Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
3572b3607b6b03057cade2461766db82.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3572b3607b6b03057cade2461766db82.html
Resource
win10v2004-20231215-en
General
-
Target
3572b3607b6b03057cade2461766db82.html
-
Size
895B
-
MD5
3572b3607b6b03057cade2461766db82
-
SHA1
e1ac4f82e734e815f6f69312ec6d544793aed4f5
-
SHA256
656574ca7320fc12f2dd289614cd666b47e63ed0624de594b3ba569e56747921
-
SHA512
e7a9dce289ba086b28f0adccfa8b87e4bfa166b6f367949708613c59fe73de69671e16a31cef3d84ace81dc86933bd26744593c3f41143eabd2f78200030ebe0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D36679C1-A40B-11EE-B0EB-D691EE3F3902} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000007d7f94090af89c296c56ff4330376ef4a7aee3be62e0a9259a25713565bcce46000000000e80000000020000200000002f17f3cfedd3571c0864d40549f6f086ae1326e2b29009f49a567147081c10e62000000075ed3fbe55d5d0062a8ff6fd39e516b63219e9f500e849c7f9c0f45aec2a5b1a400000009eb41c0b2ee622f6143c16b8e08a71b54567234ada5ef543a9b2d54deae4dd036a2bb40cb9239b2ccf683208ca7a68afe58fd5848e80d2c16f0628a09768a599 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20dcb59e1838da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3052 2552 iexplore.exe 17 PID 2552 wrote to memory of 3052 2552 iexplore.exe 17 PID 2552 wrote to memory of 3052 2552 iexplore.exe 17 PID 2552 wrote to memory of 3052 2552 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3572b3607b6b03057cade2461766db82.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51415389790751e15d0b52c0066376807
SHA1133225868db0339604c85bdab51af95049b9316a
SHA2565898afae8e9fce54f6cdebd7cdc715a04bd3b6df0bc71e8a48e3a6d0e5bef648
SHA5125897975e2f5a03f8ff01f41b52825fe9b7f7246953d97285e972e7a6c58985762f708e47bef62535fe0302415b2d3fb620a1b374783338de135d1a7161ffd7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52021b69d8f8fb5914d9a647bc3b498da
SHA1a8c89bd3f38d549666e1f58f4eb759c3d1596068
SHA256e68dbddf466ce10983bce80278611d35abc580bd7b863a4644e7979dd319e854
SHA512c37de30712fda135629953ceb312347eccef325835b66cb750b2202eeb0892071e71320f1858db7499c09727bea7e4bd0a724f3c222bdfd48d3c6feee662ba05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e2121a79427729b26e0a0e76528614
SHA1f623d0c570f7b05bc5712faf42deb6bbd91d8d88
SHA256fc96bc042e285c726a387b4c74f0e64ae54c5ab0835b62b186b63c5787f35445
SHA512875479730ee94a1382b959f5f4358f13441a3403b213954970a43654cccbd54fb7bbfcea6475048d1809939d15921ee59b8556aa2e92c9a0ad35e499cdac41ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59edd93a0eb8aaa1f780bbd831e8263a9
SHA1eebe639d1390da0bdae27aa53581c33ef42bcabc
SHA2560791330b62eda26513f3fc4fb1af759dd52e03613b6ffd1e1c8dcb316fdeed72
SHA51203a9d3e758150a50cd5a5ac51ef48dff3792c4cd82e087f4fdbe5435a8ba455143ae18c636f69cc3770ca4bda7b28e84e87c4890f34c70b2f4e524612004c3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1d5ad412b67ab84669a589b881e1d3f
SHA1a79ceb3e812060cc39d326e59f4f55a4e4411069
SHA256c18d1afc7001a6afd438dd41ae1ec9636a92603bfca48f61ddebd95fa3f8e069
SHA5128640f45796edbc4c35e98bc5b0af3ba851827b5ac4a6984b010bd6ab2268a4062dfd6e925b994b12733d6b50c222a821c26d9b59abbee1367d292e3830020cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54283af25c6b465ca6e33ccdd58d8ef1c
SHA1b43eeb77c8b5fb15ec9fe39d93bc3e99bcd6db63
