Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
fba1d94556eb1b77687037bd5a9c9e14.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fba1d94556eb1b77687037bd5a9c9e14.html
Resource
win10v2004-20231215-en
General
-
Target
fba1d94556eb1b77687037bd5a9c9e14.html
-
Size
54KB
-
MD5
fba1d94556eb1b77687037bd5a9c9e14
-
SHA1
1e7cf74d4c150e1e47e113adc2e1c37656a47ee9
-
SHA256
c516cc14e7521cffe927f81e5b8f088e4fcbcfc3a597719fc329188a2c1137bb
-
SHA512
817958f8f8f6c90e8e90cf31c2f400170d23d3fa4fb8faa84e7a928f608df93bc5ab09dd5eadf0d051260c2ba4d8b0f93d06ec0e052277d4d1c601a71e5c1594
-
SSDEEP
768:uayHHvPWNo3PSYksTLMLV2F86Fl7pmN+vmyZbDH1AFnFBVR2SnZ:u3HH2NOPSYzLMLV2F9BmN+vfbjmFFBVF
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A72CE481-AF36-11EE-AC02-E6629DF8543F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410997862" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f077028d4343da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000febd1e98504a96368ca6a1d8da51b0c1e3693a959b651fa2bb816a99b595e9c8000000000e8000000002000020000000fae4a07142776da74d1afe68e851739d0e8d0540ca0968dd1ccfe9559920b4fe20000000581c1bdcf9aa5eda914b1e976a929a771dd6832a0fd5bbb42ceb8d0c9ac83a39400000001b02615448772bf0a1a94b24c3c7d34055dfd0b426de4138e24ab85ec07f96512307be5a60fcb3681e239fa25e5e3dbcbd29ca1f2854cfd49c6c0999b00d2587 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 iexplore.exe 1988 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2420 1988 iexplore.exe 28 PID 1988 wrote to memory of 2420 1988 iexplore.exe 28 PID 1988 wrote to memory of 2420 1988 iexplore.exe 28 PID 1988 wrote to memory of 2420 1988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fba1d94556eb1b77687037bd5a9c9e14.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505b838e22980bcf2a144b9acf0f1ce35
SHA10aa9a69e0d7a40190318d6544e7b757b81063e8f
SHA25609bdb4503c8177d9d9fa0a8d8b6eff8fbf7545e729ea1224f2bd1e5430d4e3c5
SHA512f3a58ae7b00c2009d994839c610e17a63a7bdb89de14badc36e58e1a8c5ec18f1d4da6ab337061d78fd2dc4c1d9a29faa65d23f6d711c9b95d50ec2653bee8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e43e770ca27851d53ae6d20648312a
SHA13995a6f2919366e50ff6ebc8bf35c4fe172ef292
SHA256844f7ff7e3c76155a914a4badcbdc58af4e92a08ae418e7889a566abdc73e3b3
SHA512da8c2b8dc2a2f51d10b9dd3c33d738b25448b367b7dbb6ec78dd3fb3d78f7addb2bd7527f9d34ed767e0821ff387d6a8b0c676742f14539249c6bc9a0e4a276e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576cf28c497273b4536692a6b4de83ea3
SHA12d9a0d108da8a9e193c84aebc3b7fff9668e9667
SHA2566d1fe6b46e9846e763f16cb2e1f404d468867e1c0c0052dbad2e551f7bb874d3
SHA512453ed6847aacce18fd1a42b9abafb5a2cd9d788836e975c3912aaab83223b178dfc87e03c649438d5f63ac43e2b700429fb6493310bfca54bdd9cb7d802119ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd048c1474ae22c2d69a8bee2f6c4908
SHA13395eb5024047cde1d32f98c26956089906123b5
SHA2569e173d9b24f6b58c1d3534f3f48a70d743e89776334ad4dbe210c060bdd7e6e4
SHA512df629d8151fa41d0ee7870b5a6c051c6485e90ea19a85f6c69e691c2161cb90795b731bd68c3c8a9e02b124c77469b53d0f276a1b138f16ca9a2fa0536263152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab5f45e931930537da6e33b93f16fc0e
SHA1d1ce0e049c79cf28016348d9771c4638d548c068
SHA2563009e92bd02a6b47e4805ed64b6ded27943c0e735e898501186ca455bef51c6d
SHA5129d573aeb4e7a9df42cfc91e2a6e6e5221002b06115752ef2a9d1ecad32db0854becfe2cb48b810d94e9e519249ba820fe9c9befb542ffeed0401e25f91bfad4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a02765d873a25eb4ba03cb63a3d4246
SHA12dae927ac59d1c76b5ab593921766e39827223f2
SHA2563aae02dfd58934c963b99786c7dd40d5e0229d14f205c4b81de852422ca2509a
SHA5122205e3b1fbf09fd60ac17b38c989b8deffb3202db801492d8f8fe993c9771783b1847b655b928449992bf006fcb101baf2e8edfd1c993c1b343acda10f074f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a2c3d238f12749b95faabfdb5a6778f
SHA1cdbc7323545676abb6fe38a48ed42ec62a73527e
SHA256963ba54f4f8adf1a0749991cb9348e023e8a9198a032832f5a6c2a37f0b6b029
SHA51293725236e51f1518ad4ecda119952545ec9f12bbf1371572ade814a175fce5ddf3110e404edb59db2e2ad1fe88caa2a90cd04dd8ec60ec44b86dd62d48527812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d3539b6051c942bf8995aeb03050d98
