Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
05ba7fa52c0a9451e9b17500b4846a41.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05ba7fa52c0a9451e9b17500b4846a41.html
Resource
win10v2004-20231215-en
General
-
Target
05ba7fa52c0a9451e9b17500b4846a41.html
-
Size
432B
-
MD5
05ba7fa52c0a9451e9b17500b4846a41
-
SHA1
e55f9e9b7b7bac1750fab6994bbc2b54f84af3ea
-
SHA256
0dfd9f1c9772008fd36c391fabee9f32d793bef970d5ef9425f761bdc9574be6
-
SHA512
ac20c90cda4a4ed976e77f1e6c73cb6ea05495481e93b7d2e89329c0e75103a69988c950c33170b1243f6214f39781624ba2e168a605236590291a34c95030c5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000f34f38e47747d9a7451129e8e41e64b9f633d8068c62b2b988fcd1c05a923d91000000000e8000000002000020000000d8a2824202f42a70f0270b9854277262294263c6a8b62b8ba4a983bd52aec4d9200000001f4b61dd260b697dff7adde02bd4c3ac53cdee04e35afbd5d7e08e4560b75699400000002e3480892f12f7603eef4179187032b94db49df6a5d0d080a80a49439c8944be83df462da551e29939f600aa110f51ca11391a72a8bdafa1618c5e309dd4a3f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410094128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01aef4f0b3bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85DEEF21-A6FE-11EE-8FC2-4A7F2EE8F0A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3040 2800 iexplore.exe 28 PID 2800 wrote to memory of 3040 2800 iexplore.exe 28 PID 2800 wrote to memory of 3040 2800 iexplore.exe 28 PID 2800 wrote to memory of 3040 2800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05ba7fa52c0a9451e9b17500b4846a41.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0dbc5f8805a01279df63da0c859031a
SHA12ccd96b2f3edf8b1a2612ec82a5ae7b8a90e5839
SHA2560db7264f69fee0b8d48ccd1f02ea9aa2d3e50efc6615894127f4ebf5a7a91ff2
SHA512495bb4bbdad1a760e83a482de1d48a4ce0adc87d615582f1c52eb008f7748e895fc0697c183bcad8d5452c4bc28da0c3027e58f5f311009d9917eb690c1dac3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7dfe7d7f9632e9cde1218def1870bca
SHA17bde7d6f16ed7de3925b66c8d2e13f7ff80df2a6
SHA2567da4658d5484aa1065a128c4881977ec58e957079473df31bfdfa4c0f296d99a
SHA512097cc9d2f6e3122ee5f24903629c86cc592eeb7ef301ebc9af1f1118a236227c9e8ddb829d88b205b03226ffffb72ac3513f1e46b43cf68e7ca7172a88cb6387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5759e41c6b830dc2257a4fca53632cc5d
SHA1ba30c07b696ecfca8ec1c4e4ba369f759778f12e
SHA25656e95b6350fe0f4c7e843295c59deca4400420705cc7f4a61612ab732706ce75
SHA51280e72f5662b23c2f7f20cc1e6acc2073aa103f1c41399368d92fced8e5e95e2d2ce354c5b527bfe17c45dd5d6f52ca7fb7fd55f1687f50b8f2ad745b7518f939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f33e84a8cc3b9c238260dd0b6e45482a
SHA1b4826475c880edb967db712155f8ebb9e3180f31
SHA2568d22e178c858a81732399905586e325f944755ae98790f9b10cd0845abcca594
SHA512b158d74d411e293cc41debb7669a59b334740dd3d5d2f582b1f7c0cf1751babe5326de5d0e6aeeb3a77d81199369ebd8d2aab3c4b1fc45a6957f2cc0438a4b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cb827cab38178d8d557833c79df0355
SHA1b7d1a5983f0be40b2d12d37b1675546813f83ab5
SHA256a27e696d77b1b5afeda7ace947b10a3a9ed4522f99f42c207f03f551dc5da43a
SHA51215e766770017506dd2c2e18b0fcbeb83ca9f00c4c1f3a2a084e97b30a4ccc3c1493212595368ae6334a4ab5e90f91d60bb176a15c32aa67c3d9d201d4b283c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f0fd6d31cafcd787d4d7bd7c34b0c7
SHA10c5cbdd6b652efcf6f1b00ef18e635352d6d6b83
SHA256a0103246b78d1a00118d7a29b5dc920f1517ad878b18366954a58d822f7b3537
SHA5123a6ecb2359cd94bc002b050a31c94df2f256e4ebf7ab5b7dde5f08d50caee76a776a5edc058aa609a39d6d8f2e75dcc04c523c03409b0730174bb1c62f7d63ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5819a8368091b15b9de33925b57d48dcf
SHA10147c1bfff9a2788fad267d1c7cec822ed334a3d
SHA2565f4d5fa818d86c79a9971156f13d8908526dbb04e60ff8dece6d2ee654e9e4b2
SHA5122016cda4a5414c39b0246504829f479cbfa204a2b61df8c9c780f351f82134128894bb8f603fb13518d00472a34cae786e6493a6996999cf774d38fa739cf501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553d6da39385963889ee16ee4cf033fb8
SHA1a5cfff0d90d1d2aa72f452b52f2368bc3c4a35a3
