Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
157c382ed0ac37af58ce149af1dc5792.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
157c382ed0ac37af58ce149af1dc5792.html
Resource
win10v2004-20231215-en
General
-
Target
157c382ed0ac37af58ce149af1dc5792.html
-
Size
6KB
-
MD5
157c382ed0ac37af58ce149af1dc5792
-
SHA1
dc82bbc80a55436ab24c0f5c20d5fe3d76e47fbc
-
SHA256
e8aded23410b2a227559d9ba9f42ffc3c60057a555da5ff90596e6db9ec93bea
-
SHA512
726ec682d67e7c3db80926e7664102f6aad205b67721af83eb253bea3ded01723d064e9b275537c73bb15944585c3eb5abdaf5ac6ed77360ea51e003a25835a5
-
SSDEEP
96:uzVs+ux7lOLLY1k9o84d12ef7CSTUJyB/6/NcEZ7ru7f:csz7lOAYS/3d4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88206AC1-A37F-11EE-B3A3-EEC5CD00071E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000005c548944a0fd0dcffc2d52eb75065297daf0e7ecd1ae36b9a2decca626396e50000000000e8000000002000020000000e936698490bf330cdad6eaee5562d31fa55d1c00ac5e9fd95ca6c2e796e0a6dd2000000035ced8e99e80534719952a33d253d40204db69c04178700b9c47ae2a2b991b55400000002e47cd6cbcc8f2d3477fcaa25097874b07ba63f321034d39a1d973cab296c093c8475c60444affc8ec82fd307213597315713daeed82b3935e21187de4611b3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409709736" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a701768c37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2788 2888 iexplore.exe 28 PID 2888 wrote to memory of 2788 2888 iexplore.exe 28 PID 2888 wrote to memory of 2788 2888 iexplore.exe 28 PID 2888 wrote to memory of 2788 2888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\157c382ed0ac37af58ce149af1dc5792.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58af8b2f2caa71d7882a023a5ee4577c8
SHA12035ace097b9aff86543ff016706b55dcf3f7166
SHA2569777c1ad76b1c99dde850f0779c10ddf75ae293475aa7f29284c25a39156a548
SHA51250604f8fda8c8ad7be17627d0762e1a00ed46184c346008186c37e88ee640b22a590acc17d3ce2c78a8c17f3ff50227516f3ee4295a7ab0282bde7751f4bec94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509c71f19b3e519003fa512ffbce6333e
SHA1ca7ca10cdf1a6649d120446a7223cd9c0bb77707
SHA256bc80d799c9f85351aeaff9c4a587a3abb6186ded6fb498d961de67238c6624ac
SHA512efca2301171ce7d57a254660d6e26e3b0e8a254d241f1b44d6ab1b27dcf45c489cf5280ab8e23c7c479a90aa1beead5552cc034c8fc90990cb0763b06bb58af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55928c56c097f7e6a13b06b4a0ca94300
SHA1d71073ca6a4f0a6bb6e99eea3eefc0158b3a5dca
SHA256a53c8eb8829e075954751f3358d8a0d92043e2de3deb1d7254ae514773dbde7c
SHA51221b8c250a6b547cca5163c9e3e752baeb6d8442fdd88fdd0bef0ff45073d10702c9782ff4b52b1c615797655e30de182a1f992628979dce1dff9e669a4d932c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d31364f269b39f78445e8e7054762865
SHA1d510c04480cafa8d71f0b0dc42302b6b70ae2a48
SHA2569a92986e627b535b231957cb82b45a9b82b0c6d4c3371f499123b34f9bbca423
SHA512d020356c019a9a0ba27a4cb5fec8243584fecc21da983279f2dc7fa068aa06192c9dfc85fe42100722f1ab73b0caf1ee875e44d03a85ee3f090869b54d1df413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3f26f62cb9594a30ecc4088ddd9512d
SHA1058647e0872682c07c29e56e343b4293b635d8be
SHA2569b5b9b442445d273158b55c94db236cf9cc963a0e639710f5531cc79ca9c7574
SHA512fc366af8e1b2b37eb67c9013eafa47e5951751b9bbc65e654051b0f0ca04b5a12fa6d4d369d623fc628ff95dfdb54635f712db6c22395255f7668afe74ec5679
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06