Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
02a22dcf384bfecd7d9fcf7df225f278.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
02a22dcf384bfecd7d9fcf7df225f278.html
Resource
win10v2004-20231215-en
General
-
Target
02a22dcf384bfecd7d9fcf7df225f278.html
-
Size
13KB
-
MD5
02a22dcf384bfecd7d9fcf7df225f278
-
SHA1
2698077ff1f0e8c6bdd03dd53c7e4009af102800
-
SHA256
1b097cada5e50d57c9389c1ae133af557e242c817a702d1dd44ab4c9415b51cb
-
SHA512
bcc84e7fadb935ae7a3ca64fd14b224642b1d595560058e4258a76279ab5b4d037010faa204c21c221273da7c14211ae8dd1d2a059bbacaa19a7728a06a1187f
-
SSDEEP
384:01ewSTuT6u14/wST/9rFu9hnhmih+hTh0hxhsLcWpBBdxBGcXZN1oc8WpVi1AFYO:5ZuOuW/Z/9Zu/nhbh+hTh0hxhsLcWpBv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409595839" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A867D21-A276-11EE-AA09-E6B549E8BD88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01f8e2f8336da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000bc6dd4c5dcdd3f04a9bcf95a63be979cb0de51c5542ad0f8d3bca42a2d1d00ec000000000e80000000020000200000000009b78c3a451095080f0b21976339815bb5fc4cce323c955cb64b0a3b1abfbf20000000ce2b690a93ccffd24980af69d8b8f835f91a7d9fe895a8c81cc6028d6a24da35400000009ae707c5590b9422189765191511329e38b6b56359e7bda6db182e2a81522485d24626c72ad0f90ff1647b6fc8cb98186914862ecec3144823f8e5676ad807f0 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3008 2396 iexplore.exe 17 PID 2396 wrote to memory of 3008 2396 iexplore.exe 17 PID 2396 wrote to memory of 3008 2396 iexplore.exe 17 PID 2396 wrote to memory of 3008 2396 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02a22dcf384bfecd7d9fcf7df225f278.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f9faa4b29c0aec9430706026f00c83b1
SHA11d7126100c5e9f40658a96a87ca02873fee8b82e
SHA25652615edcf01661e9a082e86c1537695ebe3496ea0e3e481ca54c6460156c451f
SHA51240f60d6d0a9267e50f2371e7c53310081325adf0c882b7e6f6a02db8711d311fd1de0da4a31a1df136663c6f3ba660d2c883b6238b4d7ece703c027c24d43e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb1b5a763054d11be7a5dfce3685eca9
SHA1095cd28580527bfc28ba0d29ebf2f121905b9737
SHA256bd9a86d7ee3c88d44ecad15f532cceb2f0a00c860ce6ee0f55b1bf8408c3fca5
SHA51229c2c2e9c3273397fe3003c13fd6e97c2efa9d25df310cba9eea0cac77bbd06071ce3a0a01c518cee6b3f64f382f826a2870c9a9c0ca206fab3637786ded0903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a61e743a4eb2697d5006806bdb3d83
SHA1e56c7ddade26b7ef11d593ffd1028e1b956b9af1
SHA256827fd1fd5d43e820effb33aaaf69b1a75e176493328e585b34edaba8ffa11c95
SHA512a982f6a5032937e03ce1e7870cd0238286e6caf17c6c0619c5778a66949deb70d84c108ee0507df9ef3ec73006c7896ede485689d56d028cea54c86402f308e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a48335eada1003a0f86769acc70ad6e
SHA1ce179b0e6db2e9ab058699a3600d699f9d9478e2
SHA256a76617371a7a32233850fb93f4a42c2e74e3fac0d6de6ecc518868b199d26ab9
SHA5129b81c83685afc293f83a6579038ecf4237db444cbfa323b995d040eafcdfe3b9f0d2f7f95a137ce1c7902d1d1fda36178ed9e0bc8a71f1640daa70beb94d24da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ab4c96b36c93639ee5c90615fad6093
SHA15bc05388623b5c3f1418cdcfccc4600f1405a498
SHA2562f459ecdd6b635baa0412d6601286980f6e0143237a2329ea14c8ad4afbc1c51
SHA5124b21ca391550df0effd68a66855e1d301f943e2c29d98ab42d38e215f23492c1159396ac74af8e7978853c9799cfd5e585fbec11e12c824dd35e9c070831888c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584369e9646781a0a8b494181ef3282d6