SHA25613a1ea55609e28a840bae20ec9edd33a18e6322eb9da3459618385ec62822879
SHA512793a72729445a3382afedb42aa589e4168a75c44a7a4a9dcade6dc7e32f14a30cf6a108219e88049d4d3c8afc231c429fc375a74fde387c4b3dc2a6e27d6cd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff4b50f9af5fe7696b006911289cf37
SHA1e8c814b579be9337393f75469b37353742318586
SHA25688a5fb6066b48f676cbdd57c020a1d26b1d183d114875b7bbf31172636f49713
SHA51292c547155f6da5c057f44feaaa83b66819ab41bad501443ed205978272d91e702097e2e257e033ca3ece5dbe0fe89a175ff788a9efb30f3cdfe587c0049dd2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90836bb8ca13a23e6d1f50d5fc02897
SHA1ebc42bf303cf3932592ecf7277a1103e0460e4ac
SHA2564dfb83ef3248d3151b7b3604a719064d65c17cd97a5021bbdb1cd0dc31a5e048
SHA51205fe84c6fd06b438fed9a671d585017544407e1548457231cb8d3bc46825edee944f4f7a2beb26f5149c83b57df5ddbf91f666b00077421d6b0d05edaa995a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55805fe795d152bcde0179416404119b0
SHA1bb3a3e13de61d67510193869b8fb0de096c4dbc0
SHA256da7007e9b6b8d502ef0b3653b16d5c405a65833473c9898902a009a2e363193e
SHA512a847f363e905550396db3f0b45c63dec1da4b01b6db4f015e1dd0dd755a6047ecf522a19fd2b5b8a0bc88030b8a930a00135c58c6cfc98c766d2c8e99eb2b991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5158b8aab7270c3b391b48c2650e36490
SHA1c7441af03edef25a7e982f694c81f39fa4b413c6
SHA256dde252c019534665364c9c77cfd1d3a1e60fa4d44e81972e9b90a2c435174696
SHA512c3b15d6a5427d373b090bd524ab26c05d8a69bc32b4d40af9ca2ff1c7a93822bbebb82e9fca512d5beee4c80fae0e5d1a309338241f48af9f50ad7f0fe30633d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6612c40d38260a6dec10a197da9076d
SHA1b0bd86d4d3bb04967873396af0ca4ba999b30e90
SHA2565025b90464340a95435ec5fc93a2de68fcfdceac1ca580c0d003b8e6b7eae95a
SHA512263e1857e692544cabd5b63e2f3143e0257a3c2f825fa05d76659fd0d1ecafcc78ccd580384b662f7c53226c884940cbddb54b4699d7771381921c73682b0c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b905b3fbe2d8eb1795e9b9c5952e30c8
SHA1e784d78cbcb54154ca26a78d553c1fad1e6cc28e
SHA2561940a61ba8b69327d80d58a448ad0ae230d896a392398f952a62e665380bf5b7
SHA51206db5f0e2bbebebc0eed62829d53108fde564add7f4c7bbfbd9f2750e1eec667fbc48ef38649bb2ff01f6c19d9793944399012dd781a2e6b549d36e9a641a5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddf93c5439f64b6d41ff460bbad97246
SHA161090c630f44b5f34f643a1ae1dcb2f48088f332
SHA256954e0776d24d781fa4c308bffbd0e96a03c47da0a883cfd99b0b22c84634199b
SHA5120d31f8fd443a802d2bcd61bc422a8d8fa3efda4f19bdc08aa04ecc640c8c8e8b5c875000b14a8558769be8d5461b0a5a3f331708aa156c8557336db812e2b20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8ce91a2b6d50fa0f9dff6aaccc2633b
SHA168e111614eaecc9e483231017b48dc8a917d4b6f
SHA25663914d28467dce4186abdcead6970c3b88a322841caf815e77a1ec8e70edbce9
SHA512dd4fe8223c01eaa58a52f5d45a3f85fbf7bd45671987f7369f273c7409d63db2d649f1e1f2d1825d488cf9ab380c6752b78264c853c44ef727602cc791772a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be7a139afbeb3041175f78963dca1fc4
SHA1005cbf5926bb11316bb9055691f87929d97119b5
SHA25676453c9cbeaaf984cc2aed8aa5c69a7c9730bfb924690880a3bc01fc76171343
SHA512cc411aa32f54156b88b25dc9beb38d7f36e2db6a774192b2eecd6fffd15889c16ecfc6e26d90623576e19575a149a4a5fab65ba12e13641340fcf05652fcedfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf26549ad7957615242332905dc991c
SHA17010411c64bb4a9c0290f14768376649aea349c1
SHA25681396165f0dfa0f9c4c2f2bf8fa70c1dea06beac841b502b45fde921d8226183
SHA512a1391c685a34714fea8f2e6206d25dec49da814d3a5e68dc825462ca744d57847303717ebbbf9bb9f98a6c9eba2f1f6e169d15cf59cd0189559f55512f58b3b4
-
Filesize
2KB
MD5407c656d218f4cc756c6b42f3b4bdf6d
SHA118119e759b26b90ffe81cc9e3f8fcfc1cc070adc
SHA2560d3cfd135d830fb06d64f2dc620d83ca0e3d49419baf8ad100c1c2a21672663a
SHA5120e28d8345e4b94af50242ee40adb42c40ed1b5ccd243ddb4e1b7ebeef2466500b151229cc8fb4945e66df15608a26f23f1978447e535466598f9782547f84585
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JIH1AB02\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06