Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
0297128ace8f02d80fa3f471ecb28d0a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0297128ace8f02d80fa3f471ecb28d0a.html
Resource
win10v2004-20231215-en
General
-
Target
0297128ace8f02d80fa3f471ecb28d0a.html
-
Size
821KB
-
MD5
0297128ace8f02d80fa3f471ecb28d0a
-
SHA1
e95eedf7d45d4928dccd1564490b94d0a86ebf13
-
SHA256
fdd07b7b973480d30f34f878111edc824ed5b194edbef311477335a6f9f03cf4
-
SHA512
e183d2ce9763126036cbd4a8e79db1ae0734694cd9dd29e08ee9a74920d302905a0c3112168d2d979d6bdc82b6c00c73789ab34383944750440fac9df3dff7a2
-
SSDEEP
6144:jHzF+y+gpatYt1YtRndVll7d1P4fh08koEdaU/Dai5RJVXos0HOh8NgCOh8NgpP0:9piv0O10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18682741-A320-11EE-B578-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2684 2344 iexplore.exe 28 PID 2344 wrote to memory of 2684 2344 iexplore.exe 28 PID 2344 wrote to memory of 2684 2344 iexplore.exe 28 PID 2344 wrote to memory of 2684 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0297128ace8f02d80fa3f471ecb28d0a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ced0ee0b139f75f8d1c0614ea06c275
SHA11553ed6f35faa8b52530f936a6e76de242aa7cf0
SHA256939b9f1bd78034be2f15c166f4323a85c5af642c30bf5b08bbe909a5c4867759
SHA5129ca1a741f83f6f65a6b025c8d9968a4a352b0561953038406e0fafd1845239ca377d6e84043b22adebb6d1c0ff032ed4bea91c5aff62ec0d9c57f256fae18ead
-
Filesize
57KB
MD5fe9c4ce60f83b3f0be98cc3638a5cd0e
SHA1be40a784dd748da8ef63fdc16971b200ad5496f6
SHA256da3bb896508a1e761984d217a7ed65b63ddadb266ec2f284c42610852ba09ca3
SHA5122464817aecd17721d3dbe2cf58f718c8b2c3129c2e7f67cb8282d583cadecf8cb264a68ac4aabcd94d6ac0697dca8fa55d9331648f90ca417335d57708df52b3
-
Filesize
55KB
MD504ea522c72bc19a01eb1b6d44933d540
SHA1364ee006c19e73d57f2d2124c33c6d6b0b078881
SHA2561c8f7a45a36bfb5515981e7c142043b4cde02155dd58a2f1b588027ee615fd70
SHA51246b7018d34c5574b8150bd017c82aecdf1d0204ec4efd04acefd2e9bbfb4b65089cc3dd7de7a8b74a7d49b5ea6ed059ff2b74bbc5c2257264b07255e6a91af36