Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
3ce259ffe9e1ee9a46cec7c3b546fcc4.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ce259ffe9e1ee9a46cec7c3b546fcc4.html
Resource
win10v2004-20231215-en
General
-
Target
3ce259ffe9e1ee9a46cec7c3b546fcc4.html
-
Size
53KB
-
MD5
3ce259ffe9e1ee9a46cec7c3b546fcc4
-
SHA1
898a7138dabeb6fbc48566ae3257e8e9e39d3ee6
-
SHA256
e6d55dc14bce1a0e355764a0bbc3c922897f391637cd35a967a3ed4588b19945
-
SHA512
2ebd5f2907f9805876a9835495aa6ff8dd6097c298ffc8a83b060140150c57f79e3b9b35acf97d0f2e70a7530a9f61da00cca28079c8e21fae18afe1eb353f60
-
SSDEEP
1536:9kgUiIakTqGivi+PyUdrunlYV63Nj+q5VyvR0w2AzTICbbso+/t9M/dNwIUTDmDy:9kgUiIakTqGivi+PyUdrunlYV63Nj+qP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000b4930f9983652511949e2bd4aec8b9b409c6f02c64ce2754a2aba7b69ff1dd5d000000000e8000000002000020000000ee29823ecb6c54f7157fd22783c9f0ebe5c68ff508893e9b79f8f37fed555afc20000000842d5ebe7a1bde0e623ebde1ca92887c69ebdb48cae1e88387787009132b2e9a40000000585dca131131b50316428494327027e6980d8ea36f5a1ca0c5431df1a9d0f48ef6832d126abedb3c3b26ce2ae8f29c38646b2e8704ab448154ef4a4aa25f81b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dee8b05a3ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C641ED31-A64D-11EE-9B34-6E556AB52A45} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410018216" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2672 2144 iexplore.exe 28 PID 2144 wrote to memory of 2672 2144 iexplore.exe 28 PID 2144 wrote to memory of 2672 2144 iexplore.exe 28 PID 2144 wrote to memory of 2672 2144 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ce259ffe9e1ee9a46cec7c3b546fcc4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5460631080c76df4fcdf0c565651ce6a0
SHA16ae890e2bae77931dc932d58b0f8662c65b6493f
SHA256c89d81dadaad1c4344e200342174ef69d18a385f79e1e6ebb81b7c1d08e2facb
SHA5123d691007217b6b7049629df5c06bd7245ae7caca810c70874dca4b762a1ed3e4b3e3a31a6e5542e5e455c1d8aff34e8227fbc0cb79879af37773b385054c9201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eac2797522788482b2bc2be2d621d83
SHA1cd863b7170f3e494f43fe02542718d60bc4c8007
SHA2563e91bd8a9a5bf081fa14fe5cdd89f6150044c80e6372623e4ca16b2d5d81f550
SHA5121df8bf99f502f2453c0fee5b91ef02660c769877b3ddffefdb27e8a27442d8de0c7048ca1d11da668909bde542f3a7faff06098636a1981217f43a535cb88aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cde30b346c22bf199f60dacca2061ce7
SHA19a573cc7d9eb8896c3fb1cdfda51df387467dd89
SHA256a0e2749ad458b4b8fb79cbced795c223f1d2a27023bb16ebdd7c7bf018a77ce0
SHA5126249a4be818a45282b7180fd2c60d89dd65c91899af52180f757f844d254f3526c594e9f2b7806612333ceed52cabbdfefa84936ebabff034d8fa08325b06e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ffb5fb7bf1557592a9ef10d2aafd56
SHA1e8b3499adee81381dd5e38ddff0a33ae0442d029
SHA256bb445736006f233bde4bc16f59e5b4563e8b2da1bd1d052557a817c9c6fd7bcf
SHA512fd518ecea063d8fcc74237cab1f4de32bf7cad96e3c03ad66327806b4cf6cb84da43ee7fb14ecbe9c6564b4cd5b777b8ac210ee144d17eeed2b6c45c1333786b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54119dc47320d1fdfac282a97ea4cfadc
SHA1d792a67bd4e226e691b66c507dff03223bf353b7
SHA256aad3d4192151b14372a4a817335bfee425bf2d5e52ad1ddd831bc8c972ab0f90
SHA51299c106f01f3135aacb5058b00f77b6e322011a7f79ad5f79a0e259d60e910846fea6fa86e046c11f594c5fa0508f9a35d88bfecbf1a70331e51e307e08bf075b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab3e56f2e58e41a595aad644c30b6f3
SHA1c4a4ba6d4ce08756d7f71915ce2c6597b0e6da46
SHA256f32e26704711c7bb48d810e877994511de7b7ec355bfa6a5e11375d9659c0274
SHA5128713535101db55722d64505365d3b5d212b11065908b94dc231f23dd3390d2814915b0a5a913fe742a784404d98f114073001e0072e5061f9a8f3a7f93c88f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4893ffd8d1fa30216adaef7c7cb015f