SHA17ac6906b0c414a21d7b0a87f050135484c8b4672
SHA25611138ea3e10d4f5b9203ea1bebb2323c031c9b9a739cdfde21bd9b2838c5255e
SHA512c0ec844738274c251082e0a9cfb47a69ca928eeecc4507fdcfd1ecbec0cf646aad02c300fcabb745a86a692176d6ff0ca5f21ac4bf6a6e3d8f82199bfd81aad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e91de2a86a8e597ec25b845b2591bcf
SHA1b42068ee620a47c01d509e1dd3663d4171874b14
SHA256ecf24f1dcdc1a40c972cd7020027ff73e13816f1da395d969f0045c6d9a6f354
SHA512fbd5f52d3bab28c88414a5079fcda3126f4ab9a966af62679d526d7b58c79894c6e4b196095c59e3fae6efefe83af01c279bbb14d392fa9de9c04edcc1c27c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a020453e1c26bd3709fc0937941c3c6
SHA164c6b098aed2a2c69a5c507707ff3d7a0909b191
SHA25614476fd3080a918619de0f6be0bafa6c966a40f2b8fa5f17180a26ae585f6721
SHA512f55d710d7f13b32c198f73a7c7820f6a37bb3c2c5fc0dfa4c5ec3af9230d88620e3b86c7326c11e54c8a7b67b25db154da6ae731ceadf3dd9e35969d493f3ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556c1df2e19505505a322a01442a506d5
SHA1d5a4382591d175323593c1a856f30b60be3e96a3
SHA2562c64a39cb8955c823725ab4c8817b53e137d617d0d98cf0e3522671064a5389e
SHA5122d6b4efd9d856f91fb69d528d3c1d9e5ca4e415656a49ce0e3523a4d55ea62cc96c0ddf5f98131aa60c127765c02951e233a395d34e6991ceea74a3300455568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b227c3b1564234be5e11f4ac2f7d627d
SHA13235e132643dfde873d709fb8c3a8758e3928399
SHA256d39233614d3b6dd907d71677410ff241f79097e505244c52796b34eb1287bd88
SHA512da44bbac616eab8d0ff939cfbdf37e4be9fc6182869bf153733f9d363bcee7927a06bf824c66ad400197dbfdd07f2bcfc890ecd13cb4b2dc3bccd7bd618df5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50743f2cdb282aad5c8420961b3f4dccd
SHA19fa3b03fc20b61049c465e0223dc4b7c044c9c0f
SHA2563fea30a68d560d42c5c935184cf0a0a8ba031959f1617fb4b031e7dd73f140fe
SHA5122e511f1faf1a411791c7c43f74afe21ef1cf52ee473e200736476db911d66ea0e3050302c93ac407eac19f3043e702e9c03145b06d0ec27a7cd1a9ffc8bffe9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acdaf7b31a11187ffe957dc8f55e467f
SHA1888f869a607385d0259d63413857332e7ea96e0b
SHA25607f4242a340a667c700d197384ca421b28e243750e0ec3500dbb146f819687f6
SHA512b43ab082e4b31a5170c7da3c33e0f3f66b13a3c4c8c063f166175a076d171c382037430c556697649a078d62f566d2c7903bb262b8b7d78eb46f8766d0fba009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da7571fd4e0be49eb49f59c4fd0a4d34
SHA112cb17ebf511da58ea2e42cf9b4080f08c646057
SHA2567450215fb2a8dc199b8ec6ab8eae43d3f99c02c702f29ea544bd2f237f98a884
SHA51235cd888dea43d6817ed3bbdedb39cdd3d5f83b03a4881e207901ab009bf1b7ef24f4432ebc6798559f089a7980f39d39b9b71370214fd1a3b9a2b2b8a15d5072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fcaf3d22f465ccfeb898e9e88eb8ba9
SHA17338824442abe0000f46f0e4f70b49a8fb4f85f0
SHA2569b800c7bb59f0342a2b32f1065a4c90040e0e8f48769c03e85d53a8cc9918d0f
SHA5121dd123d7199a09a9d86aeaa96cd0918503fa58b00802ea96d80cff8b5bc069b90fa81800a0838dcd12acd56a82ef70c0d256ade6056b993795199d36a0b5d04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535f488ed636466d7e369fa2e572d4529
SHA174b1a701a98909d685e8e8c2ed74d7c944dca229
SHA256caefa0c44daf8af82d7308075e4ac7697d9191c924e84254a9eedad0d2b00fb9
SHA512365c849ccc73cffe56e8e35f611f483999de555e5a1e70ecfd72e89d5520bc9ac78f0f12a6f50132cbb981cee73cd9b611535aeb533e8968473afdc8cba075eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c47549b7864338fd35dddc8b384b441
SHA15b3b977b0e59f6a26882966caa6c1c69782562f3
SHA256b0c499b8a963bda2540f56c9190caebbaad68796868b25d79a4d5b93f8658f03
SHA5121eef4e34fd0cfa9aec3a4b3eb381448502c21b9fb31be49030ec156c5d07630343225a8fd975ddb604f1fb77db4eacdff5f041662fe19d38ea74e9f4fea35ce2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\f[1].txt
Filesize34KB
MD5a11a8356036ecfbefc167cc61423e473
SHA1f18cd9061190690d5f88b222f6c8b6727be484ac
SHA25691ce50484e91b49bde8ef16b74e51bc8e09dce8f5d0c906919795ac87b3deaa7
SHA5129324faddc84a97c36c8bd9df72503531cb5a0b18a10be342474952b85d28b5ef14e61b1e0890e19ea73a33e333ae42bbe1ee97d9fe73f8212473292a50b0ba03
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06