Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
06771d11035a32f006d28ff01751b285.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06771d11035a32f006d28ff01751b285.html
Resource
win10v2004-20231215-en
General
-
Target
06771d11035a32f006d28ff01751b285.html
-
Size
20KB
-
MD5
06771d11035a32f006d28ff01751b285
-
SHA1
ec7c9142875db13d0c3ad7cf285650e7711ddda1
-
SHA256
0b6fa9b27b54963859866f1cc2e1a82ed8ee0f9804f548ae2678c1265b295db6
-
SHA512
51e485b59cc6cff0aad40f8d9b1618081c92ff663836bc8ae1a666b7ddb3fc42175adc5c3043fa0a0181e50c9dfb13fc74b8ff56de8f86b94ccec0c7f9ae8767
-
SSDEEP
192:DxYNWYlRTUYG5lKbBOWBhFUmIPQPuTisGLlG192/ADDtuWsSEyevdVgMxJLAce//:DiVRTUPUhFUmuQIXeLBpFB0MAqAz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000000026a07f6b1ae6c9649aaef51e23313c5602ab2a9dfc8bf20f5e5431380b1a72000000000e8000000002000020000000cbc14ae883b681dbe9285881c2c88135a6c7614594ea06d589230d21ca7d9afd20000000beed51afde5ff32c4958de3460b93d496e4554915cedf3dc8dc1b751e728636e40000000cba0385e4ca20513eec084f7047b738dca38feb1033c0bee91dccc63d0e8b8f9978517dbf0c3110078431b9ca92b83c5c0c998c45859bfb39efbf0a4babc1d65 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6541EB91-A461-11EE-B49B-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0610a446e38da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409806742" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1756 2052 iexplore.exe 28 PID 2052 wrote to memory of 1756 2052 iexplore.exe 28 PID 2052 wrote to memory of 1756 2052 iexplore.exe 28 PID 2052 wrote to memory of 1756 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06771d11035a32f006d28ff01751b285.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53784aa753d37f70b44f1055c8d1a750e
SHA1311790dab2f666851bf45aed4c117e20988c94c2
SHA256e6a740af251e25c05e07f2b36a855c0b405f070f1ee093199d83fa6d09b8e6c3
SHA5122ea2b7daad6ecdeffd5b255147b4297bebfd623269d8809c0360c1016f7f725829075ea3d5d8b998f7c46e91ca6d66963daf2089b41641bf9dc5e5ee13cf2823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589098b6cd017c8269af1a39e212181d2
SHA1b9b0d2b4eb2b469a65da26e9411c85de697c17ff
SHA256f663a0d279ef6dcfc25391ae98e601884103346def9f7b9b0fb90bf2f2cf2b06
SHA512a673dc7d126c4dcaafa9faea75c4e22d48826b82458040f5081b02c4a008ec332d01acc346d841690d7fc169f802ab50d51801946ef5bb56e9a28b06610082a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b9701b95f5617f9013067b3d264a658
SHA18f5d94320212209e9279f69e1b66b1d5dd1ea326
SHA2563691e1428cbd5033a1054e10f04562e13dab45616f007884a711ff814793ecc4
SHA512a87689158313aeb3977fc608e4b224e72fb36b66a65c269e0faa20aadc12f1e412b6c3a7d4d71b6d4595b9d1b7adae684d93330d92ae2effa9b56379f19c0e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583d3a35f96aa2c54dc4de45f83d85922
SHA1d4a21a1b2be32abdd55177a6726f08a830ff2892
SHA256e854a13e3521eb0ab185b632254de199bd74ef90303eb6c6987204ea6d0db9b1
SHA512b542c30de34a510cacd409a40e8dae9b4709781af789a106caf07f0246a7fd294dae6f736c97c77710488d32150a154c0dd0fd3d0ec35242856868f3d209418c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8244a19228c4ac3498c6656880e5d3c
SHA1dcc03a1d4e85d6928afb3db44ea2d3ae28e657ef
SHA256d30fba0a7d556246d3671d19ae276474b8307fcada8338083ad8cbbf41ade312
SHA5127f4ff5e3da4cb961c9362dfa6ced95f0db27e1d7ce13f712f34497a32d218d877f64bf1dc24bdb67d9e58952e66fbe69880070314dc36f56a4c09c446d6bf33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bdf79ede464c4f6993d8fea5d9245cd
SHA1277244cfd5532c1c82b7514d9f18f15614cfbcad
SHA2567d6538b2cd189fe00f52ab3bcc28999e7175eb93808ffa0c3084cc14b07073f9
SHA51264f79bafc2359897cd5b0398d47be4c05b16775848667a3d295742706e358bf9f3ba348c09101cac21046cdc223125a22a5508a07f35998090f20633d122e6d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526fde821f2bc13cc66b5dec51459d754
SHA18c0e96f6942b6583035aeca021a49fb123a73d07
SHA256c3d8de87779a6256b20e19800a65918bdb19c102d05692a860ede19c03046338
SHA512a0e13c1559b76351d8b008a6aaebfdecc2678220e056c2524cbe0d525c4227177ae252a4eac6a6a5b27e4c59297c57399c8f8712963594c959eea65b4250e93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcb2755dc4fb01bb3428b755abb20d0f
SHA19b00b109ac6a758d98f0f63f7c232601499c58b8
SHA256d7b2420e2b7f27e7e5d263233a1d05eafbbe713b94c1980c442019196d74771a
