Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
769259f04a0c2816d5e4e36f11fd8924.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
769259f04a0c2816d5e4e36f11fd8924.html
Resource
win10v2004-20231215-en
General
-
Target
769259f04a0c2816d5e4e36f11fd8924.html
-
Size
9KB
-
MD5
769259f04a0c2816d5e4e36f11fd8924
-
SHA1
6ba1f343334c5fe5785d5518866cdf1c5d2a86ac
-
SHA256
246c5400b8d86566258c12ca164d4aea97e3c75758e08905047a2276eb15da8d
-
SHA512
516745dfbdb4a64ea3d992757e9e06f0f921d25ef3a5f18791145ae57577f66d68278b8d256d4667d502ff86e689987fa553ab11d12cbb62c321e113d6b9e7f0
-
SSDEEP
192:ln8uqnGDSSW0nqX+N/y9RSoXcUGxh1CdQXer7D2Gc8IiG7b6GExepfOECOn1UJMC:ln8uqnGDnW0qX+N/y9RSoXyxh1OQuHDp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d300000000002000000000010660000000100002000000074ae63ef79e8879f12f497313f1a4eb14cc624e240450b7a696e53a00b2213a2000000000e800000000200002000000032ee93f30076c64af1f4172316db6a7daf2cc9da2a94c39c37c5421083d401e320000000c2f827a0e52d3447d6ce03037ec8266e8ad76aa2ae601d9fdaac411c8c11133e4000000057da5eb4b6c49e3f0ea7e3cdaf5f16e4216968c828a9fb4b3bbf181ac27384425d13e7c62e203b4a403e2a0a8865213c7cd2be062d80370c0b9d5bbda33f55bd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410724052" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AF737A1-ACB9-11EE-914A-EED0D7A1BF98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c8c80fc640da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2656 2540 iexplore.exe 28 PID 2540 wrote to memory of 2656 2540 iexplore.exe 28 PID 2540 wrote to memory of 2656 2540 iexplore.exe 28 PID 2540 wrote to memory of 2656 2540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\769259f04a0c2816d5e4e36f11fd8924.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59171dddc68f8f9cc5b02d656c8b24120
SHA17c3e0253c1cccf0df415dd7e17670de4d6a3ad5d
SHA25699a077e543b279baa25f7ef66cc16a23622de967268658c52d79f0b584c1d037
SHA5129e614b22a3ceece2a37f1dd131f0399c812462c14379f33a9a66c3658021d5f98ef2f085c6e7bca7c0b4dbc77af77495c5f0181ed074f11ded6791c5f776a219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da00cec8be3e7f6c16fdc9c2227ace28
SHA1420f5fd3d964ab830707e4bb300fd3d8a4243956
SHA256d462ed618d96aae34845e800a1ae74caade54063c98158a597bbd4fc908b7d94
SHA512c89e96ed7b6bfe9dc42c7e8451062d7686322d29df5e0dab97e6c45793318caf018bb96e0c2eb19d4c09539cc167879163d932ba9b963f770055d0574153c889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9032c55e24b56cf0ec5154aec615d5
SHA1c7938056453aa9526115467ffd5580f4d4570b91
SHA25604b5d83899d3b5ea77452af378d6d7dbd2567784a34777c9c91b1cc0fb5df2f7
SHA5121b426b932c8e40076e1563f0612e5570c07db485c2484c4a3dd22a6b080522df31ebfb2bea71f6ce51c7682659eea853761dc27fc9bcddf44240d6145f9a7ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56477a2f050f889c74af5d20638bc959b
SHA1634937f1aeaf840f7521dfeaf2c4599762d4fe0a
SHA256d884a6c0a4bb03e7bd9bb095637a6ccc34d0e0525ce408b733692032210ea6c4
SHA5122dbcbf15754c9989887f57fd0dc1e6f1fe7fc83a0fcc15cc016d6bb384d4826097b5037a0690b4aeb92ccbe75694fa0f3bc82cfd5f6e4ff8327b6182a1e2e88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5318e55e7149c790a99155e636eb4c0c4
SHA12d6f56d9f2a69fb93cb9cc76e1221ca2a23dc6bc
SHA256c9586476f7e2f20242adf96252438d5de2f6bb1f1af0d117158279c77a0592c1
SHA51207c9c6d6740ac85881cd71a62cca204803a58e5e2904c923082670f2ec6340926b9feb00cdd0793379469ce8f078b7d22062845d765d8b9c87bdcb42308fba9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef6bff881402fde04242915db3e8cce
SHA123ac75a142a97ba97b7f6fc18bdc9fc0d2be8c7a
SHA2563578fd78b2c6644d92d8e192160089c4e3c662a012dd17d4773a2ccd139f1712
SHA5125fc36d1e7d702b01f7152515472e5cc48950d4048fc7b47d29c3e700d583a27ca69899b6197cca1667e7445e67b456c69b62db9ad324278e83aab156fda5591a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575cc0626213370fcf2b5e2ab835f2155
