Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
1db7b8bfa101ade9bcd2257c911c4ed3.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1db7b8bfa101ade9bcd2257c911c4ed3.html
Resource
win10v2004-20231215-en
General
-
Target
1db7b8bfa101ade9bcd2257c911c4ed3.html
-
Size
53KB
-
MD5
1db7b8bfa101ade9bcd2257c911c4ed3
-
SHA1
cd4174aacef97f825515d709a8724a327c1e00d0
-
SHA256
e4c8d8d3b1c1f7eff2191c204dbf8b09dfd27ae4c86ca6069006ead442da8b55
-
SHA512
7a545d4a3c0d2c7b704befe24c4bfb99e3b58258643e7b27c3e67457ff9de92e5fb2c60427e6403e4822fb5dc372e68f1ec776c022414357eb485879f8fdbbd3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUCrunlYb63Nj+q5VyvR0w2AzTICbbJo4/t9M/dNwIUTDmDK:CkgUiIakTqGivi+PyUCrunlYb63Nj+qq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409746496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302e1604e237da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F8232E1-A3D5-11EE-9201-42DF7B237CB2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000023e17f05ebaa6d3d0e7964eb6906f5152ac56c1e618b2d72f9037396776776fb000000000e800000000200002000000089a51bc246169a66038ccbce895133bd14130725390726d1fde898979d4c669d20000000b69616b2300851eaa807f3e7bea398aaa379e2379e4d59913f1319a8ffa578294000000050c19e3bd667230b0b6e70ac8adcdfd4baa3b64bcd8fbb22ed974fc84aee16f925fb4547bbe3a871bb97afa72d8d770db2c46dba1fb376feda094b678467dbef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2444 2356 iexplore.exe 28 PID 2356 wrote to memory of 2444 2356 iexplore.exe 28 PID 2356 wrote to memory of 2444 2356 iexplore.exe 28 PID 2356 wrote to memory of 2444 2356 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1db7b8bfa101ade9bcd2257c911c4ed3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513e956a6f1f14425dc7c624aa26b1628
SHA1c9ac3a918677a34ffb41f6f8a0034e38aa31bab6
SHA2569f08f2bb279eee61692c33e6832435bc7746202548b5fa31ffbbde245c4ee2b2
SHA51272cbe18b54a8af6dab0c3c495b0718e3288643142a249d71ffe1ef6285680d4261916168ffed11c3a6b70909f00dc91e70e4551367f533df9cb3cacc1255df69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f430859febcd255b9ef4cab16fdfad2b
SHA192235bbacd3fa37a13f1e85dc42b70e306b5dcb6
SHA256ef99c121973ebd7094fc3da74d602a5d510a843f2cb70128fb529518c46cbbd6
SHA512762de346c48d856d7cbb478a5c084aec2647583a7d8afba15f760a2dbf555312c3fe9fed35a9b6b42211d989571320fa185d76cc0d59b44583c1aae36cd9893b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c0248e23cc55d81156c51548a09e691
SHA1b8304fd2f501889af80bdd09539bcb772af0be60
SHA256b429393769eb4774a06690ca567f481236f0d8dab82cad8208d8223d954eecb8
SHA512390cfddeb4b73177e3887d29f5bf49c749776942c8f4612498756f94275911dba0a7292b6b6eb0ef75f01d19ac974cc539d32a226917f42317b3ef190d69dca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567110d048aec652db9f48a9a66f87f90
SHA12a0c30febbabb6212ffc5a774f3e6e6cba714091
SHA256e12b7261f5ce889dd35eae750e2cc8d4580db87e2edf98201ce0d699feaa0203
SHA51230d90b3a6a8ca06c7ff3e453fb2a48ecc46b8321da52af516b94f77b5944b099b7ebd450b2d3561113b5056e45d6e200dc61a54d37617bbf8d03cf9f0b1a928f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509f69f0894d49fffa6d3a8f03f239e12
SHA1097b55f05544c76b6d9997ab92d7eecff90b7dc5
SHA256c951953cae7ed1e9bb32c6678b6d335d686976e951cd0e3643efb56f0d0b8dec
SHA512473934d1fe85d0fde5e610100171790802ce2bfcb99a3f2afa5bcf4d8683527f68f49bc285ed25b08fd1bc349d2ef2fc84bf8087ce4a70665f3499464a968eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e722e7a0b7c5b3e05f7a8c06ed614fe
SHA13cd33bfb2de0c4aa88c24eaaaebc4cd20ef2d7d6
SHA2568fbe3952a76ee009860626e5f1daf604e886027a6552db5b2a49be6ee3a9436b
SHA51277373d6c3f2341d7fb32cdcb13de3d9da21caeb46a9f149a5a932c3190f68dddc9a8ee96ff50b12f9757eae165afb4590b42f6e50da854047cf0be0f39a26818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd133e7bcff97ae341eea98fee72dbd4
SHA1edc0a3a46b9ad37c8319868db9ff2ce0b901668b
SHA256bb9e47f81055a2d92cccf77f8c35abffcb26fd1359a2d5eb05b76684cb455294
SHA5120191d4934e0937de8ec623a70c75585ca14fe49fe7454eb1f32b9d94341f482677f7d5b6068b2ac036a03b97a7f020db6fbbdbacc3aba208b7699970bf31815b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efdacc2bd5ca0f12f19b70220c0f9dfc
SHA1c3a544c72578980700bee32e7832191cc469376c
SHA2567755d0a0cd0f6782b0e2f8e333fd70426640dbe3143c53e6aed42c179e3e66c4
SHA512f07744123547688e056c17368e64757323cd4dbff49fea8a10b629120d018494cc92e20c32872e7b5d9a9636aab51593a19f1722b5fb04c9f7e34e9aa88fc81f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea0fa8e8fcb55f277094e8ca2c13dcbd
SHA155c94585b31d81a22f49b8bc6af1624044727801
SHA256407e240009b93b2c5b1e17d8acd28fd7a4d581c2939eb27223e8c5189a9c9ff6
SHA512ae1e73d6bde5f8d58a3afb0d9cdd53f741d162eef325207f78244ece3e3fb2a1e4f78a127ab802b87058607bfe444816b6c6b9a027107857dac09c1c675f20ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d2df524709e4c51227872b4736cc77
SHA1b1944923b3358774cf2c4f3bc2c586504e08066c
SHA2566d9feabae50c61550880dfb49feda4003c7fb3a7d0a231ad5a1c513d3013603f
SHA5129507e0011e7824f169e45a6f716de901ac15a6e44d93b8c4f0d304cdefa30d6c7f7f73e75399e43dbccfcfcbb5854710769ba80f09d38b12e94a0b4480634164
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06