Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
7c29abf2173390a702a3676d7b3199d0.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7c29abf2173390a702a3676d7b3199d0.html
Resource
win10v2004-20231215-en
General
-
Target
7c29abf2173390a702a3676d7b3199d0.html
-
Size
83KB
-
MD5
7c29abf2173390a702a3676d7b3199d0
-
SHA1
afae9aabd84681e1aca9a79ae932a11135e05f36
-
SHA256
dba9769981e5ae83a4d16ab38a63c4f5649856bbd3589f3c1753999f1113e115
-
SHA512
19025715ca6b66fdf7d2fa9be10adf3970183502a50dade55c47f07eb2416f1196cc09d332f2510ce7c1b10f4f9ee7f49e3ae8278612eef1d49936d0475bb8be
-
SSDEEP
1536:fuOrm46BlbW+IYNo8OeWrdLPccaw6E6z3K+IMz+5m5EwpoNJxtWdY0ywefYRkHXJ:BgSeWJprSwes5DcybVP44
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41D172F1-ACCE-11EE-A5B7-EE2F313809B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d3d327db40da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410733109" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000007365ed7c631f40ea1bbc5f8871e5802ee365d2ca23c4a601d86a1d738d56c818000000000e800000000200002000000098033871bbd1672a59c64d9ec0d844dc02501d6caa29d6476759c61048537af620000000bdae6047e161efa645e41bf4d553e2920314c0c25d7a6e07e66c516b3386e0ca4000000052016d0eb30a113f2875e06b1540db6a62b565a87d95112a975ba75b71928d9559d0cf6be21e7f09f25d05c5dd27511e67ea9e4e8d699279bb234daa9ac34de1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1648 1704 iexplore.exe 17 PID 1704 wrote to memory of 1648 1704 iexplore.exe 17 PID 1704 wrote to memory of 1648 1704 iexplore.exe 17 PID 1704 wrote to memory of 1648 1704 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c29abf2173390a702a3676d7b3199d0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ed8e01e5431493327c50954a0d78d636
SHA1f5dd5df3600d779b41bc4b52ed980326389f23a3
SHA25699e45ac4fc33d5ee0dda420685100cab384b8d4699c0b15f16a6a3bd5a1b9fd9
SHA5127988a69271e7f8144132e13a5dba6707395cf941e9860513e9d99e47209b6ef3bee164d976577cd00df65b8eed84ae2864f527cf96585a0b7015f9a7996ee1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55509f4723f897ab41bd51f44376b0248
SHA1e9d66c24ada7a46029d82ad3cd78558d090910fd
SHA2569a40d9af711c401443367e1a57d67548a534ba885a6351205dfae222c4ab5a46
SHA512882a9cda9b6399a3902152738df69875b71ee0f4b89c02ecbf7ae6d8b00a822a6994e685dfa376422be7258419f360cf41b76a796d50a98644de1ae6282176f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb113f1362951b96b8f1ed4189bd76e8
SHA13fbd3f5502903496d7d382aa0b78a5c9a14a62dd
SHA256438c520eca2ce7edec84ab00feb77a58b7d7da7b30fafe63e66ed4fd76d9a97a
SHA5126b83082bf9a0b9c9f701d66535974eaa083d5f1e10438448f06165caa38458943de7f8cda8f759d85d136fb80298a678b7537ecb99717240bdb3aa85a6c60117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50638abee1186cd8fa59473d74a92657d
SHA155af49518f031f189f427d4a3d96ef618dec16bc
SHA256bc68518a870e3f74e3838eca2db3efa7fce44108ee60ee6a290b1789b31f169c
SHA5129bd6355bf5eccfcdc5987f896f45de1290877f51a66a46f0aaedd86d92881eb38565a95a7253ab667deb968c2ed69524047836390f8ffbee922ddcea15170b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b29a202a5e672082bf9adad7e1eaf1f3
SHA182399d6f61da5780b60505b0bb62bf9e3c48b565
SHA2560dd1d0caed75f99d0595c1d8ce8883639623bdc66ee83009c1e56f337356638a
SHA5121657ff51e6946d32888bbabe54f08b6a3ff6ca6d9d53ae3fcae4c3de4c479c1195c7ada3e0576e9e92374d1d09b756b9bb9526c0c95e03b8bb837d83d8dcd60b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584c10777d2320c37ff8a55ee89342ba3
SHA16ad8d170c1c75ec45a6a3f81e35569fddddee3bd
SHA2565fd8f6a42009bcf62711e3de6293c6ddfc262039d531a51525e40d70dde9e548
SHA5127a29a024a7b09951dc3e756c842e69dc4e0fd1713100506b516561fb70964992cb1685691edd5548f96a88d69fd78c1957c89099be8ba13973c20bee1684789f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ca0be00696ef1a7f6cf567117240c43
SHA1911bda8c7196ec5371d38dd57227f95285b5f6fd
SHA2562f909020bb665b119ba48c400e52d9142fde1dc371ccf56ef35a2def1967aeed
SHA51276c79407012ef1140326f22b0be47f3563f550fef1743bc9d34ce11e1d3aab77c328db995f0885ec122edbe593896afa6fe28390be178de70821e7aec0f0dda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ad6fde5c5129dc1755bfe9c849625fba
SHA1a5b096bef3f28f99f95a149de036eaa2e9f17411
SHA25601531a80c8cb79e25d2314fb6dc0a3d3ab907094933034fe7a734d6b18c61b32
SHA51259bb4e816bcb2c3acd972208ee7b4f48d9710bf5eea8403b731d866082acb13c5b0fb04a3d8e2f70380fa68bf5f40618b4c394db481fad375ec88efce2b6d5cd
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06