Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
3d08d6896802dff85693c3c699dfb67f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d08d6896802dff85693c3c699dfb67f.html
Resource
win10v2004-20231215-en
General
-
Target
3d08d6896802dff85693c3c699dfb67f.html
-
Size
68KB
-
MD5
3d08d6896802dff85693c3c699dfb67f
-
SHA1
d331c9986a7827925dc28351b19c317683ea1b06
-
SHA256
aa4d6aefb49463aa412f5c471cc94c60c7a875a6ac585d55e7695c945518e757
-
SHA512
77640ffc912e0a9edf7a39dc12ba2c214549b11915eb08a0c4936afefd2fae79e01da39c7bc6f1b0049bf946ddc41986e93dcf70a57b3ed664bc7b18d5cfe2d6
-
SSDEEP
1536:/wt2tobDeCB2NTR7jRD5WhHCdVMgOYzLtqrXxEV:2bbDeCsNTR7jRD5WlCdVlptqrXxEV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000bd32ae7ff0d861d3640f0427683bd7804390aa6eb7ff8bfd18e1c651f07701f9000000000e8000000002000020000000395d25448c6d2976bbb882d0a0ee01562387a72f82677d4b01dd637bf6535c0e900000005a93f2eb8c76a258b9758d4912ab8d95d929aae012d2d358310a9f2420d075d07a5878b02ed1e94dee15822dbe34d062176142af7961b5678fac647ac2bda97ab48b33c49b215337b83bb028989a7a0d7137492d3d00828cf81f463b0337f1ccb0f95a4d21840e8a6bcf246aa14d8e05992d6e389a6e6e0fb23def864419e762cd6384cf7c14644ec5bc8caccffd58e740000000bf0c2ac912968c3b0934694f9a053f5d849650f1981d2b2579ea490d411b7eeeecc93da80bc1a39fc336b1dab3db8489ef7abce1a6001203d2acf516eb185ab7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A7F63A1-A64F-11EE-AB16-D6882E0F4692} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410018767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0aeb4fe5b3ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c0000000002000000000010660000000100002000000064a583e17b9287e22f45e8d93c468d5a67176de6ee57813e81f8af28f3c373b5000000000e80000000020000200000007254c54c2e54de17f8a1ec969da789e1bb00b9eff16196c4d1b02ae9eda3456c2000000044fc38ff533a9e694da09351653d365c246addbadd484c04714ef32a1b5580f34000000009034b05443a9771203291a746e58f1ecd38fe3545c2a79d23b623fd31f19fc3762a465026dc8119f3097162ae06f8757fbfe880ee58959b6976ef02914b8874 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1960 2092 iexplore.exe 28 PID 2092 wrote to memory of 1960 2092 iexplore.exe 28 PID 2092 wrote to memory of 1960 2092 iexplore.exe 28 PID 2092 wrote to memory of 1960 2092 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d08d6896802dff85693c3c699dfb67f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b54876edaa456a345bf3331ebed382e
SHA1e30dd3b7f1dfdc6a6eb4111dd133c6ac9c9fc523
SHA256b73ed37b3b30bb6c932bae4f319e761f3d4e460fd5b65c6d61e36e21ee6ebf03
SHA51217119953e72a64bc19cde2442736b48650b53be29e4fc731ea631daa9eed6fe3b0f425436bdf2979b2f6b8e062f9016eafa7258cb36db69cb4a51a2d9f8bd1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc89b743859b4b16b49db126b7cdfa1e
SHA169c3a38f3177837c02dc73ea96998d05d6fd5c1d
SHA25698d80d1b20ef9673534e4e5f8804caae4740faf30d280e5fce09b78891498e3f
SHA512515b59116c3a2a505a7fff767d1dff94148d60f9e9a70ee3e14bd00eb124a1f5b3152e23a4970bb1619401c35766a9a137bfc01935659e5d242e410d515f2100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5215dbc7b7d075dcf554dae7ae707d313
SHA155857ef4b276c1bad373b1a303458e9b2e72c9cc
SHA256bdb1b0cb56920762cd85f5b1c0e2c4b5239cf12fda4efbd9c4beb3ea77317a36
SHA512a464ae8db8fb1b7ed280ece389d143e87fa19b65dfa215b784f02701da1b2fa6bba4fc9a1e28130dd9bfaa5e773dc20fbcde1ae86ce8e41b00ed51a36717ccf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d819fc9b2b0d26676fad6782552488
SHA1304e2aa5d79f0b14f96d0f704f9fc9ee9ae448e7
SHA25672d3a449801d4fa1b3dc01d1352d15bd2f3893bd268c224150cdfaf5fc7a51cf
SHA51234cc4b24ccb6ea1943b0a1ee808fab8048d9424eee805c4ba4928643cad756ecd83f9639727f60bb58fdf25a84f4035b5b5d3f669e01bb7b0bdd9803632d66cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fb467bd424cb44211b01f91ea811705
SHA11898c27d1590362abbec5c5a3a020e01b392f25e
SHA256b3fd3f583210107f9a8c681886d9dc072a8479d13c23f42f70128f279eea6e55
