Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
46b5b6603e6c2f582cf5ba438e89d571.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
46b5b6603e6c2f582cf5ba438e89d571.html
Resource
win10v2004-20231215-en
General
-
Target
46b5b6603e6c2f582cf5ba438e89d571.html
-
Size
2KB
-
MD5
46b5b6603e6c2f582cf5ba438e89d571
-
SHA1
e24795991982d9ee6d30de10dd78899aa2be27bd
-
SHA256
050a86c4e3fc628d6d8d6abe81e511e2a38002c3b9aca84b346148b7af6b5b97
-
SHA512
277f351e1937bcedaaefa03e67ecef87d942e4ad88f11f14b3afd6ef071c5c84d91b1c9541ec64cd5f51c939a9de2551ce32d81a8ab4e452e6885c0aa11db366
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500d2cd56438da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409802708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDDCAD41-A457-11EE-B309-FE29290FA5F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000008cc5d2f54e4e48fc9b97ce1fccd695ba4b5a977ab64cdc398fa28a44ec795f68000000000e8000000002000020000000b64d3ab4b46c3876b52fe9c5f923fabfc49763f5549230d01635a88f68db54b120000000e9fb36d208ccdb9ab05bf7682cf32d81875028e69ec4e7886364fc8186d4922940000000aa802aa45e1d19d69c951c49335c15446c867806380b27245c7f03716305817b9fba4ffb722706ad215e6ef322b743004053f2e5fa1b92449d9bf0a2455690c9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3044 1720 iexplore.exe 28 PID 1720 wrote to memory of 3044 1720 iexplore.exe 28 PID 1720 wrote to memory of 3044 1720 iexplore.exe 28 PID 1720 wrote to memory of 3044 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46b5b6603e6c2f582cf5ba438e89d571.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52b12b13e4115a709bd5d36051c60cda4
SHA186906e4055cdadb935d84a2a28168c33635563bf
SHA256b0dc11cb81415895d583d93ed1a1afdddf2cd2512c56cd0227df5c3fa2277572
SHA512060ab30fd06e6b5ee70deee72f099e4d0f185f7f774f01f17b12db98f29d3f32fa417026adcccf5932cd0b5237a403dc2bbb74288e519a9d688c097bb11c444e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504997a81eee01de0e68c36dc632f5e3f
SHA10044cf6179114eb400eec1235b396c06ab968412
SHA256fabd8d1dddef976011f6d3395b7675a8bf84cb0a5c9da9d09f71ef6812b31d2e
SHA51200024d3d33b23cedd7b7ded39ce0df223ee4486a206be243cb49ee6c94c9ac426ea7f50ff557fecd003b2f5cc2d12f97e6f712f0151c012e4e78cbc1e33204e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e97f118a73e4c666d9db1277010a1a88
SHA121bd190e418be810d4b6ac2a4dac6a7da4738d4f
SHA25616359a2a0466ec528b8fc1995bda402f12550eb46ac1c13fa991ab6734c6f858
SHA5123e5eed02af09b1b6d63da6c2a3cc6fa21903516078477682c4ab5f4a35c25d695259f7ab62ae05472cdc8c37578e5e6c395b7edb8f93b648efd407222f9a3c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1d5bc488ee8f3d4f30aa91f2321103b
SHA1ee68162a5363f061f8c33b874e57bf6943e4d5e1
SHA25695f3b03c7aa37d871a590ddddeb0bdff39081f413f9eba83dc90ffb9b6a48d12
SHA5122d3b30c620fcbb124a4eeae53b05e0ba03d99f89cbd3cb4e68608050bcef2aa197202c5ca1620b297c589a00011e1dad7cc4964a631062b0feff3ab9a23ae63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53182677af621b707098aabe0a18009ed
SHA1eaff015fe74cf97ac0b996f668c80f24310e6d63
SHA256e5339c375ccb2ccb846c09355c4944cc3d97b9fd439800605ab726c1ee28e077
SHA512693e024c745cd6cf645c83c90e00f7a9dbb8baa1cc926bb301f8a5992ae9c263404d0063b907686282d113f7a01fed6eaeb71743644e0f56e444f4d456c3a8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5926ef163f08323166ef905597b11fd5e
SHA13035830fa87ca69a3da4a8e1d1852b911296c7e7
SHA256a8e19365319ede50ce81a7e9f95ef0f8514e73134f9dc344f9dacf24281e62cf
SHA512316b2b334aff3a9f1e35b755d553e51da4e0c24883b4947a725cd4f4657fe72f79436b8a5ec4aec53647caf66fa01e09925b0062ae5d570b21fd1abb0511c8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547d56547a9b7f0e037b7d08d3b69c783
SHA1d0eb4e2390ed4d509d4f2581d62bb9c5fc881023
SHA256cda65ad7ab363310407f89e120dc25f78228cef10325a738a2e53e5998eafaf3
SHA51232c4148c8bb3a05bd58a12e1ccd24a9f852bc0a1f1acf44d40e6ff5ba6fa0db19ba9ba7a2b3dd5ca3b81df69d346397284c05e6064709c1229103574d766de8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD502a36ded123e8b876b47671e56115330
SHA186a1378403eedd1fd8e47462d9657d8bd561614f
SHA2561c595ef20126cda84833926bc2930c700019c0b3b65b9a9c8a7cd44413d7a5b7
SHA51279cdab24698842d0a1658a557dfb6043adf08a1ee6c21c14c5c354bb3533480ebb411819597afd22f8e9c13b71122e935670eaae4a1f9c0edbaff809f497481b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06