SHA14e4ae68ff5b20f6dda9e3f79bb17442ae40cba46
SHA25680b702962d3c8e7d9c8ddccee2a01b57ea4a90d3dab03e3577f88ecc3c6fc2ba
SHA512c80035b0de198274264f631f4a449645b53279a8544adad3415fa05f0b305002c0eed0bab95f129547f105751d7dee8a91fbf22e2143c7a10698ad107b03e2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592ce3c48c8078a13f2b1866c2da6720d
SHA1f5b70d17f6949ef071aa747194a8796d26c464bf
SHA256ef8abe1f4193c6baba39e3d486d9a317dc83048fa8475369997aa0a2c7564d4d
SHA512e6e64385fd0867a37e4301f76d7f36ce2974b7eb1f4b40db258567b0a69c44ce4c259c69ab5f29c30169e8116b8d040d0da8fc8d0c7fe640aacad102a22ee27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5532b416c318e2335c4152a2ec92f73ac
SHA1fe0711eef7905f1f15c7fb12485c2f07b56ec223
SHA2569afd9321e32114605087a99a48a3d40781d462ce43b1d4f5457049b6e965e0e6
SHA512277722a6cbd7f30c71802c91016cf384e772a27fa47444eb373e426b3c8afdb3b8334f814bfd356380ca4bbb6af1e3bb2388f686ec57607311e70ad2b9019fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5815f3a666e020628a4fae2a7ff0a8060
SHA122e20e67c78c3d4abb3ceee3aeff33873098a14b
SHA256425f911f6eea5ff1a26d94ee8105d9c62bd8b64489bb576a0cad2afc36161e5b
SHA512701d40cbf6b969de7f077394ccfa9150f39abd1656585558a6320099462be20766e2c3b910b057c26b4fd9ff5d6955da2eedadb012d9c8d1ebde6658ace8e268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f37889b4cefb75e4de15d3aa2c91d5bd
SHA130450c34fc17ca239d242ef7792f81fed2092577
SHA256b332a88d8b4f87a37896778ce74594c1e47bb84bb3318227330dd55cec551879
SHA512bec8a361f72a3801671ef6ca196bf6e86d86fd525c1410efdc0eeec56058bc7a9245c4bb6071ba430fb49ddb6dc3e5c1645ad56aad2e7035ffeff3e7ae756f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dc04814bd476e1c0dc8b551290688e3
SHA1064180b7f0fe1c74b1bfe73e5c1c269ffaf88459
SHA2569e8e609992567b7a39c488026421c3583ec1c8117d994342755045987b7b238f
SHA51264339d4bdd80e6842e9462509796a1687aff0995157364bc87ac54cd86c1ec785c207557e354e12cf99e79e07aca5cea6515ababbac5f54e6f40b41a8ecb6a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55911de19476f18f8269118bd47182414
SHA11be2d61ef418094acf460bc3e216da6b1e0a0fc8
SHA2565499e7e02a3654d1c53ea2c529ed21024a5da8f1704837004d926445f29c969a
SHA512da79972fe936b7a1af95855a31ee04e351486ccb6a62b92e4863fc54ccfb2db29cae36f1cc91e26e002d91a215b1e502eefe5fa9917eb485a2b9e4237bada9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e778a22addaf92130cc431c88930b7d9
SHA12d780bc30e0dbe9e37f48e012fd346d2d4bcfdab
SHA2564cdf70d211c6b8451ce9d2b335f28f2ddbbeffb1596ca1feac22294788558b86
SHA5121331d34b4489aafa380ef4c8741e6a31d5d26fd2f42fbe108f544a5891467944af66663dbdc0391409373db25f4e6c88737317b4d789d12a3c6d87340cff22a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5560b08a3d4693f92193eec9490cb1115
SHA165a967d8638082f7f21d94c4adead40082e7f617
SHA256e3ffe1353b9edb5ac5aa0defdf5278f2ba43dcd5da9b982c8151f3c1e1d3c2c3
SHA5122f22f611878eac1ce74b7491e50188bd5ac3eda227b2e4e1490fbe79e47b0f5ee9d5a2d308a4d0bdefbb6cdc04ab2141b9e497242d5e4cd00995bdb71fe0969e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1d67ccc474b6016ecde287b957634fb
SHA1fa8b8004dafb364238d900523307f41da55fa249
SHA2563c61ec0e3b59bb30b15e877dc251c835ba73a5adc2a5e4886abf2823872b6533
SHA512d37bd7e8bf39e3f89462dd89d121fb78e603893578aa0376fbc3768c15feca2bef0dc3748a2031dc4bf3bea87137ba4d6231ba7f629b4fd98a20f6cc04485b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae48bd0ed64673df5456e8b2b727baa
SHA1028c22663cc51b8d0f4cc36dd00ea14d069576b1
SHA2561b418d54b2ebbab981c02e8fd0dcb5cd9ea4ac05687cf2c76f202017c226b72f
SHA512bed8a6a508dcea2128683d08bd5b91b007a8b49ce1caceaa410351bcb6d60167dc536d920cb4d6336a708b7f912b191e1b7dc03cd66e459450ace2494fe6db5b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4R90HQQX\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06