SHA1085aac5c2bdd82924fe56c2fd9b22305a4686d84
SHA256e3c09f87449367c794d10b1d179e9ecd1b1d618d97bd15bc1339e33775d42414
SHA512e7e12208fff20f3d3bb2facdd06ef1dd55077f6a9242be1c5db88413894eef1a6a58e9077d9c5095d79036d218e5347c0fe521378f97f08ec0188805b95515a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59462b30c613c0f867a5beff7dd397ed1
SHA18175e54ec07450b6c047eb35e1ec62d9ff6499c4
SHA256c8b5a58a1c47dc35ea06dc97f5e2c84d624fef474f6d8505b048a9524ad33e0c
SHA51271d879b43444e29a8d415e4fb1a959ae77c040ff57b265bf10f83205b9bb0d9bb9981acac46b8cdd456acbf7b4905ee567e15bd7ba4b88c3807f5523f51f3929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3c271b993ccf0e91c6e7efc6894a245
SHA10e75e0687f3b7955549b59b13a09e9020730ab89
SHA256c0bf1e1d3f31e63e2752ef700224dd3bc619c2041d71cbbca57a7b88d1c0cabd
SHA512dedede5d735b3c490387d30d9e2661033d3574a350fd0e37ec98033ea720a6bf403b3db569133687215ca079eb1d4b82fe3ad69decf0d44153d49abc92c85488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53af2c40036b146b48a096bf7e78ee948
SHA1422104b73be97e9d5c64dee062609e21bd832f3c
SHA2568e6d23f194ff31dff995e21af50f251b73d755cd63bce3ec735092a82d8dc73a
SHA512cf502d1dd9d3184ff5eca797fc7ea01f60b34a2f66b1387b6f4fd55823398392d1dc00bed686b65cf6f54d0a96106154b6175d338d6f8a2dc958560748ee83b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3868bb4e599adc3b4e3ff00cb07a377
SHA14e3b040e8b3e6635f770e08ca01a9cb9b3623c33
SHA256b4e928111b69663e2b81475ed62adf2bfe778d2c38478b7842dacfda52f4407e
SHA512ad9f913bf3e1d9c16196a7bc42c7ad5491a875be155885a865a62ca0f0c7dee0e8c7ea116ef3c09494dd9b065c55e570d2485f58163561b12ee87e23fb9f4e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5899ee4ae2b78a93fc3aa24293f1f53d7
SHA17e92eb37891241e60817bd18b4233d5d1269e0b0
SHA256f5609f36fb869b1f3c90957652f41ea10e6587a87140321d95d1afa7b92d26cf
SHA512da6e08d2f2dfb38890959d30680a9fb4f1ca02f00d618d6203cc3f68e30e8d18570b4ad7e42c00464cda954194661318ac9f6e05a9522a835fd5a85203cdc539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574dad88e80731b5288b7b0cc2079175b
SHA1c2ecc26f189b68bfd4ffe30e986680651dce9bfc
SHA2563b5202142e903c3231302618ceeef9cb96e1fe25514aa82678d8adbab1f3dddc
SHA5121efdbd5c871e54f2c472ac2804768df62fec2c80a659ffe9b730eee6da45914701f860856ab867c3effaeeb56deab9299f797fbcf5a1a88516ecc66a6a3599da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa20f45b49acc78a5ee283bd758f1b36
SHA13a0ca6f61e265cbe6683181a05f1bb8c96d31550
SHA256297065687191d3c93554ba16748e1c2f0c9ec9e98ffa71c4328fa0dc171a00b3
SHA5122b9444062d87a6ce4e921dfdb7b2cd1efe9145280cab75e588c968d67bbe13ff0f3b5234549e5bd0548925ffb367dbab31a36dff6de8a680a44e61e2ca0008f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9b19b1a18f232b4693cb767da05e828
SHA1832d737c045fbe32dd5f312f94ca3725d14cc772
SHA256eaf0513b535444e81ed46d36499da4c0b4f467410e5d9f67813b264def2c24cd
SHA512f0d08ce60f9f5ae646eb911776344ef6c4d3d372ec98bc0c3ab009ae5d61a29dd261abfa51a22d00d0ea8b6d6d53627b78667fc3105493b6732d42c2f468d264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57853d28c39f69aed70a02a04830c491e
SHA1dcfc13a765b0d77269efc2c292f49f565cee61fb
SHA2567c82ed090fdf5876002323f7866ef23df0caeb290f2a7e3e82c3a341cb141368
SHA512851240bc39fe5d47deadfa7c7fce3f4bd7370bc459d16cd4d9157a0bd0c21b089bf6b9525b78dd463f80f8e86982c91d8240f9cfc50cf8b122fa1ef484149323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06