Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
10a03210b110d79861b9a751ebcb5856.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10a03210b110d79861b9a751ebcb5856.html
Resource
win10v2004-20231215-en
General
-
Target
10a03210b110d79861b9a751ebcb5856.html
-
Size
115KB
-
MD5
10a03210b110d79861b9a751ebcb5856
-
SHA1
ed616289714e49badcbbd067e9575ff180f7de07
-
SHA256
956d82c6f1a1f7619806fd51bc93bd02669f04158e767e5f20a6327656894048
-
SHA512
bc51abb5159e341a000392b1b0ac5482ee3e871dd17868ab01ca614cc0a39ec000b3f296814efbd8251dc47f32164c427b94f4d5363ceac49b9861c7d164e020
-
SSDEEP
1536:jfA1dYaBzEoX4we66uLpLOLdLMLgL+GLYcMJXJs:jfudYaBzEoXze6p1GBsYfYO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78DED281-A2C2-11EE-AC0C-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000b33d3534bcd71f55093e5944ab103516a05bd5e8c1f3c2ad5b220b428ddad152000000000e8000000002000020000000f2c1ef3667f7e9de1dc3efa407ad186f9bd7adf75ef8045e57eefd9dd58cf447200000001e348caab9293c2b5b5d59efe19ba10e4a4a9beb819cad0a1af5212bc67f1ae54000000038dfdbfdf5b1c8bb1c41c45aa146e724f9ec1fffc0ed615916a3bcf495a8fd2483d9ed0ee27eb5ca8cfd72a9ea149663b5013ac1d30be198933ff32f96f1177c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d036e766cf36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409628555" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2420 2096 iexplore.exe 28 PID 2096 wrote to memory of 2420 2096 iexplore.exe 28 PID 2096 wrote to memory of 2420 2096 iexplore.exe 28 PID 2096 wrote to memory of 2420 2096 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10a03210b110d79861b9a751ebcb5856.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561027c59a5d4362dfcec5e146d75ed3e
SHA187593a9c89a8171fb31394581d0ce838eb4c1c34
SHA256fabc4e3173e1d9c3ca600d959f0c43f709b76f8cc08d4090911615830cdd5a5e
SHA51281038a000eecc7e92aed1d27f7a4021e22e99c61b3714c81c75a12ca6326df64fd2f2e6ea7cd8e4aa816a28f9895062007ce243945e54f4e8d7fd4102eadc7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481fab385db981c4ef5387c748ccbb8b
SHA17dab92dc8f013102c3e9fb9f25672098e0c98b36
SHA256aebba6c9eec16efd04b778cb81366cd29f1da55f0bd4eba4573c6370ecc40eef
SHA512b86d45f0897338189c49f2a7d60e6ab456a421232864f676130c081508067e4dd12982f5685ae247a8f768559d85931ba107d95aed99ab53ba1e40920cade933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506af42a56fa3b57b53ba42dbbe668b68
SHA133451cd85090229c3ec9d1fac89ff07684b0c4a0
SHA2563a3bf3de46ea0fabc0b66f7767a548217de06868b44d348e15eb4078db62c437
SHA512dbd34fe1ab1ab272cd8b1cf2c67d0dce93e75b316ad5901d2cb19d09ca16fe95d3d4f1d5fa82420d1ea258203a93f02304854b05f972a74c73b55f8eda01a091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5412fe161a8211b39763d15fe1a81fb2f
SHA1a693e91df17a45a640e0a80a10eb10f454e235b5
SHA256c2cc0ac0573d50c5d3a42bd5d2398e09cacf6dc3e33c2a260b2770cbce768956
SHA5122bc340149e033d753388e99faec398246f3fff71ff5fc99dfff16a994fd770f2fd40c68c6df96a9d904d8ba4d7dc0ca85337b45ad30fcb321a8420565d2837ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524374c5161fa5ff974b73d8ce0384fb4
