Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
0943543cc5f41877cd3fa53cc6d13883.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0943543cc5f41877cd3fa53cc6d13883.html
Resource
win10v2004-20231222-en
General
-
Target
0943543cc5f41877cd3fa53cc6d13883.html
-
Size
106KB
-
MD5
0943543cc5f41877cd3fa53cc6d13883
-
SHA1
c81ef09c38be1bc551dbee4494bb69492041fe72
-
SHA256
e51bcd62bfe5d793c396c8b1db1dc885e1cc7407add37ff664c07d4597281c8d
-
SHA512
dab17ef3c22e035354630f4259744c5134e1203d28d5d69f9385b610ce38c345005870fbff781ac1c88250b2275d8307e500df38f1bb8f32d386203e38dc4ad4
-
SSDEEP
1536:wlCYKs3aIDm00+uQ8WVd3UUaf8kcXDUafy2tGUafeOJU:wslY9Vf7DkUaf8XXDUafyQGUafeUU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409684370" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{781A1941-A344-11EE-8FC2-4A7F2EE8F0A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3028 2904 iexplore.exe 17 PID 2904 wrote to memory of 3028 2904 iexplore.exe 17 PID 2904 wrote to memory of 3028 2904 iexplore.exe 17 PID 2904 wrote to memory of 3028 2904 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0943543cc5f41877cd3fa53cc6d13883.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538484fd071c98e5fd8f4b63eb4c2d3fa
SHA1086f516f6713709e6ab071b53fe34a56af849504
SHA256d653938501444999ccab32f12892e76e0a473e1d41aed5e0a4ea8cab4c9940d0
SHA512b8338bd57870a95c969f9e7460eb005a41dc47f3bcdc36e61f1f692fd3b8093f318529d3c68c8799506f9bded4d7b22ca515a394a1f63e79054b6bb8e382fb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57885d73e550acf35bc91b709ccc887d0
SHA1d251513fa327afe8c074d9d8ade6048004198605
SHA256397083d830265fc31615c196f28d0ab243e3d04291349cb035833deba6c60644
SHA512484a206c45716cb2591244e3a648554a598502286ac919eab98ea4edf5c7ae57b274d0c3be3f83754f71c3d6b30966e85d5f4b1158d2850abe183b0f01c9b878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c04d30db14c14849e0d1967a2ef3631
SHA13c4bf61bfa1eef1388ec5dff260d9b6ea5067762
SHA2560381953ecf60eaed67990a4d613c3e9083f3e04eb7587a8f07fa596790464216
SHA5128cc7069bae4245b7cd2e3928fe252d81d890e2df22fdff20fc20d349dd404cc93b9b79abd54adc5aa4555edf7fb3946034e6a20533c23f480e5da362bbf7bf3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f805ae9277cd863b94603af0f818e0ff
SHA1b61554b36e6e2b42fd42ce8af3f0eb5ec73670da
SHA25614c34c2aed886b463ed0c106b7cbdc7df0fbfedac92a81e69754ff23dbbd0863
SHA512d33708fe73ad4cc1de5f0b766c50b559b81ed952427976e1a89e7b82355187aab663d00ae5d93b917b7802f4c5f1212027d007f53c3dea9bc2b03f9d14dec4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b709bbafe188283e22c18d4e7a2178e2
SHA1cf71297eec07ed9ba37a50eff329f2047b2d3dd0
SHA256be9cfe672349306a7aaa9d844de3bd76476a41e2eb43bfb5ee14565b80930e7d
SHA512ac22b7f77e1ba1ff2019e0732e187af2b429ff1491cf5baa42ef43db1f4b101ef67fe64dbeb3d251a5d06c3ccef90ac14460ea0bdd94208fa6e8eda0d77cd121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4ddce51f7d4695f935fb7135ce49c16
SHA181d3d4958e4ac5cb5798ba35293bf7c7ca98b994
SHA25624f6e787a104710ced0f608a4aa1d4948e9ceb2ada4cfb3b417ada1d95566a52
SHA51226af19baa51aa1ba887085ae2312349b3a5fe437e6821d3bfa23555e7c1077665dbda1ab1a1d970201f278b8a4b2baab902c101e118066e728a58fb494be6b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f4cacc863ee975f4622d51acea0d278
SHA1dac76e112fea4d9d3e9af4275a59c411e38dbcef
SHA2562f671366d79015ad97d772944d6b2b86960963bc3c5d3828958b4ccdeef8c4a7
SHA5123e1113b431c676f1fb460598007de5d3ab5adde4bdb254f0e1ec7d17a1da50dfcc23e02c4df4ca5362b3975481be217b5ca48a2a39b0909d2ee12740bc9f8e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5706bc2a39e13961a92eb676385b97c85
SHA1ee99bda9e479ed961a6734387b2c27d8c5de7ed0
SHA256e2598d21686c6ce37a7c5884abe9896e034c2c97cbe305c0253cea0940a55b39
SHA5123ac7425315e6ea06f5e1271f0114ef1fa6e8b75b664687905f6f0937e94b3a54a498df6d0ef16ab548b9ef3acba0f9f6c1e44e3c5a6eb1b9ead9902e6a8e771b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d691710a4084ab929dadd323cf1f2f
SHA1517bfb9099fe2f07e0e64f76ff216ac7c9e12929
SHA2568dddfa394f9b82abfef6ae92e2b723d890a74f7ce59d73703dd6c434161fb3c4
SHA5124cd31746f3998fc88b8a76a05ef40fcb5ae008261bb3410da01214a5f1c46392366cea6d2f683d9348404c169426445885e7b471ab39f064bfc926e13912631e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06