Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
1295bd2ba472dc2175049b89a3bd9986.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1295bd2ba472dc2175049b89a3bd9986.exe
Resource
win10v2004-20231222-en
General
-
Target
1295bd2ba472dc2175049b89a3bd9986.exe
-
Size
14KB
-
MD5
1295bd2ba472dc2175049b89a3bd9986
-
SHA1
3f7788d5beae74893d9f1ea2db817803503e44a1
-
SHA256
e3df98b51d861e3b63fec904f84e269c01499c403aa536f9ad2ad4dc1da0e5e8
-
SHA512
80788ed9c22ad1f53fb4c478baba800846bdd8328e964f1be6345131023e0e0bfc8203555df69fdd9ff382e0d9369634fe08167d350611a2dfa659620104e3e7
-
SSDEEP
192:nlUC461A/0LiQxqfKD6VkagfWhiQ7SMrZQl96Sd/Cv+OHLQjcWFDZgmC:lUFx0iQxqslQm39b/QRLAzFDZgmC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01221CA1-A350-11EE-9853-CA8D9A91D956} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409689331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000051146a2c98129dfef1ff94c16afe3b97e563d4061f5898410e27c3bfc7da0214000000000e8000000002000020000000656bf95c15f72c0ed559dadbb80242a246fba7e3541d0ba5bc0e0a26edb97940200000000b017e4e6e81f3c869af293111f0f9042687e0a681d7d3b2830b73249e1037c740000000d0ac92641c1bae7d2255d79ef179363978e1179b45a79537d02d2ba90cdeffcbcdecbdc64fa3402f334f24f5f840acac5b2d670c9113b09c5c7c815a9924d6f4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08d9ddd5c37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000007ec558cd949df1724b301fab3da378f80d8bdc49c46020fd837e33584d714a97000000000e8000000002000020000000a29054a2f1c1fceec9196077a1acf46c537af66fb29c425f93e433aa5c580dfd900000000d32e34a9d2fc20ebf96b8f47d5ab7b27040c74379635230c47c099c4dc11f24d8163cb2086eca47811137ae8fa8056d54812b74982bcdc7b09ed0955ceac71b05c6e4de6d2d903ddc9843baab5c897754f233fc01290b338af22a89247747e2a8abbcd2941bcf1072b9e21b81123b5005f37854d54d808e94142d8ad7ea4ab4cc72add9f432cd71ee1da4d4a1a368d440000000585aa4482c9121337e0791c9704d67c4e70bf1e232acfe17601dffb66277f166301e1d17b2007770692d7cf4efe5af7afdaa18845a44dab0faf60d8a0e24a0b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1028 iexplore.exe 1028 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1028 3036 1295bd2ba472dc2175049b89a3bd9986.exe 28 PID 3036 wrote to memory of 1028 3036 1295bd2ba472dc2175049b89a3bd9986.exe 28 PID 3036 wrote to memory of 1028 3036 1295bd2ba472dc2175049b89a3bd9986.exe 28 PID 3036 wrote to memory of 1028 3036 1295bd2ba472dc2175049b89a3bd9986.exe 28 PID 1028 wrote to memory of 2664 1028 iexplore.exe 29 PID 1028 wrote to memory of 2664 1028 iexplore.exe 29 PID 1028 wrote to memory of 2664 1028 iexplore.exe 29 PID 1028 wrote to memory of 2664 1028 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1295bd2ba472dc2175049b89a3bd9986.exe"C:\Users\Admin\AppData\Local\Temp\1295bd2ba472dc2175049b89a3bd9986.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.google.com.br/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d91d89ea803a471a60e07bf355c254a6
SHA15452a18e14f1be984135a3bb1937319c4d8f9181
