Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
618bb45beaac751f1c9099c7bbf797ad.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
618bb45beaac751f1c9099c7bbf797ad.html
Resource
win10v2004-20231215-en
General
-
Target
618bb45beaac751f1c9099c7bbf797ad.html
-
Size
53KB
-
MD5
618bb45beaac751f1c9099c7bbf797ad
-
SHA1
227000af4008740d4eec84fbfa32c7e582eaad24
-
SHA256
dce71e65afe04ed9ff592c10848d94b74674f413d922a1ccb90037534ff1d3fe
-
SHA512
8cacc9d3a3acae125315ff9c4addaad5a7988edd6f71d1da5aca012317e6be4c9ea3aa70e9d6ed819608274b82836cf141d2f14b9ac4c883ca984a3499b28124
-
SSDEEP
1536:CkgUiIakTqGivi+PyUWrunlYb63Nj+q5VyvR0w2AzTICbbdo4/t9M/dNwIUEDmDf:CkgUiIakTqGivi+PyUWrunlYb63Nj+qO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E338B681-A4C7-11EE-9DE3-E6B549E8BD88} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 1936 2732 iexplore.exe 16 PID 2732 wrote to memory of 1936 2732 iexplore.exe 16 PID 2732 wrote to memory of 1936 2732 iexplore.exe 16 PID 2732 wrote to memory of 1936 2732 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\618bb45beaac751f1c9099c7bbf797ad.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5340976f29caebc73ef134a5c1fc7bd7d
SHA155744dad20e819e0cca2981ea255a722eb940207
SHA25668f5d86ca07e13a1f263b5cc87ebea61f93e46c253bb82bee72c04389b7c5ec7
SHA512535d453e73dec9de265cd4a17e1a9d18c6011a61d82d90fd96b3f45992a7cd116c0a1d4af209dbe3f2b48b5146c60ec618dcd3aaf5cef62088a874be1837c614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590e5d20164d4fb2073663ceff545d4a5
SHA18fbe36e5cd990cc5e213f7479135984e103102b6
SHA2560952f825fe1121cdd132cb708da3f2bf4ef2e390df289f67a239f2978923bcd2
SHA5127c5c2650c135be3114d2986f1ce7db2d399425ab12075e8a538b1db53de1c2ac17948a72b5ffca495b2b6dcb444499626f2c3bb1ef304df461073d5bfab7e305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3acdaa6847c1541851194ffa2546dc1
SHA1e358052b373aa51c0e189975983a704645ec4d0d
SHA256726f193f72f5a7b032ddd380179d3327108083ddb7d434e70082dbcb931bef0d
SHA512b77e88a2fab77e98a57a88d09f4c1b2d9bd1cea2dc49c83177b0076d5298c06652c8815cc00e754bb0852c48ef69738e794426f991ff3f91572b222f8e0d94d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c963eaadf5c60f75c7cb309e6a23b4a4
SHA13d4242890cb9b93c4905536326a53cfa6eb68f0f
SHA256f19385240408d8069b47280f6e6b83d14d22f180f401e5b0d46b3455c89d1cae
SHA51200d795bcc43e92a237bbe0ec77242af37df395046a505bcd3e6ad9a2058bbf70b7fc35aeeaae8d29fc870ec62ee67e8317b6b24356f7f1032b925c5657d7227b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63c8d37b88ecb5f9581e208482e0648
SHA1b76824aa0f8fb7e0d9d0f4fdcc0bb0a5aba08284
SHA2563dd56eee6fb3d6a4f98de4feb34aaefe5d73e9e417dad8a643f82495af086cfe
SHA512c738464adcf66f4abfdbee47ec6977605c3f3b15fc6cd4b97a55d0ceef0db88d2a9d21fe904eb9d42572f257948668453f1347a1a7df5358ac3ee1f409db539c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3ee4296ac9bbfc8940ec82cd6a255c6
SHA1dd59157483d292759c9a46d3124349d274a67f80
SHA256c6bd5ce8c67f6a566522ff3a4cacb2b9ef684e96696d25766390e8db053d19b9
SHA51236142351334de6d8924594e293987a75ad50ba2648538cf338176e4016f05a3dc7b52a47ba0b8fe5be129ddaeacb993835ee0bd5ef7ea44c9e3f3f352dd02987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599c45278da574ba6a6e3dcb1f4821973
SHA1b2d6b6c142a0b31c7fdee663705b6a6d659ea5fe
SHA2568741788458741702022bfd9b3024c1a0cb5d9e2fb6808f93c1b7662348d5bc97
SHA5129db528054344d1834d46a113aa80ba3d667a8695f15fb547e19b782651a70e2d4042acd797d8881f8287d902a57ff8208e1c82ec179fe15be9aa3bc6482bb74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52516b4da8dd2d317288614a84d744e4b
SHA1f09476a2ac07bdb34f7a35808696cf395f992f67
SHA2568246fafda50db7ff82e494fa6a669dd839524416dcf714468003d5ecfa175c57
SHA512cd31906d0229d0f4fd7267f05071a76c1500a02b048eac13aad301930fa0107781e54365ea1d7ae5043482a346797f93a4e00b83ce3bcaf9214d51f008f43e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5847e16953bdd2a468816294ede474e01
SHA166a977b57b3977d966db362c693ce0348556672a
SHA256a7325eef36e200a0e83b1e984b56568ac0abfe8a848e0ad2459ef4eca2e3ad25
SHA512db1d611fbb0df14bc690462744598ed4ab458af291c219aee9c3e16862f28d67519089cd2a1600c85816f2431cb89e24da603895899f6e77ef06df09f1050cf1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8MVV2BHC\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06