Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
420f81f57beb61d9e88950bc81eab180.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
420f81f57beb61d9e88950bc81eab180.html
Resource
win10v2004-20231215-en
General
-
Target
420f81f57beb61d9e88950bc81eab180.html
-
Size
57KB
-
MD5
420f81f57beb61d9e88950bc81eab180
-
SHA1
67696c838564dc8dce2f791d9046cdab7e1abc90
-
SHA256
e8398003f71f875dc0ecb1ced2006f4d9f3c6bd07733e2b8c10deec7f0d0a753
-
SHA512
6f6b41a6b21ed462cba5f7fbdb15d34b42be4d5669e3d49a742ab327e632974ab42487889a6e451192bdf55f34e13389fcdebd4c33c0909f73a6d85702fc88f7
-
SSDEEP
1536:gQZBCCOdx0IxC3FR2fkfnfKfJFfkfofwf4f+fsfbf1f5fUfkfBfdf7fIf7fEf5fK:gk2n0Ix98fS7Mg4wmkjNhcsJVjwzsR2p
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00ff6495138da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409794281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d78000000000200000000001066000000010000200000001cfe03b8cc6219c04075ec05e58e0b7f987b33b20ca8fef941e1dab76fef012c000000000e8000000002000020000000f2eea683cc94f50acd92c89c43eea019808c4e4e90b91c444363bc80359ffc3420000000fd1cb747ae1d4aaad9c6f78ead92948121ac9cb446d280bd4f8adea37b6313654000000045d238238ae941b4bd9a73c56bb8d5c9034fec61b2b18fe4cdb7849a3af96c8bb4fa85fbc7bf86d09ff81ae75b9178ef31d58f7f11565cb9dbf688dfcc13856d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C90C151-A444-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1748 2240 iexplore.exe 17 PID 2240 wrote to memory of 1748 2240 iexplore.exe 17 PID 2240 wrote to memory of 1748 2240 iexplore.exe 17 PID 2240 wrote to memory of 1748 2240 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\420f81f57beb61d9e88950bc81eab180.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587525816f1689d54015052efd7838c6f
SHA124fbc8e7d8acb12b58947eb0b931cf3383607d40
SHA256256f8d090845839aec159048e9cf04c862488b5725e29f6b8dbf08846f17ce75
SHA51272457ae50f8a9c67aec64f8e47652fce3a2362878397ca0a83aa46b66b4f9547c9865b5e8abb862743c957805b1fd3780b80ec6966ac44d98fc8c0b3ebfcd4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cd7d3fc24e1daacd02bf0b2de38577d
SHA15a3c56b069708f9fc40d889979db2effb30f457b
SHA256eddf41ac173d04e105de15012d33ae6502995ced56f47314963f712fd51e5bd4
SHA512881872ed73a830fc23025f42a588c3c090c4a2c70ab54d3c8ea784da191465cc35a65e4f464b3d74ec45f6532258ac65a517b9281e668ace3b68e70788905d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cba8ebdfa17dbe16eb4e587cbe7be842
SHA11ad665f29c650beb56cd97b3b0b74e40b8e82aff
SHA256c43d645dcfe8e63aaaba6546838c4273e190f24f12c2eb469e891ae91bd74a69
SHA512676b100a8e4648c0243cf70289fdb1936d4f7356f4832a7fb088375bb8c9c41c9d73f485ada86539fb8aefef26a8f802235a26fd77de6c559d3cb10f91579546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580752221f2647e9d03726087d1fe546b
SHA1524bd9c1e4c930cacf9b551d6bb7746763859139
SHA256bc06f9647c13e9215ed1001634cecbce7548a718ef6ad0629afa5f75035efda3
SHA512b5ed6b6021044ddea4ef7b81d8965af368b23021057e6167f16e265f10213b85ce0bff9b29029b98ecc7941afe6b8210a7e898479b31c8da5595e170c931e19e