Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
4632f300070cca7bad116e9ee2f13f54.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4632f300070cca7bad116e9ee2f13f54.html
Resource
win10v2004-20231215-en
General
-
Target
4632f300070cca7bad116e9ee2f13f54.html
-
Size
53KB
-
MD5
4632f300070cca7bad116e9ee2f13f54
-
SHA1
af3ee3237a76d861512e78eaefb4a9eeda2e56f0
-
SHA256
e042cba3c6dd308a12b74a6c06ee7579c48722acc2f4210d0162eff168720c0c
-
SHA512
db65ef35c99507be7e71ba8f0fb33dff7dafc265a9690bb00f5d32f721e9f600bef8c449c77da96e514d8216b502f438943d89d647b362b0ff9dc7cd0e730e7c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUK5runlYb63Nj+q5VyvR0w2AzTICbb0o4/t9M/dNwIUTDm1:CkgUiIakTqGivi+PyUYrunlYb63Nj+q0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410339237" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000c9ff867969915e092a9c3c8b6b5cb5f93bed2d01ff7c9e3fcb485ee971af843b000000000e80000000020000200000007e6993837fc7a527b70e3587fc117c6e75eac088775a393f089619caf742bf7f200000003905d597f5eb09e55a38bd2b28ed4832ffd36c7a78f5f737bb6d639a1711a7b240000000ad164c1ff5ac0137b00dcd20eee7b7dc2ebfb0de3e950d209980aadda66f8db0d976489e470c635232edd11b00e6f110b819698dcbe90ebcc9ecc4ba22dd0937 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203ee327463dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36309E51-A939-11EE-8D93-6A53A263E8F2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2980 2380 iexplore.exe 16 PID 2380 wrote to memory of 2980 2380 iexplore.exe 16 PID 2380 wrote to memory of 2980 2380 iexplore.exe 16 PID 2380 wrote to memory of 2980 2380 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4632f300070cca7bad116e9ee2f13f54.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52560ce28e471ae35c708ed0ecc98e368
SHA112369b6a49a9b6dc938a33382644d2aa71e23d6b
SHA2564ae5722802762a85b43f5c2ae333b8c5b1b0fc4b6a494ec8c02996a713f33249
SHA512eb4563f80ddb902db785649086f0556c337fd3a9d1cc40daffc6a617c772d7cdc4c28334f1eb09a202d559c90a2542715db14a1e54f3340ce7b4de7b3d323509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5036ab59ef87847e750a791aace047a2f
SHA1b432aad2c2f25621e7ad366611d058f9f5a206fa
SHA2564fcd42bc89273b0ca3356aaa0905ea70fea9d224a4035e288ad70ac288dff7b7
SHA51296ba0cebb85fdc9b2ca4aed9dd99ac999e066e7b9622c635088b005a9ff43613e63fea599fee4e29d2cee9b51a13ba416350beeb7501242e8053425827ea0633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e8c69fb2a0737fd34f1b08c0b0e0804
SHA131b2317c5d6899cea1113fb48bb16124105847ce
SHA25677df529a5ff27b97488f4342971034840b25dfd7a494c27705ea609ae930eab5
SHA5127afd078470df668ce62c0bdd082281b19645138b9b45e3c815b23112c11949ae47092ec4e7b508d14c245d52cd1402f4b9335880abf10ac3bb2cd56129c420b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57861c1c239145750433f9e441890c949
SHA19f88ee4d4efad7f34ee015ceb630d89c32942d88
SHA25670283d6506449e82891aa7690ca3a4026b65df16d0f30e40d66df09317c34803
SHA512c428e220c20e7c26ae5b9e9e7dc67da75df912c6d40d8b39a5053a1a2919d5292cc5fb4523b217df9a839512b29c16d85285925c577657d111872281e8412fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59403e2bc38c486e7380e15c0a9b968e6
SHA19faa99df5d3a455211287543b7b27f775351f4e7
SHA256e52eb410da1d85407144a61ea0806aedfc2ccff0ddedf2127f74de96b5fd3e04
SHA5123971f63ff9f1f37d77e4056798bdb20ad74c8805d008b43c4eff4510da1fdddc984485098d5079697a55c75ff092b8e7aa40c43dad2b03c62453710342560bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff76f4778b7f8c6e34b2bcd34de2fc27
SHA108881c62c41127840b552fa0d4ac10ae42fea765
SHA256addbf78df67b75d0ad04df03279c562ac3f1be04fbb18afc0769320c4e04f98f
SHA512f5da5d1ad79518449b999a625d6280eefc69b2a3cb7751835be396d452a0b6e60996d3b182ead2dae6aaf529d8d4a86ca7d35f06cf88bfbbb7372f7504887c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518bfd965005badf03c712e12d61fd3df