SHA15349f20fdcd694f7ca2b4e8ef8ad69c69745d978
SHA2561603c6754bf680786abee213dc15c58c4eb91b07dee157ef4fd34e29a46f1049
SHA512ba2aba053fcead0b142a21d6a349d1e8032685b4a8850b642eeb630e13ce024d8210fd53745536717aea34f7be5c33731993c507af5457fbfd430beebbf1df78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565035d022dec2f1419181ad4556baaeb
SHA180d36aa15ae18b41a95efc80424291c6784191c2
SHA2560d2fa160b524521a2176826676c65fe00441100199237266b06a68b3ec290f1e
SHA512890f81d10ee001b30daff430130492c062ea6ee91ef21213c26193d80cf52b525f748ebd7cb40248435e98e6a8ec3b1a1e0d2d261efcf75434e63a2706d86db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585dbe43bf84b3da511f641f89f1b562b
SHA1a9189aa5bce5ea8e643b86a30f4248edeb4dcfc4
SHA25634df23a93f72c9f6b604ad74d51059626fd136f345a3ef2921dde41f35df4355
SHA51200c81393461157b27ee3993737c24ceeec11a250fcc8ae6ebc58e75691f00945d6a392112350750d54018f2cded0b5c980693ac50aed0e6c9476f062804e0fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559481132b1b3a3ff16a9d7fd6234595c
SHA18ef63efa293dcfd55738bcc05c676be6aefdcbcf
SHA256fa330c076693b23c26efe2fa4df18e38f0cf7957ebf6da065c9391bb3a6a8ff2
SHA512b6fa83745d9cad59f2fab2f73c9b35027b59a9e70daccba4cf8daf7f275135107332704af592c5dd2b984a799a8f5a3d9505d68addaa3c2e6d0c1a6418ba39f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57380d07a9e4a5fcd2872b5491b391604
SHA14058779ab1b970502202e2a392b634724b8e81fb
SHA25630c4efa7f9d061a2e1a9bb008b743e71b2336f03ff3e9f73e112852ecfbe1a40
SHA512c83388171adf78d4c97a96f23c725fbc92e6aa7dba723807f4236827c2d528abd98fec2abe2583e9514b63879f491572b68151737767f2c33dd3e35c948938ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540a6aae1615e6a094304f8436be5c9f1
SHA1c68c2ccd97690d8e28a75706ebe5256a67da052f
SHA256e970ca455e6ab37ebbdac8a81aa356426625d853e8e0788be62eda80dc2e792d
SHA512dda59552deb91f952aeadc2ff1e2a647999e4748cc0d469da52437d4bf7a69680f5444d64f8b320a40e303a32fdc5cf7f2c271cf073ce26191084344afd3ee90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca9a115aa60c5c033650c20a70968f30
SHA14b4b1672a6dafc837d55f1e54164487d084ec52b
SHA256cd6d75112ae305adc7a79747eb222d4725c5839cd121276a61975aa10ae2c432
SHA512d3b081764677b120b6258c9d1de39ce64b3f6ae36c68de74a3e2cdac72ecca2d9debaf0370a5ef0f76d8856914ecfac2ff5a16913fa7184a865cf539a6ed4a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5358fbcf43d3538ab8e97c65512a25a38
SHA101000ee0a370475daa54a054af8d16bf9750f4f1
SHA256636810984cb52d8070c07a3d34bde9a70215bfd1339d58183b68a7dc4241665c
SHA51268ac73a079393f66cc44b5e379397b7774dad6e20f396c210bc84ab2c561dc9648ffe568a9102bd126e91840f72bfc03f6c2e7752b229f55d72eaaa154a9030a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2527ff201627ad9dfcc2eb4186783ba
SHA1cb738d8032c1b796784ee57095846eebee9dc699
SHA256dfaa9de62c06124efdb60e84ffec9d151f9f1effb49fe4ae790699db816c5667
SHA512f7f0f9d160bf5620f36777efc724d3e9689ebb6df520d90c08d4e536b8e8a208a4175fd3b4a7637581d28a37dcb85b718d6abef6f854f9a7d6c6011113639d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c23f7d33241def1ef20d41a1fc1d42d0
SHA1ffc4473cabfafc19c67d3aab570624551205cac2
SHA2566958e3535d08225e0817e69b7fbae320a1bf72fe61d64fd784ae2b991f358e7f
SHA512e8a0008a42eeda8b11369fe160026f2309b06ac1f9f409290044463ea51afcd7f89de084829c82f23a0fac736030fa5e8c9be1680627812db5d879167f45423f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3badd281e891d7cc6855a98152d02bc
SHA15f129dd9c003550b46bd0b6a1d88a90a8aa4cf77
SHA256f7f07cda8c3c8713cab0e22ce0b7ec9aa09957fdd5b2325d72f9b07d843dfff3
SHA512f19111ed33e9ee6f5e67cd3133c07a9e78656507ebf8abae2a02f28a9ee8f4c9555c47bdb47f353ba33b2c0e3e408134cdef9c0ff1230620b103130f233ef085
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06