SHA512dfced6ddb6d854aff73c851b5cc880c6e56f3ba3fd35be63983520fe164bedd6f10e793e8a5aefe248c6cfc7a1b8d52a6478201c4804da4c85baae666d8ab499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5610e85c21ba7209666988bbaf151571d
SHA1b49cb6d9ef06a95b11b7ca613bf99aa3c7ba42a4
SHA2562cdb57e74f0573845c52376a19a54b0075e62941d36294cbdd28e1b75ef8be6c
SHA512fe9c080f7a658b92c9f2bb80c9d6945cd84ab7b66b71a94fce46c4be96a596b7fb92a659643edd8d73ba31067efe0c50313e1379971b812a3467ef8784edd572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd97e61fd090f1e98b170c297e49415
SHA149c5bf6e4a44fe3c0de585008896c14a85c928a0
SHA256cfbdaef26c12c8a7baf406bb0c0ab84971e10c431462245e352d90b953fdf0c5
SHA51250be0d615dd07eb3a25a93afe51d9c46cf6c0ae168f94d59891e88ea4b47156b02b2e91984ff90b3823da541a2b7d462f463ce55aea421ee258187f96db1f66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5507e3eb967ed9ae71aa74453db128ab7
SHA1e504552623a8c804bf2f3094428a24f9e5ac8aa4
SHA256d78487b0585f56f48f610891be9588756c1662dde3a290b15eb4c36dfc5b2110
SHA512288869ca3f6b01d43bb67f5f6daf698af707e6296c00553fee885e8fb63d9ce34bd5543bcb8a66b7d0a3785d9171ef024e41724b56b32b47a04e0f27e56c9708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559428ad85909b7fd93918bbacdfb5168
SHA17ef1d6966316181bed2e21d3ad15c26f46e26fae
SHA2562bed51ecf9f5ba02ec4ed8ae3e823e1b6d5a302571a7e38f3a5f205a69bcbdc9
SHA512450fef96043d6d9308898eee40cd94627af49a3caefa4679801adb9f0aadcfdc69092322fdf194424b338a579750dbab4c634620e5cf6436b7673ca3efa83a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ff4fb23ae0869391b6eba118118f2ec
SHA1bc08e9e43520ad85a222181b016c63ead25b2ed4
SHA256d44ac509e29a4e2c9c8191de91d6575f5374175a01310d2c39ecfd36576375f0
SHA5122f49e096912a8f17fcd6825eb58e594e642cb6ca547e05147e4b111725a3541e8236af9fe458fd64a948005ebc3c2c87def628ffb5a5a19f1c1082201b8b6b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57284fdac5e0fa9252cb44efb21d3c711
SHA1838ea85beb15280926bfd3760a8038f8ae66f809
SHA2564a35dc53d2c87f81baf24b5f750562a57024b853c6db4b3fd6547d0d2030c123
SHA512e8c3e62a432fe7d4bd51b2ee57a5c7ccba66ba5b5ccf38a5fc8d941c28581f0176f9440f6bededccd7a6ffe1ef3fbcff5679a1dedb9072dc29b810e4db8edd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533d33d484373c4f94299fa21296a55d9
SHA13e63645ec163c1aa2cbee566a9a0a8e6e8234664
SHA256762bc6d4b6ba9092738fc9f43abbff2ba22f8e7868c6ff0c5cd632f5be1f6f9b
SHA512b00ee6c3e57b25953cd2a9ae3cda7c82da965dc30179d6d3446b9614cb5d762c86bacacfc73c7944655ea980f6a57a0accc2b16368c1bb70d7e9594a0cbb1cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d61a46a46e09b0609e7e0665b7dd88be
SHA1138bca169a59423b1e159cd4d70b7d47bcc6174f
SHA256cfd8be672a342e6c30c3094dc306325ddd3054f824d38cf5c8f728bfce618a25
SHA5125a2224f1492c2ace1832e7ffa82ddedea9e159f552178bd972da687176c3767bf3c3a951893a9a025e10d52a19cc6db55ec3d76b7a3222a032f2a6ff2d88c4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc926c85e0ca989e28143fb82da49d99
SHA13e3ac7297fedfa332aa58976f678d7139e04f7e8
SHA2561ac2cd29e27831708758da654db54963c8b90f083fe016b172c739a366e65b65
SHA5124aef1673bd6c5833f84db30c7e7309af2be9aa5a6cf965d51569bcacbc81d57f138e77649718a6c279b58ec29b944fa48f4681c711bd5ee8031b635215a08905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f61bea5b7308a6ea2b847598ce1f591
SHA1889d7e7c8dc64bac108a5f868f8c7f6eb93de9ae
SHA256b7ce9150853080c675c83bcfad7d4eb4e4602f55d7f4826822994f08554bba9a
SHA51245ccc8156ed2f67d8a1310214eccb1b8f280a65caf3afe5311b43acfe36b427a286273ca77d9137600ca54953dde2b309d33b0249af57ceeb2a21c1c5de1e621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dceb2ab0b83486b95b9710f29e66deeb
SHA1c885c97af5b2109f51a9ad3d86700d3734c8b13e
SHA256a2330296ca48a494ce1f35672b52dd0517ebbdc2237571c019a7e1570ccaf2fe
SHA51274e018bc25bda03d6c69828d3aa4cc185310d60c12cc207b4b81d422c6680d281a228436c4f2714b43886e6ca774ff29ab580dbf3b4e2b3061ded5ede56208a8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R1EBDLS6\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R1EBDLS6\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06