Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
00b22584e498337d36f0e953de52ebf6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00b22584e498337d36f0e953de52ebf6.html
Resource
win10v2004-20231215-en
General
-
Target
00b22584e498337d36f0e953de52ebf6.html
-
Size
105KB
-
MD5
00b22584e498337d36f0e953de52ebf6
-
SHA1
fcb523d1f7ad64ea381db99cb51c03797ae12070
-
SHA256
ed208a169da88cf8dae370bdcda784a31e705403e6ae618441f534fbb4f72d92
-
SHA512
e6060b611dad969d5ef435f8df548a60d9570376b6afda97556665364e5a7ea482799626ccdf97be9984deedeac1b2c683254e28129d7b9632306c01d151abeb
-
SSDEEP
3072:I7UcjvG8rMUcXmNRS713rwF1Bb6LLkxf+JhfZDM:0GXmNR2kki
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04347641-A9E5-11EE-97FC-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000004ccc18168fd9d5d0dd84628becb86ab73189d489d2bebdb573504c6aefa8f7a4000000000e80000000020000200000002b97174a87ceb82b34ceb08aa857c4ec8123cf987a6d3b7b3e704b310813c628200000002f7ee1db00920a0927050e24fd62dc2806554903af5e702900e842e465d1c1d840000000f6c0e15c2f3b4311436e3fc68b61cccef5f95e7d5b1ab7b62ef0756613f06a6f01d406b5d24a475f7ee18d0e079cb8a8c76bb296323389755cf8020e89a86ebe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ce12faf13dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410413036" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2696 2220 iexplore.exe 28 PID 2220 wrote to memory of 2696 2220 iexplore.exe 28 PID 2220 wrote to memory of 2696 2220 iexplore.exe 28 PID 2220 wrote to memory of 2696 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00b22584e498337d36f0e953de52ebf6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54651d14e1058ac9a625c18472e48cfef
SHA1f16491078afc4e2c9c62702390fde17ea33a2ec0
SHA2567326c18ce98054f64049ac2b69dc4c2044a9b1816f1c75c353fb22d67c8d5add
SHA5122884ebd939c317595ca874cfe75d2497fe74281d43412ed5c1461599dac004cb7d13ce28f784a65afb8d8256345138513bca3e158c2738cf6120c9ab862622b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb64c410a41558a12b58fd8a14d06fe6
SHA126ccbfd6266ee5be1a6019b0107d1d4a5f8feaae
SHA2560585a6feb9b1263245fba7f8ab3f673b7b64214c5b5170a167ced01e568c0f05
SHA5126ff3dfec4f0443cb8138142ac3a400c54d1952f05213faff0deeae26e5c4cffa71ddb64abce193f0755a72d83edc41cb6e738263dc522d47f5b1d4dc73e830d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db6f01afa366a6c965a280655cdd2828
SHA1cdc426b5aeaf3f1cf01dd3e4b95235ff16ccbb21
SHA2568aff6192e2271c69385deaa637bd7fc086fd0a720173b85ff603f9e8e18dde28
SHA512867ea58aab748054bed9e7693b52e143195209e4e87cbf0763a88eb9d6385e2fc056c1e617e940d09b219a6b3dcd49bd13d458d4b70ba74579366b7b0c7aad39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d27e3a3378be6b7f2420bc168dbff97
SHA1ef8e71eb76b85cd157fb3096077044ff96b57509
SHA256a6c431f547d6d60682fd77372baf0155c71be1268d42ee419006af53bfe7d6c8
SHA512637b91faa939880fba17458304ead4214c6e8d61771ab64aa7f0f00d46034e018079eef39f0e5d191ccce3b1aca8b9dd37a3bcdc541591a9ca001f3c546be4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f32c46b7a414823c383bcc1c2bc85a
SHA1d67ac68264476591e8cce710bb008ac3f154f3e2
SHA256c14c0914f052cca961c55dd2319bfa12c6fcdbd8ce077e293d90fbc37588a78f
SHA512a07f996fd2bc122f875fc82106cbd50b312d5a93e55fe6d40970cdcddd501117fd0b37ee339f1bb66b9eb0ca2b9c576c21297cae70c35874d659606e8d18fec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf2141b7aeb093dc1e153351de651d87
SHA1c390a1b435cdd6e412650b331b7f15049e521e31
SHA256a92894d2ba9c6b7a20c67c8b09dd807ad63edd4b7afcd8a9036f30c97fcb6e12
SHA512615957ccbfd400cf3184669a21e29ad8d6d556129be5d02b45c2f761fcd59dbe24eda90e61813c920fb735ce77a8341412bb35f507c1982d58dacf7fe60d3d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f0f649e20c60cf784efec51f085789f
SHA10a343532c5678c7183e3fc85f8013e84d96217fe
SHA2566468bdbe39aa1f939e7f9a1cfc0e6dbbf8bc7e193516e0aba0635e9913a52482
SHA512077c5d441d10178be819050ac7bc4e8b47f36cb56cd366744d4269181f86372fbe322dcac24019ec009e06b52a8ce317999709b65c05ba5c5170d55b2e49b39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534c88298663006dc22daff6b363c9797
SHA1ac832dce490c5eddb2edd45762b94a21c3136961
SHA256bf30066b708d948e0e168c042e1308ad69b8ba54be2bbe3788547551175ab022
SHA512a49303f0168faa728327c20eea2351ec503190a1bc05b6400b2f8f8d18548828e10a1b88359381f9b9ab3f645e2e9429120a216badc2aace77e17bc2a89672ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c33e705192329208c6eaa54430bdcaae
SHA18b1a137e0545a1dc1dea236ffbf14e22a58c2701
SHA2560cf0381126f7e7e0b52a2404188a67fddb67fd26cd6e34c17a8c84cfaaf5e067
SHA512425d39ec9b16e10bd461e1b76b03bd0c3beda100f81b1e845303a55a6bdb10111cd99ae91ce2abfe578cee2ad74b5919b1f6cfc0c27ef0c1d5833d17b5d2f983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef276e98eaf5b5ec009b3cf44549277
SHA145e50e169cabe2dd4d6f414257346a8b8ef1a44a
SHA256d8770d456149058cbeae77584c56680bc3f561bae4e153604052e294ebf8e916
SHA512517785924d92d021578264839447a5ec7c212f7d7369ced18eb00f94f63a772bcd8b3b28596baaaeab5c3ac95e97aa7d25ce59aa29f4002b7fb8d5cc64065732
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06