SHA14ba422f6ae019241b8981664438c6d492b41a2c4
SHA256ac3ddda1fd8c1c5917a1af22bf28ca3c6964e8e2f8361d79a1ea79a4883dc6d6
SHA512fa174cd0beae8e479b41082863a68afa44004160e4ce650086296544401caec709cb27e018f23e110c4adb1be0d6608e0e4a1992aa0fb3a9dea1275c708d7964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4afb8d29dfdf34384afb7854ebf38e
SHA119ce4d0efb48926990e2670551ac607f95a3671c
SHA2563c31215ae0219f2de38c563b29499c883669308c3ff23a17f89c183d8c1ab050
SHA512d863a2caef2705d54b8429cc13f6e645b888eafa99501c2fb7c03179c372e9706bdb0373acdee3399980a6d34e6edf294c8552ea8564aad6b482ba26b3aeaf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e45ec1686baf30bffc6c2faed6f67a87
SHA1564ce6d325368d2fc5e1265bfc6ba57433352607
SHA25640c4ca7f96c499459a7fe13b73265f44b5dfb22064de151e81040676d3569405
SHA5128dff8d40e2f7a037ccbac6775039ca173eb7a027e348537718499b26c657ace123c780966ff1ba6106627b89c8f7fb162f61371e79498628d352af8855505867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c74aa58ed8bfac0f12d8c66b0a043a3
SHA18d48d7806ccb29575fce9a8924aed86e67d3b897
SHA25631daa918e4e927245ff417361997472f8526eaedd41f332a6b6e417f5130129c
SHA5128a6583ee590bec9acddb3eb8653e397559904d92514c6cf47871ada37125fa932def02d5752077f9d25e71949d732f1b5b3d23acc46114da998c6ebd1d18353a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ede0a6ec026fe4bd15f4aaac5c4d9273
SHA180fb066f6340fb5ef064760910c94a0735ce6514
SHA25641b9005e7125171a77c9b60590d9fa1defc275e11265dac255e2637a52e57afa
SHA512d586624531f73a6acc647a77186a30d5d82eb62b72efab6afc8476735db274b537df4f39360c3136f1e57d694d43938d2937393839d316f3a1ca86fe3fa46deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be67024ce061bbe0718a0a55ba5873e6
SHA112a24432121e5a6893e4ffdbeb2eba97a2294b5a
SHA25677a181c578fae5b6972a9dd0168f51e480660cc0ed4e8378672a0bf266069682
SHA512226854ac896356da529dc3c764a08b120c5d58c382b07362839d974f03f80fa59560337bc3074dc25d2007faa27ec7c71d29a83fce9d13cf5240a084dc8cd6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585c4a7ca2af40cd3220232d08a4f97c6
SHA12076ce76190fd8485e606b426edb785fccc2e297
SHA256fa95044a80d3e4a45a49e7a3093dc78b366a609699b9479d57cde794de7b359f
SHA512b4b04dbf55a0534803101b930d38af37f542b8d73b9b07b6650cd4f6adbccca2c17c67fbf0b952f4429f5f2817140547a2c1e0e9d47f01385b565c04e7287042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b940139ae22de9b53c37d2a475b0ff6
SHA1c07876446731ba7b488ba0cd2c82291429705dd5
SHA256ac72c686f8ceea0634cb2d8383b5495e00937b32a165ee2a122aa333d2b28db8
SHA51251b2ab7b2d7b9727be48fc02d4b5e79811e192ef1d237987ecd84ba0cf0368a3aa82bd2eab5fdbc71b5fdf506d910b78e7df06164b6ae9f6ce5b694179339253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9fb88268ee589013a7f4ddb5e462378
SHA1de63653e53c79a11daf1a19e77e39b325a725c5a
SHA2569b7c6d5323772762bc82da22fac1f0e3878f311eee0c86e8e19551d0c3b4b5dd
SHA512c4ece7da2c4c9ee7012f29e18e6dc9260469284896aaebd8f347ddaad904defea3fdcd7fd0b777f8754b6e8a50bbfe23e4e119b0fdc7b78cd0aeedb0256a4ea3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06