Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
1f8747756a37e9c201b6a2c60fa9e2f5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f8747756a37e9c201b6a2c60fa9e2f5.html
Resource
win10v2004-20231215-en
General
-
Target
1f8747756a37e9c201b6a2c60fa9e2f5.html
-
Size
53KB
-
MD5
1f8747756a37e9c201b6a2c60fa9e2f5
-
SHA1
5889052d8e271a455d2eb4a1b01a581b16076b9b
-
SHA256
e172c9f9b406a6cd536e0aeb5fa941a84aa9399c0298638ca866ce030416c382
-
SHA512
32362718967e80f51de128e099c1c32f47d9aa518ecb4133333ab860fcf8063ec7c492899c96c73c9a9400d3941c7448f9a5352d2586a600a1ab839308a36264
-
SSDEEP
1536:CkgUiIakTqGivi+PyURrunlYs63Nj+q5Vy0R0w2AzTICbbCoV/t9M/dNwIUTDmD+:CkgUiIakTqGivi+PyURrunlYs63Nj+qx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48E4D221-A559-11EE-BF73-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2352 2504 iexplore.exe 28 PID 2504 wrote to memory of 2352 2504 iexplore.exe 28 PID 2504 wrote to memory of 2352 2504 iexplore.exe 28 PID 2504 wrote to memory of 2352 2504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1f8747756a37e9c201b6a2c60fa9e2f5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0e3f926d719cb55cea4d4291989011a
SHA1b301e8ba34c84fa8f06e4aad545279a408700bc3
SHA256b33001d458e6ab6f9e9be117fc9b5c3fca3fe113f6467452176ca7a3fe8563e6
SHA512557c7bcf1972879650b7f2dd0e398879bc5e95d5c9b832aa4d96ce487769353bc43220d824252fb7ff0506d8fdbb88c5e100c237b3d9c3811a176fc73cfa5600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ce1d03be6a27294714b6bc0bf86608
SHA17d99277dd1b964d0228b16bdf6610a57e24d9c79
SHA256ca7d0575d7b59e4a679d0ffa59741d64e928365e09a79c75a415f91308459e87
SHA51277b9d0bc5a1721a3becc8e80ad3f738c3308d7d019fbd424436792a2b94c488662e48c89d0e2c3147b0680d5905826c332d5049239b9b881d23b0fde737d0c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557edd0d123d7003ac7fc0f93d99170d8
SHA1e000d8863c7a919574b4abf88c5807309c715a1e
SHA256fa520cfcb660328253eb8de908b7fe36b4b017461c3ca7ce5cf71f340e12706c
SHA512ac7c95c7b8b1dfc489cccca659fa2fd8367efa2e1df3046df0a1039fb481d3b8deb0fe71c7afa897154e110591ddeccb0c43348a75f28c2b060463f3a5edaddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54448d95544ba79d21f3c4034cd7acdca
SHA178cb43fe379919b49a009a762ae0d2289a36a5ed
SHA256e2ae754fcb5da471aa8c3e1787305536736fad2c875d4d9b083392fff2914a95
SHA512e21ede18ee93bf73116711031d7dab77405bfc1087a92d86e35cf45ce5ce7e54e5fee8d1fa8a1716fd5db8999904d93a7700258812c9dfddd87eeed36c5fea0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c971039238a31656fadd8e9ddf7b02f
SHA173c662a902584786b74eae54464fa0fdaa9267f7
SHA256413ac3724c6445e47d8043ccb3503f37c442489b79f2db7629e86b3f68304cf5
SHA51202cff9e0c7a298faa9336ddca375264688b2d628a812d1c71922cf88d8dd607894a8d074cdda89be5c74973942ec5bc144c2e48c50226e99ba3b9d863775b255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ebcc76794d6c41f507b1bcaff6f5f81
SHA187af9d7c4e6fcf9e00c5eea4ae1c8630e9b7d74a
SHA256fb67242b5df0192940c41a6f7f7bbcf0c88a65d6d77d78b903de0944520bfbca
SHA512e437a00c8ee2a1355ef35739b73b07b9595898b6773753c1dd1737f7e710c4d48baa14f43cd14c133d1906bb8cc95dddbfc7cf8a6e2e5c0cb235485876505452
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGM5U0T3\star[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
31KB
MD5c5c6dc4b516684a30a49d2bf451c9c6e
SHA17eb6c4b5920c99795edff782d959a23ba762491a
SHA256aaa49717860155b9eabe6103016a70e21c5655815557fa5b138cf087741d2f9b
SHA512d3656cd83e24d7d1024e95d552636f1f0a3352f380cfcb739d9105e1cdc396ee28957abd15ab5accb9c1f7a29bc866f9845b515fda681c107c413cd1301abb8e