SHA256539cc1ecd55aa6f577253ce7f8707502f9760978982b7dd385711a5175937bb5
SHA512ea5038b875efef825a475a1541c8c3736d0b5b97abc2b4cd7001f05a7947d5b29bf73bccce17d248b7fc8f03d19e65868a9a75e050e980569a67c0048bc11389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5762bcbf51193e942ca79967f6f6e977a
SHA1b7ec97267e65fba6d22456cb95ae87e9ac050e7b
SHA256feda706ce1834e4e6af448daa2b23e7692eea7fb08d84b20da3d0aed79f550c6
SHA512372be1deb9d67f583eb90afc2c0325d75f61842d1e8b07640ab98cd841428b9dc95d3cd9c8df07f3e1cfc23c1dc73e720a1722c25aefbb654f7f6615f637d538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d6fbf8cf07c4d6c8067559c347c58c2
SHA163d4c761a3029afee8d4beed2ba7254550752680
SHA2562356a1d6e1323aaf8e98890ecd6f1c5498e135fdf1450346c3393e255e2ac8fc
SHA5128b3b36e7c4ffa49c08502fd8605c1263484ee089c5335124443493a8aa7e460f566dd1ea1431b825bed1113d171001cef30158616369c16d06cfddf3de6f5c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f9c88de0e22458ba100d65e360c2194
SHA1bd4ca4c641cbcb66667c7cc63738ea932a4ab0d7
SHA2568e398cd72341471df51d77590c108e382fcdd8027dc0b49cecb524842daf88d9
SHA51237e1a0549fb220db23aa23e3e1a98407651c4bce7ef744d2ce866202fd92c5ebba9267e602a0db667c1c0d418686af6bbe9aa6220686430d5161f3771954f63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae531a240151c20e1e8fc4c0c838df71
SHA1ca55b823989ead2715882d2bf80bf0651b946539
SHA25690cef1ebc8d852b835da007c4f25f6918dde51418269cfd76ee75cf5f2046ad1
SHA5127545bfe8cb20d547232b34c7c3426e747c06380cee7bca70b5a9102e980c548c396119a24c42731ba409c4900f0208028c665f1775c3b78d439b01dccc20451b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d8249a5ff5c8627dd72a61dd1e8e07
SHA1a018d5b6ee722c91d5d73abed052fae1fa7051a9
SHA2568b3c439afae8503d907ef34b034e2ac9e7d1652eb324069415795b1c35090b37
SHA5128d3fd6b3ce5de7650fc3c5c7b31892ff12182667776eaaed4bb39a6d4a6cb01a2338588f4d8d29f62d935de2a2af3616dfb9b2742ca0202e93353dd83117c0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59942507d96891e0c44458d8088e07806
SHA1e2b5c003704e0d8da7f75659e2dba14f4ac881e2
SHA256cfb453600a974e9acc1c2dfb551532cc50e7fa17145445678fb091e18688ad89
SHA51216ba43539d75ed675b7a9d71a44adfefa1895ea64f112258c305679786665fbd3aef4ec8be12a0a410c7721ad484d792cf6f358cdff1b02b3542bbda13d8daf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b162dee3ce2476b955e7b0daa83da6c4
SHA14ddc545f41b85d1d65296268f1f6cf42dc30c526
SHA256b632b4105d8e69d39d05df38f6a8b51febbbd95cc8c2c17618cddb34b9e29f41
SHA51209983c6ca37b94b76e307885138b1c2169337507f0e2ffdd3cba30510c16de6a36ae1ab7f3f0b956359dfa55f7b55a052283dfcf59666ac2e3586671c38a6dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f8f9c3b28460b509c6ad6b619046469
SHA1786958d98a8414eea0d05582c709c44869b4accc
SHA256c83344b1812ec024c282c4d9bd10456303cc6905f0abb339ec16fd3e137862ce
SHA51285dfcf062029f854ca330b51b9c447fdbc484951a2b13fb57299db56d5d893db202caac0f69a7a6aa595277b6d5686b82c39acbaa222c2d185f7e40012b23c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5274f779c40d2dd67e4d605447104ff54
SHA132d744370550bb092eec5197a5b23f90424ee4d7
SHA256bd9d846c91a8ff35d149d6c7198a823331fef88f1f9fe606a92f498469a736f8
SHA512fc8f337f669a922151c8eb2bc2e05c2c8a25fe860abe89492075db2ad42255a78eef623c727b5ff0c43b9dbffc7288c6ab852533ce011c83ab476c630edd8684
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TQBFZMMG\favicon[2].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c