb3eaf126f0d4b6445a98466fed9cdd0c671b95d87430ad15ca922fc3ff165f565c67cc4a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7435fc9a320e53ed586b6cf6a21f18a
SHA1cebbc75b6a0b105ee37284658a7dd82fc7f2e15e
SHA2568b539a4f6abb6ee5513ad31b09e27cc25641a5de41e7901f26203ace04ed7a0a
SHA512bd5ed6ea36934d721eaac37354e90be2c77f85cd44327927c063df0611e5337ca6f2c22765a4194951b29fda590b3337beaef75f6b4b1869564d90c69920b900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eb0168920e2fc7deb51ac04c3d1d690
SHA108ac2c725534a13d3da80dafb5700ed484f11a5a
SHA256bd57f74fd4977e70bd2a5f994534f5df251df9bfa05ad17268d1f4727974409e
SHA5129ea2deab0e609fc350bed01dc7ca2af294c660ac9f27d9209446f3b6d12f70026df50c0ac736534ba684ece528d98d1570a28a3464e4cdba3202ac0c0659cda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2304a747e3fc5ea8a72aaf9580f3697
SHA16d863a7f79b517c0f3dfa5cf591cb34aa33475a1
SHA256ca2808f4e15c3d587719d04823d1da029fd34b755736db7d9e6f29d48e97a115
SHA5129f3c48ed5c5548040aadefea103f9fb0b8622fa42fe3fe8d51bb73530527dc35e9b4ce3f3b0d782f36f37036b844619e67aeef35f10667615f48aef50b058d07
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06