Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
148051e729fdd29e3895ff23608e2003.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
148051e729fdd29e3895ff23608e2003.html
Resource
win10v2004-20231215-en
General
-
Target
148051e729fdd29e3895ff23608e2003.html
-
Size
1KB
-
MD5
148051e729fdd29e3895ff23608e2003
-
SHA1
3acdaa289f0f2c84a6260dc2529878b4fa761261
-
SHA256
4060aa8ef54d3eecc3ad78abef385bbecd9a046a61c3ecac14f51b76296133a5
-
SHA512
1b3527de3eacb24f10de06dbc798be4d4002c186b7c79c46ad5e5ff08b1d36d52ee9655171b6d7b3da1c2f3a60c76592744d3f7b8f6948c42113a2d08a06019f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000096aa279a4ee553014b731cbae916280cd4c06f91b93b55cb65aafbfb274fb07a000000000e800000000200002000000007b619e212df069d0d93de1ecd28b2defafdd4c8ceed3c22bb6314999c164e9c2000000074a4206282c8441c507ec5e6b85612a90c0fe8d3848436c6a2bbe9e155bd2f6f40000000e2de018f96c8869a4b5c623d52f2e8a73d0f3e1a3b30638f024d7529fad9cc7d24c0d841202e00caaba09dc1607b6cfb54cb394d0440a8d8efd5df440dcaacad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08075b70239da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7A7C801-A4F5-11EE-8723-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409870499" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2884 2268 iexplore.exe 28 PID 2268 wrote to memory of 2884 2268 iexplore.exe 28 PID 2268 wrote to memory of 2884 2268 iexplore.exe 28 PID 2268 wrote to memory of 2884 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\148051e729fdd29e3895ff23608e2003.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccda5363e1610636983142a0ae1321ff
SHA1066ad9d40b589310b3786aef0ce0eee6bfa1659b
SHA25682b8b5a6c239d066b9a2bbc91f64148f1263a255f42b80007cc05d9e5923cc88
SHA512e53120e07a50b88ef9ab0cc9c6c6eb9d2b36b040875131b4d2fe911b8c347f82167198bc15431f699f01c9c889aa7ca912b9a354e3d24823b03fccc9e2586ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51527814ed49c10a18ab1dadeb8a96fc5
SHA11ebd2f82b15f394e959b3239f2318bd8e076e157
SHA2562e95b29dbefcd462ecf5f562157b55ce470b48c0eeef7efaac4632e1e9255a7e
SHA51266278aa5f025895fa8ffc84e12acbd25b092062b8555d9baf1f579edbcf9b9db76e2cced3fc75985f49cb7a358650e0a06abc66c598fbab496620aab93f810c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac98ac232e47d0c445f1b36be22d7a77
SHA1e2c1068072883d2d6e9eed252755de4d9fa11d01
SHA2563b02cbae6dcd0ed2bc0e75a1ad322a490c8007232ef2525fd8fd0ecb392686e9
SHA51295fc54aa74a642fd64919f318351357bcef692f2dcb2ae70ad40fe74fc459d6981a034c3e0a5ac7063e894d5558d827c14771caee5e410b6dd692278ac12abc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7fe92706e97557d60bc3722ac3ea6d7
SHA14f3fabd7e86052635cc82b1da24249da58c79bd2
SHA256907a7dd873a628ad7334b1181715def440dc36c732b8728566207038f0b99211
SHA5127b0c51b41aba68e6a60b52e19cc73b3f438211cc146807522302739b8765dadf8524df4c8d8041fa9dccf91b292529217da0c4702ecdaa711c6c0c0e8eaf5ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1e66ae575559994d5d20331c9a84081
SHA18ec898b5c21943c507603141bfb153444a9d9721
SHA2564154cf1cd3e80397a314f3bb9ae4c9ccfbfb1c7c5737202f700b8fb231a6d3db
SHA512ab0fde7a05e2081b9a3d61ea8c0e51cf2ef332f1002dc4558bb39cdc11d5a564e6504b08b8ce2175c8341f6ac12b88dceac861fb3602a474c627e0f7b725bbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e0022d2d6d2ddfb692cd05c40e745ce
SHA1489925f02eb246800f7a66a462c8c53db29fea2a
SHA2565530806d59e9a71f391f3be9424c23eb9bd77263e1744394bba7fde82f8ebd9e
SHA512b4638f0ed26b8d8e09906f131e9ea0b7d4b9bd81e0be8a34b5625c743e8e8d5aaf74a9e0ced04740c59974159054e8c22b1bb56d958fc94370834b65405082b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598abedd806d7a64f8c9e4f426c7bb322
SHA108ecb88645bacc807e808c4d95509914cde61827
SHA25609a1c6d950e10d37a425a6f7e5ed0846eb8e0239d955a479972999c50b755fc0
SHA512322e5e3ae47f477d3d25dc490ee73179dd3ba3522328249e13f71ac32d733b9bcf3fd544be79363cbcf4dbeddeac07952ab4ea6ab183c6d14fd3fed2ec8f273e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a81b79a97cae6c85d91df98c419c9be
SHA1ff1762f9d431b13bfe205e770124434e0cd31887
SHA2563ab2ab8683f0353bc7472c36c3fdc5bc900470238d682f4e47e333dc831eee07
SHA512567571541191fd4a4345ac5c36e36649dcd1807798dd4bf7d892b803550b2b8499a5dd7899c8d189f6e834c8e2a60a219b6d44cb378d7c3a2b408403ba342548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a0cc887ad007860ffda11fb09665fbf
SHA10e88f7a98b524ca379fcab33fe948586a762398c
SHA256b0ab5d74acc2c00a30b2e3ea7c0563298dae03e947dbd55d7fe3688c72f08d53
SHA512ce5ae5e1e09f848aba4f5a95302d4828afdbc79e50c7e14bef6d70ae774061239ab5c43913abbfc806898e0d35ca835ccad46f5f4b721f40e5c720ac328eb9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405f4821d3bc418d75bd459f86200c8f
SHA12258547fd8ad6bfd0f29a8e5ec2065e065278ce0
SHA256e7af3670cd0d0b17b616f29dbe3c354302cbebb1f04b726670a56adde1dfe66e
SHA512b59cd87ae910b2490e0764b94bf6728a20fcc764aed00d183142bfbe5622355b1037ed1d27bb6e7bd45b1d0545e49f6f3b90ddc67ab585354e3af0c1afaf3628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526198d05bc8924a4f55871c2c9c46e9d
SHA1ac2ca70e1407745921f35f78fdf57783fbb2f1b4
SHA256eb84263197150faf6ce694b71c819879f505099a44154905015efbf699d742d9
SHA5122a37d987295e79d082f53a3e6dc01fa162c83decc109a1e398c5879b5312bbf08aec0befaa7005172a8f421147dffd245a047efb75947e4f6cebe050c950d3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d7ef42a682ed5f5967d055ddf23237
SHA1d7210042b270799e3e159924624ad64e6aef6942
SHA2569d9813256b33ed0b310b3e36233ae6de157a843467dd6b222c36336ca6671247
SHA512c67bf2b815dfeb16b98494d5ccf03e6b0e16c2cc72a5dfeb1891bf856e0a505540b70d025b710977f674681017b4c3f99769569e12dff6118e8590c839c74ca2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06