Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
0de1cade8e857c05aa56e97f4d951fb3.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0de1cade8e857c05aa56e97f4d951fb3.html
Resource
win10v2004-20231222-en
General
-
Target
0de1cade8e857c05aa56e97f4d951fb3.html
-
Size
12KB
-
MD5
0de1cade8e857c05aa56e97f4d951fb3
-
SHA1
e9ed40dce377a5df85971aee651304e6df82bc2d
-
SHA256
0ed6452bb186176cad36de9439fade018b006e323ffbc39197a5756383748c01
-
SHA512
b2091e13de84b5a112e37e47e023c283f28ceb01350c14aa9a6e5c7ff912d4c6b44cfdb01c61bd0aac58e4da0966fe68756804530c1abc9e3a0c90171f6f3074
-
SSDEEP
384:36FPVYeOFyDFy+Fyc6FywFyNcN9cVhVYnFHVYYVY/:IYgYnF1YOY/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409663066" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD47D821-A312-11EE-BA23-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2180 2912 iexplore.exe 28 PID 2912 wrote to memory of 2180 2912 iexplore.exe 28 PID 2912 wrote to memory of 2180 2912 iexplore.exe 28 PID 2912 wrote to memory of 2180 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0de1cade8e857c05aa56e97f4d951fb3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5e8e540fc74a78093581483a6ec0ec7bd
SHA103fd61030caf9d8fcbd92500f2e7401212af59ab
SHA256ff027594a7b23ac3e05a8d5c57e37216763e9773cd82bb18139d20d024994e95
SHA5128b0c2d94caf9fa5d6ec33329ba11d9e26cfeb33ce1b54f0488e20275d8c504ce6d1d0b3e72e5fbc35fa747d606baa904121e3451d6b94ef4b6fde7f2162650cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86db6b030737f2879aecb8c349922e9
SHA1caa2a9705045ca54f763f51af0d7e46af94755d4
SHA2565bafa405e803896f121271cd380a77f38c74962ff226100810cc894ab7fc7173
SHA5121f3a7ed8de62f7eb2dd547b73c91486dc34e601787a65bc1299310ad078dbdba7ebc215389f6cfc90b2ed1b673ad561389fb06a293d6fbf4b7173418779951b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1d502172fb3d5707d3f8ce5e22dcdf
SHA177d1a3fc49acbda6b51e8e420432f818293a265a
SHA25699dfb343d6abbe611036ddeba4dae26f9c74782bc52c9ef8659e6d5e87656e02
SHA5125228f2a937f8b31854c58f0d5182209156811aac12cb1854c6cc6ae04df9096e6dc706d4444f978345803bd3428676cc08a8dc3c97e739931de37df5ba40ce30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554d28555b7bdc61e361d9480b491d14d
SHA121e542ed47641a6bfc383f92381542dfbe3c8813
SHA2561440361c85bc6648ab906a4979022b68a6ba3d6e93173fd342974e7eeb96943e
SHA5122e69fcdf0c5c6e897c95128f86c2234186b697b20c386767cef52c3c9b48699398be23e60d96b7202d510edc156343771adb30c70998b8ab60cf7a7f7d11d8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca3775a16b66c687f8d0c51e0e2a423
SHA11976eff02b35a2ed024f683cc25787b440c909c4
SHA25612ceb59edfc6c2dcab63242762396550f64494e72cdff92bc1405b0778d648f0
SHA512ea427ab53711cbecccfbb87f26879fa266fb963a1b56d03d03bf2531ab1ae87f222a475e52751601b25e79c85de49c1bac34375451b4151989b771a737700703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558f5f377b14de5e077390946c2220016
SHA14a793dce053ca6384d9dfbc454eed02bc40e808c
SHA25662c4af25056d9fdb78975a2fdcde7e2f0c100113c6ae8b5416c6946452961d87
SHA512875a584229ca2f3cd2e532aced2df488045c69c7013741f375b6a013074ad7a87e9def27d05835e3153f2659de0712cbc8cbe9ed8b8d104e522c35aba77fa996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52641e9d951d08d4f80fe3b3cf1650f74
SHA106e089329025ea81f800f0e9c5a19f8d5b40cc84
SHA256c240becf6e9bd998945ec041a7b9704b5bb71b291ff83d75b2fa939e58e165c4
SHA512ed9206f96a9719eb43d8605ccad88d5141be73a5f2e9ea4f320441afd90fe9856a8ddf70a035ff34c1515930a1f102b9ff185b0a711a364ce015a49993e1e80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509bfaa841d83aeebf2d0bf029b840ef3
SHA1c20256a2069337511491cefbc0f509221740bab6
SHA25633856b0241d105c5428b06d9026ed765e0baa5d1e5f21b0350e436488cb087df
SHA512df3bc19b804a6dd9373f8d33ff9843f527475689014f1d184e98f6024d8919cd2ab791936608f5e56acdb9c8d6e7a78150178e2b9651bfb2c468fb12516253da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0050f24f7cf269ea4533031b6873a8a
SHA197cce44f0a51dde3b8ecb70605c05b583efa8bf8
SHA256590f199d293a7fd1eedf8694a9261895b8ce1a6efddcae9375b3678048948aee
SHA512f07139988d910d2b7b5ad9c764a62d154d91932aba913c085239fd4cee45fb49f9826da2598d646d3b837148cb5ef7a5ef92c20eee722f4b9cba676f9ade3cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e34c1a2d3998e6b3537c02c9015b2bf1
SHA1bd643b5246872976c509bfba5110ce7756931752
SHA256ccc8ae6f9b9ede84232d94a2f92e77da4456fbacee6792d650366b6108dd0ec2
SHA512838540168a9e4df62ce0c0dbcbadb5f051e785b3769e922f3e9068730da45ef41ad13a676b3b8c1cc5ba56b7a0be1353b0cd870313833101a82e7f418336ad78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d54d1807a1912020feafe6a9ebf26897
SHA1dd75d3efbdb83840c33b9f6edfeee266a17961bb
SHA256cb42b14b7ada5e6f6faa623c7252354d1ceb95b10e6380e271f30202d053a038
SHA512561addb864b7c948b00497e4415cc1012c18a67b3e2ae37680e03e1edfc7c68fbd99fdabcb2e0fdbcc0a223bb44a989ebf1c7be0fe41aa822b804f032eb5ff6a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\stylesheet[1].htm
Filesize178B
MD5bd2695f4b079c71dbddde3436286fb9c
SHA1733c05da132193d6cf1d8e242d12e2525c03bab4
SHA2562e04a18ff185ba5b16f762a0538339bc4049aceaef9738edd43af77d2ceb788b
SHA5125b73af24d095f7593026d3f211da6775d91c2efb5cdb0e0258ccca8edd3f8645cdf80d8338c863794d260f4bca08637233be3548d83e7225518dee2f47560798
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06