Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
607388c7fe088c19552bfd3194de90e0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
607388c7fe088c19552bfd3194de90e0.html
Resource
win10v2004-20231215-en
General
-
Target
607388c7fe088c19552bfd3194de90e0.html
-
Size
12KB
-
MD5
607388c7fe088c19552bfd3194de90e0
-
SHA1
4f4679d317dc10e6ff9c7456b2832a796e8befd8
-
SHA256
600d1681b0d8fc9e8e258d2df495f02c967b750678364bc8b40e2c25a052af20
-
SHA512
a66031cb8f6d543cb652fd9cd3b9107ca3819d0f839e864fcc98785d76e1b84c81139cb1698b96c53a2a932a45a9a942a1fd3600c9a23907c0c2d47121c66637
-
SSDEEP
384:EQIVIqPrgld6rTyv6Rb+nQKrlibQmYMH/pMF1E:5WlDggyvCAdhi8yfpe1E
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000a4a93091c4252d17a6d452ae07087abeedbb8759a956248c6e59133efa39fd51000000000e8000000002000020000000352677cee7e6d3ec9276f1ad7ee10aec87b01b1ceeb9954106ebc898e8c187c220000000e11d2589e09510104fec4c4a078403805343804f77b99b32f89f12a3231bdfb5400000004a9c3086180ae7ed7a20734966ddab403d4842d508daa4326371e80a3813ee136565b20c131b6ab8b3ec350bf4a65a23cb841e228f654dcc476934436a4859d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410685380" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04e7af66b40da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{205D2571-AC5F-11EE-A371-5E688C03EF37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\607388c7fe088c19552bfd3194de90e0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565e0d2673fefc68b4d4a7fa8fc2d73eb
SHA10f999dd97798d8a0ff331491fe9c3b0ce98edad7
SHA256865232e79316d0d2e934c041ff004f64d69245296727e48c2c0551dcb5e86268
SHA51202e3db3fe0aec799447d93f2cd4e60f4bb9c5a6b7211211c8f599e0eda21d8008b3a40c8f3ddc5bf944c7916cf2b3bc98aee449cf8311f16138ca12a32c20b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cf56a526fdd37ddf1b60a35d542a74b
SHA10738b896783fc1d670dca5951805d02065486245
SHA256051136e8e0ecd138d816121cdd6bb08c2dd201120b42cae79674d06367f478aa
SHA512fd5b7162fe00083800aacc512ee201d3329633e253cf9b61439efb74c37a8813934337e7b9a0e2d8741f210e3f1edfe2192241e91e2279f280140d7a65314da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584373ef765950dc58b0862040dc7f057
SHA14056fbad7c13faaa9adea86705feca27a45367a7
SHA256ff95743f5e9c0f021483b40fe6a8ba645547ea0b670620294e616434302e50f1
SHA51291b98d2c3f6f3f36289deadb024bf7a7e0b1e3f2d2a47b484ff6fe4219e1e51c7b0726c549ec2c6d251266594d914e0cfbe4e92afd392709f23328efb89db065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50185b2cc6f1e5b21e72749464b01c03a
SHA119755f756afa82f2a11acfe5d2c104a6edbbdfc1
SHA256be174db170a5a63f911e6792c6338851aec6550dc1014cc1b6b23315081da79e
SHA512078be10f80d1ae78b2147e15cdbaa40d70eea9c7997641efa8d0e6ef492f051e1b90fc6c60ea02c39657bf0bfe9d4199c3152b93cd49d51d51f48083f786f597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b7efc54c746ff0703e575c96e6a0363
SHA1891f8a20f5c21518cff584ee808ae1ac64429eab
SHA25634d3b7a7c62c382d8dcf8dcaa2a0832f66f5a425588f67ea71474a3d699707a8
SHA5121e00decfdfcfc0092642b3f42a4014c84dc0d9d5c56447aa8a3e50faeaf34688d2911a5817679c7710dabd6c970801643ab4f62a8164a7b013d65a068ae06e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9eed321287079f344237cbc853e23ac
SHA1a8c63f12115ac2c062a1d2c730c7c7bdba1d9cde
SHA2566d98eb645615c0f0e1e090facd54e7ea7edf2c5652c4388e3b8a1aba6020f123
SHA512b9ee49cabb9e47ac9aea807ddc9cd43dbe6ca5f3dbfb981d185612fd97b4a44a1128152f4406cf5b7e0cc0e8cc0380ead1acab987528bcb9566a89d57865a933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57328d15120d4b12c1d743ef186c7376f
SHA15e38a00b2c983c50c3fc6ad98dc477f25c7b1315
SHA256ec5b73f78fab51034a136d231ded7361a954e540f0ae0dd46e2ccf803a9acf4f
SHA51280c0ea31b802ac982b3fbe20dede63d220c46bf95f887c69f83e55b0c4caf2635fa705ff824c239bfbc5bbf70c50e881ea922896b3110984a2302eaf4c1994ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4014a3cb4090d0c09285e09b345ddb1
SHA1a2b7393717a5be05266f59003ba7576d5e781066
SHA2561be6861bba9d85cd1589278c90a030f382019ca9cdbb90482bc535858136ed11
SHA512d3e04225a6cdedd2aad24adddf67a98052378788cde6bdb23d489f44b5a8714fa912147ec43782a04553b41dcec19e2503068b603857984ec3f2a984398cfa1d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06