Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
071c00634ceff86849192656456b6e1f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
071c00634ceff86849192656456b6e1f.html
Resource
win10v2004-20231215-en
General
-
Target
071c00634ceff86849192656456b6e1f.html
-
Size
6KB
-
MD5
071c00634ceff86849192656456b6e1f
-
SHA1
d8adb3e0cd01edb77460933f1a5a20043fd64f0a
-
SHA256
e0c784d7fcdb61c52bf4490cab6f8b0758f96ed5e0785882b0897e152fe03ba6
-
SHA512
65ceeacfad7c55190bfdc4e16df46f7271e2fd232de8ce3c31c07a12b9ab3c823c4e9231d701a6656eb645e0fe0b46179fe5cf605fe6b5c04b6b10cab422ed23
-
SSDEEP
96:uzVs+ux7UWLLY1k9o84d12ef7CSTUjZcEZ7ru7f:csz7UWAYS/Sb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07a3dc7d536da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE6D4EE1-A2C8-11EE-9673-F6BE0C79E4FA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409631307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000b1b02473b01db7a5072e6a4d9bf97de4822d2b1304a5138acfd3e95c635c90ff000000000e8000000002000020000000c0180a6b9aabcb41f6b898e866b921ae9469cf16ae67b973e3a4314a36021fc32000000048dafd7b8f6842945bbdf3628850e12df1b422da0940820eef9e80a4980ce467400000006e72c35be0fe2278a4cc69c4491c6b0373d840f7aca0a885b16a896acbb701599c774da3df69a28b703bd08444400eae81a9611a33956e1fe6638afa2adbf596 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1944 2644 iexplore.exe 28 PID 2644 wrote to memory of 1944 2644 iexplore.exe 28 PID 2644 wrote to memory of 1944 2644 iexplore.exe 28 PID 2644 wrote to memory of 1944 2644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\071c00634ceff86849192656456b6e1f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f1be2d20b240d4a3b569dc8925f6d46
SHA1532e03a978d9b6acf372c61666b6982838d91660
SHA2566871345413a09b5a6a9a6ef7bd88db05ebafae00c59a1fe54395ed11dc04c5dc
SHA5128017152d1f5b920f1cf1e88a683edc876dfc16869f22467e36c98757a9b8408d495cb0c992871113dcdc01d2e6e52b5c807c5c112959c5deb18418d56ac5464f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578f245e9bf0e04b0b3f4fa567b1415ba
SHA15709ff8c4942fd2b59ca1fc3bcc3b3a5cbb9b345
SHA2566452579567e872e684e24e97897a167da169e3c82d222737db99e90f573a35bb
SHA512a967ff4b2c27f6d235e116fe447cb5e8909defa7a7734d9eabc0e2f833b482e936c4afcbb3192a3c4f9ae5ae533f070892ff2162a7ce29255c74c42c324d9ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e62674aeb80372fff258bedb7d4c0ca1
SHA18a1215ae07d29ab6f25809cd3a2acca12bab9047
SHA256913ca192fe14454dd27e32a73b8553494637eb366db282ac744ff92584a9fe6c
SHA512c6db45a5b2d97a8b4ef2455ee84e8ccb7cd451e974b495ef26cfad5c46b0709f2005a08c29fa06a746c1f1cb1e59fe8212da3b20ce53ddd5961e1b811d84dc53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad5144386ab483afa7dd6c93d6b0db4f
SHA17742f2f689b1be8516415f832c56c14ee9e7c6f4
SHA256a3f691167385a2675392f0ae2db237ac3b335badb341ac0d17b3a36a06b51b2f
SHA5125373fd539ec813e81ff985a6261fe26e4ab6d3a3b5296a5788721036fe9893b2ed993b7dc5e1cfe23e0a816a9e1ac715e4ae577b5c02e5cc7be66be92605a26b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06