SHA2566e391250694af6b532cfc879efed673b6f24c83b97ae500e24b97ccdbde5546c
SHA512f7d3dc037732a965e7524beeef2587f477d4e7f7d7881d6256f0474d5b95896d8b52123345945da4e892e50225ee0b4fabb7254278cb8651ee4ad400a09303e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebcd086be76ac903c85bcc8cc9fa2fe6
SHA1a072f45a5d30f5ff4e2dd3d47c2635b0250561eb
SHA256968fd4011fb14eed2c105a4d22c0483f473f676835bd4fe97be27373fc7957bf
SHA512f5dc49849e3a21573370c5a25a1e715517dc823dac7bf7b7b081fdb3dde1d4f48601ae85c5cdfe814db80647b031d513ec6520714b879fcfb6ec5f9cff887736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d1741a7e737d7b23f2735f3d5005dc
SHA1ca42c779acca5147d8acb106b0ebc5cce49092e9
SHA25649ea0f36b1f645006948f815b10d82583beddf2bd1417f7ab9293cced38b7f24
SHA512a5730177256c39755bcd1713c16e11de97a0310771050e874c887cc0034c736005d46e495120d606859b24faa437e3aefcc4b2df9bdafb6e01ce4c49de881b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f002d9cbadc49509529cd3a76ed3638b
SHA159c46496c52d5380831aab3b902f7e07d707390b
SHA256059f1d3dcfe0703018a4c490f38c3f405132581f0a16e592683951ef69cf3607
SHA5120a84c90f1df3c36b2dd3f68df108add6f8bbf5f8828aec45dd72e3186232b52a7c1d5619bc5058cc49dc7e30d624c7b8d51008e167f71b14b8562c701efd5d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5958edc8b0ff6ab205b4e9653999a129f
SHA1df31731319d53238830ddab4b53fe01b4ed2ac85
SHA25686d9a1e469419eb43b0eaf4daf70930ad56436c839ce4fbab38adebc8de940f3
SHA512b655e623e0cdfd08f000a73202685c259cf6e1cc8421838a60dd099a34e6821e7c506da81451d72b3c85d9b282e126ea9e95dab7f06e2d6144487cb78ede0526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577712cfb80af949ef9abb20579d3702b
SHA13fe076da4c361346b9c0dd35bbcf62e4c566a354
SHA256afa9da8cd52cd305d3a9ea4615675590434aea3cd6758ec7ce1e728bd648f519
SHA512ab5fa15567a50e0ef6b3576327a11a500a9b2c2f7e53b8dcc4c5974a45225c824db9f72984467f36ba69d5ac9ce7be41af92bffa021f17b66873fca8550ec825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51581f33a3096ca8d0a3a2785277642df
SHA145d4281c07e2747833d996e6346c60525375f169
SHA256de3e0d34e0c73417c338e4aa26faf12ddced26c0ac813c8a40ea4a47451d415d
SHA5127a0890755a9356191dc704073809ab7e32c1a6b37f7046345d24bc1b3220397546587cec6507ac4ea2917e6452ce041f0c58fecc20a74db006c9be75337e3a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3828ebe1a43327d1888a64ecce585ed
SHA1eca28ed35c441ee34c16ae945bb848e328bc3075
SHA256a92790f292f5f01b4772d39de69ebc2487aa7ee93e831f9ea0cd4755460f7ab9
SHA51215646fc5eec3109f6a48c4d0d437a9da3d6c4196b4518300845e9afcd156687956b7279d249df8529c6a493c825115d5b1fdc92878aa530657186e5911a93406
-
Filesize
5KB
MD5b272c16b74b108a4527b34792e8409fb
SHA19a700653a64835f864ff0d7add66b7b7b5cce458
SHA2560b1cbcbb9afcb58eb166fb58a7f1426ee5b644528520e438c5d5386a2f8e3544
SHA512bb4bb59f7d619bb8c5c939e6cd9510d20098380fb9321bc1c3ca6b19d8da17d86d9e252b36914c75eb574e2facff82c9d81222b693b9fbeb9438ae34bfc981f2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06