Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
50a1e8eee286069421d5d2beb2231b2a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50a1e8eee286069421d5d2beb2231b2a.html
Resource
win10v2004-20231215-en
General
-
Target
50a1e8eee286069421d5d2beb2231b2a.html
-
Size
19KB
-
MD5
50a1e8eee286069421d5d2beb2231b2a
-
SHA1
555b44c9c92f4709fd4ecb7abb2f35852af3c437
-
SHA256
e1276b17ec7d1fd3eba508715fd41578d0d22685ff10595782000b77958b9beb
-
SHA512
a8ade7120982753b5782e49226fb3a6d88b2681bbf1301b44554070d1659e0e90efdf467f7b737faa3ecdd77aa4f6794486d078304b1ee2e5a216d3117cd8ea9
-
SSDEEP
384:4+QfPFd9QZBC7mOdMAqtKfpC5IgSnbmFe7Ackh63oLDPd:Zcd9QZBC7mOdMA/pC5I9nC4IPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{952BCAC1-A9A1-11EE-B3A3-EEC5CD00071E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000059e14741af102b181b5a412f5f8e3ab4973180a56c5c6e90850ef17d590269ca000000000e80000000020000200000003fd16c47efc5e46a2825b7fec7182b401e62549a640cae6cf271911444344aff20000000e144948a8685cb668155c400b1a45169a5b2179d6426682f70f7fc04330e622c400000004ddb595ae3507a5264f126c2c4e280ae737032ad892879adc5904aabc506b9b1e9334a2dae7453219e34225b781870824cd49109ca6dd2531214a882a0819008 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4061cc6fae3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410384072" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1064 iexplore.exe 1064 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2788 1064 iexplore.exe 28 PID 1064 wrote to memory of 2788 1064 iexplore.exe 28 PID 1064 wrote to memory of 2788 1064 iexplore.exe 28 PID 1064 wrote to memory of 2788 1064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\50a1e8eee286069421d5d2beb2231b2a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50509a0675c07211e815650bdab9389ea
SHA1d2d971696bea7ea372593c1511ecec8c7c91f063
SHA2563a81811b571fe0979e392ec866b67698d779efc47f0e2182d36323299c7305f5
SHA5120ff6a2b2c312ec3481618c0b8d62a57521b66edd93e91fc12a0433de3306a83042aaa1c6283a2b982006a4f642a59e97acd3288c8165e1241306c97044369f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5681a6934c3c2b6ef9fd8619d3958a632
SHA1eccc685bf9850ff238f84a6ab909b25320beaddc
SHA2562e072acb4334413092bfff51b4faf75e53bfe69e747014b0453667e2821626e5
SHA512d6f093155df9e4b219054de940aa030c9c699f6712c56f4f11a54c3bc491b7852703de9baf5feeb07141528516a02e479ed796e148e03063442625509eb388b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f12dbfc7bc22d1ee75ad01f874c46937
SHA15050bd99ea64393a1d605536bc10d19de0cf81de
SHA2568270e7cd58ef64ccfcd14c590225fd2bf83c964c3c7fcd499c59826c2ebffdc7
SHA51283c739135148be69e5645e86f6f868544d7b82ec8386d49a7b9c0fb588ffe246ca913926f7da02d3848ac1e6ce8d0099a0ad133e1559c379e042668ca50a6650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d78d2dfe3c30e72e087949881c2c1b3
SHA12c96e3d364487ffcaa33c4abc43ac10c534334bd
SHA256e74ef46500ef6d8bd50f66a2dc359045b79ba58d4c3bd2b0e5294bf062654147
SHA512819d774d31f35405fa79b52f435f241530ef9ea838065c3808c929567fe43ae2114c7775eea69aa7a10764bf33286e4612298448dab2d6def6408c8c5647346e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561247e2be6f6089534291334caf144f1
SHA1cb345e70d5a237e806b4cf3fd50d4829416c6aed
SHA25657ffd070541c3b9de0ce5f300c401e76d964e937fa68beff34933b8cb8a40a24
SHA512cee3a109b9362df6723ba9352c0d750dc049b6ed3349003dc0c3b672988267e6f697944b23597e83bd912a2beac861cc544028927c4e280a2026df8e67539ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5141a907d3d7813770cb6867d9f716900
SHA1d13e60cc4fa444e8903c070c397fc20c215f9e41
SHA25692b48edb18e75b78b171d7f36725b0ed6e0b5a6231d6873dd18849ad9e701f82
SHA5128690c0137121ee7b34940fbb5f97e3c92f003e5dd144c66e09e604da0e7c41131abaaf9c64c89b5cda1bce8cfef8fc17ef9985a86d3507acabee103caac0d81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54755131545ad11e810b5ac28d9fb3cc6
SHA1c697fe99b4abbc0cfe1e0aee8a7eb457aed1aa21
SHA25666a38ad63c6b4d29208d7cbf77f96421b5f5f23173557f8322b2ca91acb920fc
SHA51210ff4d8087d446666477c966fa830ab3f8fbfd64bbd5acc148cac4162d1a9f0ad5b37f66f101202dac12484c57fb74741572b01752be1112f79a3b16d426f8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546540f4e70faa4cb3cf76422e9f67833
SHA193db945cab1004b42f8ca31dec45a4baf9e284b1
SHA25620776168154b82539929013cdf16660e3e3fc0918aaf05a52fc0676a06bdcfdd
SHA5126118f4e79db868a7bb4d85157435343ef7335454d033d3b5c97430ca162c8a9f58c6b144f4e56c4a8ade7efea55e2dd307040f52dbce2ec70ec0cd1135088293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9f2295e68d1955a735df0065532af3f
SHA186f691503ac25babd21ffb48e1391537192c211d
SHA2561b25ae53243aeac1013ba70ceab24756fcfcf896426024db2fb6fb2fda5e03c1
SHA5129c53a3cf6cb571181ff7a4ac2a3e8ff3ab2fcd991634182e564cdbd6ab2351d7c8ed68756e4aecdca896dded60876a49988cf212ba6def614845eb247ba3b584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548e6cb0ba078ed38e3e4c4c6332e4378
SHA17fb95d86c15665063a32f944b5cf3a86ded43e5e
SHA256a96dadf28d65a80299d2c9fd6da799a848ecd365c6fb0e405eeeb9138689e4a2
SHA512f931ba3d442be10dea95617db57a07dbc8e7d68546a57a5c528df1d2f67974631b17e4f1f0cd266ba3cc6f33d1479bda3e7d9965bf745dd249e5cddbbcac46e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f7ce200647cdefe9f0409b50d6f9fc8
SHA1fe0a44570201c2bd87b861f7e623fdf67da30f50
SHA256ce8d0c9e953ac56f32b752c70d6ace7a8afa57ab281e7bedebe617361e20cdb4
SHA5126b02d22495b904e0e9f4ec9381920f270ba3bda52c844eb18a7c9917ccea10671486846f35b8e083845bfd1d65492055acbba59ef1d9b61a1e3a2d31ebc3e4bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06