Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
7623e909cc2c615db017c4b33f761f9d.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7623e909cc2c615db017c4b33f761f9d.html
Resource
win10v2004-20231215-en
General
-
Target
7623e909cc2c615db017c4b33f761f9d.html
-
Size
19KB
-
MD5
7623e909cc2c615db017c4b33f761f9d
-
SHA1
1bc8a69953c0083244461fdfc2ef0524d87890f8
-
SHA256
e40369e0dd8be32b7d56de6c0bb03d94f9aad2c2d6fe0bb49458bff37a42899f
-
SHA512
84b7d86a9f5f27824dae1731c0df7ed47460a9e6a14443dd8e999c5fa0c7c5067dd7ff9e81a13e26ff238fe8f8ffaa6820668d79ce2325b90dab0315eef675cb
-
SSDEEP
384:4+QfPFd9QZBC7mOdM0EPKfpC5IgSnbmFe7Acnry6CTGxt:Zcd9QZBC7mOdM05pC5I9nC4TX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B22FDD51-ACB7-11EE-A140-5ABF6C2465D5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410723427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000e5897b7508a19850a3c82a4d00afed8d2b209fb97e98ef9112df947c9ac35a0b000000000e80000000020000200000008f5f9c01a1a1ed4d92fbacf8e130a7c1622838cc4381c2b0ad9ba7454dbe85f190000000fd9688396a3aa62d155a18daa8524f7c3d636c67761aa85c486203d5a65b2a2b0224892db58bb89ad07d10832124e2f2ae4546510e990de8ffacf91527e4f1f67fddd4243a4d10ec9002e9b8d032db8ffc7e55799454122f6a44b76d3c4fa1c8d0f3c622f4e3311ceac4e3cfbae124d063f82e76510c16e6edae1f730f2b92cf5b36ef03a78ff709d9555f16ee864fc940000000fa8f31ab2bf7dc887677114a0a92d5a9c3ba3fd00c3d44f294d2c2fdc827290e96022237d3e7e028c337d3bd3c15e5470e4358883314daf74d5473d244d9d36c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000295ffe883ee2655d9debf4c56307ef6feefc4cc0ee1ff2d6d16376b1b7cac19f000000000e80000000020000200000002a3068427dc7478b45cf772dd3eae0b914f2bb125f71445305149300f886bc24200000003e37a98a9375de8875fc896957139f2a9795c3d236cf9f71f7863fd1d77af46040000000207d6f780c44c2f9acbcd816201104a39a7057dc9daf0189580ff58c2fd6a23fd6f5948157def3f6c4ea6c37ea18c4f70f870dfeaf4983a5614717b1df4b4bf1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60976a8ac440da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2660 1712 iexplore.exe 17 PID 1712 wrote to memory of 2660 1712 iexplore.exe 17 PID 1712 wrote to memory of 2660 1712 iexplore.exe 17 PID 1712 wrote to memory of 2660 1712 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7623e909cc2c615db017c4b33f761f9d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b1901895c3ae0d3c8f200fa1aec77bb9
SHA11c42d2fa222d6aac623c1d9c6066ab0734c17d37
SHA256b6de2fc312ea97bc9f8273901d526af74558610e82e763ac15f76460b238f757
SHA512cd904dc3795adcd165925b2819eeb46d251615de900831a9e2ab8ba3c43b629ba5145f3b7403e2378ee70ab422b3bb928f32fc63a92229c957ca36438e2c1577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f2922672a756b743de58e176cdda05
SHA13cc7cf8d7c8bcc337c8263a4b574c9e714042373
SHA256d154ab217bd74c057d2332c5ca365e048eb59de8464f667c68affb1e6437b63d
SHA512cd56c579419dc0264a856aeab3011b5544942a7eaad07618b94690e7c2bc6a36d57b5b5b20505ac7923f05aed904dda65d55cf3140c78f609ce404ee5c59a780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b6378b88165ac78570649bbc4878dfd