SHA5123a86fa6798078fe63bd95f88910444ba05fd6f6acf1c64fac9811d30347320ddaf9dcf560b8435f176b4d954cad6c9204b8fa0693ced9b712e429776e1be9f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed91617623b9cc8603830fc809bcfa84
SHA1740de7d452442b29404f28b0becee2f5e967f3ea
SHA256d1768b6bade8093289c1edb07ad1882c2e2b4053d609c70655df338e3b7d6941
SHA51236a302b62d2eb9e5fa2258689607f698203900cf53d080e8e40ec28e4b34a3cafe906cab37ed2b6fe5c370cf6bb339997f8faaa49018dd25ceb5f27e73ca424c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fba796aef3ddb8073a8850907af96b42
SHA11cb1758faa17d718424fabb7fc3f2155bc103f55
SHA256e01eedb1c14c384e90152f734c5389539cd8ca3c795b866395a593f209550ba3
SHA512d0703199c9c5e561b6163f231d4e893de51e16f453c9e9f00d3bece1a3d33d6caafc5e0fb077f99bccf100e9d98c36de69dabf1240c3b27990dd1891594f12cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c6d5f869fe6d6a453b313f59325b308
SHA1ece1610b73238f34739834b59683d8b4c7497461
SHA25645d3c3b6b4709fcb3c78868d35dd4b3f20d3f349810cfcdbcce08d8308ed44af
SHA512c94a2a80e03e2e3e6c6541ae181a586a4acdc1cc57cdc357351720e3027215123c0e4ce2f6e2496bb05df37ea35aed4bb647ea5bfbd3108d8b55835a98cb373a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59307f2ec5908f4fe42ee574f36e77642
SHA16629488748149a41b35117231b2f2faf670b7862
SHA256140268c947d174feb08b9e860de1a7cfae60ddbdb7627be40b485eca384156fa
SHA5124a3fb78076321e9b28cb9834f8185ca13567eac7a43665ba830bc5ebc207b2e57a011a294e949f5e824780065c31153262efae273c6239b0e054c482ae69257c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc31234ddde0b01711ff1be861d0c3ea
SHA1283812326fc4ec88a1574348e1a85ce5dbfbeaa4
SHA25615fb510a29eb7d60af8ef5c1bee5054523287123ad62f3126af9af53f50ba85a
SHA5123598b0a06c42a6bb27ed5a698c5080f0f93debf286c24fdaeeb5ccef8e41c561e6353cb842fe0954533d3d431bc75bfa1b70e5c96620a439e61c5ec115e579ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e1652838ca144d84294f0315c0da9f5
SHA18285c984f0ded71c125514a41524884b9b8b08a6
SHA2564f9152a4829fe71754da4ebabf4046277af3d5c40f1a1f5c382bdfb842fecc3f
SHA5127f3b85f7fe9988e615a6f74114880cc9219d727c67df828e1daad13ced2630e86c8c6ce7483b4e91c92994659eae504a5302115449eb212cf46ed74e68308c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7fe5b77bb30b3318e5d087f0131d3f5
SHA18a766abad04173dc34e942fa66edd613dbd71332
SHA256f9887b152875252efced48b605bac25d6d68afdea4ed9327dd152f2edaec2931
SHA5120d2a56cbb8e70d75df17be4a64a3f0e4681e6703dffe9ffa50b15fc4f85849cee1c36643b3538d00cee48ba6524aea1191fb76d1fab82d8e08270b11801577af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ccf852a8c4255ca4284929bb3fbeb94
SHA1cef795f95f16eead4e23fbe8361e7568d48ec555
SHA256120a0ff88ff1267690f68afb4f17054a09eee992ec967ca668e0277b887ba853
SHA51285d06da5372b85facce9e87b5f8179624f9fd810067d99f9c75b904c473488a1b89948835038b8e1740bca250ac228ff2a58c79cac9b6244d3e41946705868b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d9a9c0e6ddee313cb9f64587c58eb7a
SHA1b37f432b357c6a1222fb4bfafd16bbdc4ce3ee74
SHA256d1ff6e12d34ede79f3e572a3c4a4dcbad47ab2f03e165aafc7205c7f0cc3f6f8
SHA5123d7d5d658d72638d3eb6e88625e5c8dd6a15e4bdba44a2e0313f0b81dba6ca21ded9db7b1a166d770e73044102e387f925879577958f5bb39aed37c1f9f06ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aafc61e98a4231933c9f62cf08d54708
SHA1a809ceb70a35c75cc76322ffed7b650e9860a396
SHA25661d88b7eab4756c9d47197d54f3261502c490f08c2821d79e84e79ad59705cd2
SHA512f0977d9d968175fa8f6c602dd2fdea58ce165517fb30b139be72006825683383e27f87dd3322c9966ee5df0dc466779fdb59a06e89c282aaa8c3a9f91e5cf07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5841e9202de403d9c32eeea55d9bbfa52
SHA16f7ef08b69429a0d0e48ed9bea9a9bc24e328f17
SHA256257cc81226626580dfa93f5bcd0c281cc68ac0de1edd85503523955fc1cfd0a1
SHA5121e9a5276df559bd4d112ac81b39a4137d2663fc7aed187d247ab6058499ec381a9770bbdffd4b9dd60d947818ace840b61b60c7d7db2b3c172c10b80b6f539ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bee763a9b6599131fc071f010cc9ec70
SHA13625da49b8ca86015dbdf9c3b106d18e302dc063
SHA2563270b32a2a62d96f9252a75bb431f494f6cd28f89e20baf091bbf1b9cb92c44a
SHA512d77af4a32fd620111106600f9a524db07c9ca155c178a5352c7dff9d4b8406766b00c0a27ada29351c7927d99da2119fc6f7abea2b7722ffe2c15c1004e7b587
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06