SHA17cf0cbd2f0ee269b5ad649c58d16e3eca363f89b
SHA25623969bba71507bfdb928fa734202d60395c89e4a0211683446626114d20867ee
SHA5127520dcbaf587e7f54d663755c04cea6e854a2499d3b18b4879b9c506f52c701c0b0e50ac9de0027ae5487c8674e1e7a0a3bf32b1e56ddbb681801626d8893961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb01ea47248020b7f61861692e38df2
SHA1f72cefe87a5cdcee2fd76cddd5b0090f7f502697
SHA25649bf915cba0b0de9ff03a80837f066ab30651a08854f17ba63035c066d1ed84b
SHA51291d61f2273068258282294c771822be3467d39e01b078cbeb7adf6e0c729c6938d451743b89b44b83afd90030a721247f9d813ffcda31d234f5265a8524c01aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5438f88bc9ee9bb592bbf49a9dab729f0
SHA1b18cc2a0d5da08e5e1b54993af6f55ceaa832b42
SHA256d29bf374f6e3764f843c5a657bfb48321d94a2f809a5f02b9343cfb26d92812a
SHA51262076a6a67a3b8500f35eab1749cd0fd0725312e9f5c596172dcb738b76039044ecbf2784bcdbbe04cfb866dab3541ea9ddebf239ca09936cef4afe2ee4f4a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505f42aaeea556f09e9817d9025d57c74
SHA174a29a08b4604df8c640d02d3ddc8282890b7036
SHA25626c1ff4fff674baacd442bbaf8eae3ba06a4158c94674c3ad44ef05e417f3c64
SHA512fc8900d9e9257136484f4d6b2a6fd9cd05279b17fe89602641bb35a636a69b82056dba8cdcd40f353c266f49abaf48f246943d248ed4dd2c6009bc92bef6d068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542029a5d459f756f8ac4e635b3133943
SHA1b0e9e1afee296e16187d1f65e0930ef00e9bf2b0
SHA2561e77f5c14450f7b751cea4ae0c20b05e42ca19053232f7b5a28e47f018401ce5
SHA512b594c93768120e423add872f5611f31e037ffdf2425b4a876803fb90972cf4884fb4995d13524a15551e2c15db3f913595a8440113581de285ddacda57c1a356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594973c6d8620eff4b5c7a5402681b2e6
SHA1eb96dc7ba40ea9483befbe7f55069dcd0f7ea2ae
SHA2560708bf5ad0d23db5bd763d4c177393f21c400f4bbe5c30568cb8564d8e7a736e
SHA5121e98747b34c7503126f72f5ce5c676eff5d950fff26078ab7dc9949d6d5efa24499cba101aaee277e8d48a1230de8a40ece87f1e5a9f02a38036c7cee73a8324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94282f1721631dad8039e0da5d39485
SHA1f3ff4a0023b009b96fb143757b60a3cbb0e3b251
SHA256d3bbc9516c9c3aa7bf6a4cceeec8f6747b7d1a9489292c9ca065f57005af73c5
SHA5125d89023c2a6c62aeb6ed9b362dd461e6605f015e15327f0e20e95abfee5313d1f4a5d8cd825d24bf107c86f0221fe356646660472467310c5e4044a1057e3426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2eb198dabf9b62742c0a99c0760e961
SHA1d90c2b3ee25e30ca69bd4de84ae1b788781bdabe
SHA256698196771ab347ac3fc967d5d2470671d6089c8f4ab6366c362576f4beb17742
SHA5129a54331be8833a15e659f3a3d808124d922636631458db9280d643b1f602154d8ba8ebdd2474de2d0abc5d183c589608e9079651e0b0162ae57bbdc5c0b6a223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e2a72f4ef6c459a99e26575e2ba42c
SHA159487372c1506dfc66c6ba441db492ae60e227b8
SHA25682f84311bf8618b69fdfd70cc49a87587aa513020b5f81abc8678d5164ab08a4
SHA512edda99e29e5ee1e731537ce130a81e4dd7512aa26e8af07984365b49faa9ae9f039bf157f6c14d84dc0e85a3af9f5ca25afc76b473c67daff937d7f3b2821932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940a115eee2deb49832b93c26a64e613
SHA11955c1eafa964dfbf16199708430f9a44f0340e0
SHA256c52337603fc0c370b0eb43cbf77974509206ac07509456de50da2520238fc7a1
SHA512079d2be031df10ffed0496985d8865a15864830b3c3610ad254bc132cd117821b135ff0e6f4bfa89730a4f63c89f3a9d4a56f8639532c27b32469dcb03a3d687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de6ad3b3c868682b95f9a338441358af
SHA1a1527f548521e7b9d391cd57ef7c374a04dbfff9
SHA256bbbe58801078b16aefc892c365bc51fc100bdc032adafe186620fc219f2a0a34
SHA512d3bac19f9469b8147478a69d208c120da470f15cf185fabec998a4890a6167b26a00e805789790b89cc210732af59e3a856e16b849171dc9e35c5b8dbbfcf8d8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06