SHA12a555ab8c9fe0e701413410a70eb277f213a45d6
SHA256ceac11723ad3131d9a7ecf883d5b3ec8db8abf6982f8d672a538c32181255b80
SHA51255ac05a59a277ff492304ea359c1975f85b63d19ba6789b213dcf478b353cee96939845ca9bfeaa75aae7adf6405d5854ebc5f0a9a34c73aac61190b3abdb502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ecb185e98eba247d9685e3096cc6fcf
SHA11ab2f26a58e32d1bcd3f256927b57a1d8326b0f7
SHA256e59333ee6aa45ee9cf2c8594f9d50442282c0468e05866c5b93252929ace2c54
SHA5121ca500b4064bbf611dff7c3a47471f11d12eac7822bd46db0d42aca1cec6099da3e59e246b69567b8607cd0489aaf39c7023237cd892f8acfc3b4f122f1fad06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef93e4cfafbe6b45f5118c258b6abbcb
SHA17be6121860b9d28dbe0d6c6cd4ad8d030bb74a2a
SHA256e50c37b9db3eedb6731685be0c78acd31c4e365f579bae240890be756f65acb2
SHA512d52510bd6bcd5a88f31edffcdef855e4bf72d6cba3ed481419c508820140d12f979929a3e2fedffc2187129e02393dc724cc6ea38c1660c56cf8b7db1a6d6f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c588a09f766b6a011a2615f870e00d
SHA125aa934ab13cb1a636c66f167d0f05b7f7eccbb3
SHA256a9da564c13b80a0aa0c2b2e9039d1afe8d9d9c78f8ce1d0f16ae8f6f0e96d8ec
SHA512ebb19aff68e5cc4e65999b78a0b3d47a7d5132b724438311ac883c751e11e282476948e2400c4cd4baf38caede8c8861b573b0663d271eb199eba66b2a9af7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24e8d6dc59e3b113d64cb0a2a9caf43
SHA1efbe638b80ec9a4f68ad9a2e337b3147e63903bb
SHA256200f10720e3336450e5d5738276655d672ce37091564de9e989f2fe6c25c9e6f
SHA512b658903f68190ff00ccc2eac4148f7ee881bd3641103b0f5a1b15cb213868577bb84149c9f661381fbc45f2146bcde20bfe929ba34bbfecdfc5332cbf88a3977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579fa592a16922108a282c855694c04ee
SHA1c9c9ee401a935c4a3173f75723c211b6696f9529
SHA25635e527c550c5d1b40176632aac1cbd2aefe20f6493119bcf55ba6c62331060bf
SHA5126c2511c2bb80938d42d3c86ff0901d5d5ef0fb6fba6feb2f56e133a6bc5c80287eba330c5d1e73cdcf06f55f3e84464f7080940b7aa1a994d003885491bbccde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521625a8b276921fc613d405594449da7
SHA18cbae2febd56363e42b72c2a9f54cad64659646d
SHA256b9fe5eb0480ceabe89c9edb43e3e263d2a73a17dad5d371a4f5a0bb7fcacd6e6
SHA512f473e4e5ee026b0abd19ee4bc6b3383fa2f629cb4057751a91ca26d999f1fc10d8ef38ff5c0e40389554ad9eb6180534cf587664b01040ea9adfcf75425f3294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5948f0cbbbbdf3ab8ebb5e782bba6c1dc
SHA1115a94b8550094b8e2b9f18cb2b4a1af3d8a839d
SHA256e99972e6d1c3c861e1651993be05869d6db59c58b78e74b5dcda694f85267cbf
SHA51224f6a1f3b01557e271b11fc10f4299edfcb679d5f124a6027a9e80c1111966d5d6181f0fbc37bb3fba5f669461e9cbd1abe1a3fe3c63e05a374e4c6eb049b45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD568b6f42605c6e4af00d4104501d66387
SHA183cccd515793caba8709776e51135b389efdf55d
SHA256db0ffdcb8d3ad772ae6b6c6941071f24b95f083e36c6661d2f36955dbceab00c
SHA512b48b89ce54a0cf72f0eaa85c440a1d46368ca917cf33ff2ef689268ffc162a576c93d46c01edac6bb267b4ea78fc2d9dbc8303e74dee423ba2704ad830bec716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06