Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
0004d9e925c9d7d5e5f9118db626c366.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0004d9e925c9d7d5e5f9118db626c366.html
Resource
win10v2004-20231215-en
General
-
Target
0004d9e925c9d7d5e5f9118db626c366.html
-
Size
9KB
-
MD5
0004d9e925c9d7d5e5f9118db626c366
-
SHA1
c1d0f22ffa2b83def5dcb2ac71f68a886080b480
-
SHA256
0725a7539619012f38792492057af4e23c7dc91445bf48a9850f47c90fd7d1fd
-
SHA512
9ee8a78c2e61f886def45d78b9ff5f2aa91af8f13e3847b37284f33307ef4c8d8c9278410bf5f6671c87b5476ec306eab7d921752ba33b78180360f345b77593
-
SSDEEP
192:S7wq5NGkDxWwP7xshEYVu6RY1RYnPQhxExisxqK0JR6L:S7wq5Nt9YABo8NA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a8286a823ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91DA95B1-A675-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000b016b4a5577a10be4b11a3cf03e2fd5faa1d0ad1c397e0495854ea9cd66217b3000000000e8000000002000020000000eb235e819cac457baabbd151be39384becb3708b8ac7ae667192440d5fb0b98420000000a5b216aeffcaf9b52995303755bb11c7fcb4212cc00d5ff0f8c3bba718d5f1fa400000005f30addfd18df8f0aff7206093b26fcad5e9760b8411b4c6770f1ac2b60affe88e537179fd3dfe820b7cdfb1147c5c456b9e1be65f23fe8608be78dca410e200 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410035311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2820 2196 iexplore.exe 15 PID 2196 wrote to memory of 2820 2196 iexplore.exe 15 PID 2196 wrote to memory of 2820 2196 iexplore.exe 15 PID 2196 wrote to memory of 2820 2196 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0004d9e925c9d7d5e5f9118db626c366.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a37dd9391d5bcad7b13b31b1b10ee3cb
SHA13217fc57b3aeff9da264e5556b0f95f4bf97bb84
SHA2566b307cb68e82710110f0938a4e0b0566c4a29ed89fbf76e4e2b44a0faa50c968
SHA51298ab632d1c2692beabb35e73c0de8c9a6a53137b97c1f7f92bc999ae3a721f97573ddb669bcea0d02303adee214996c85fe08996a723f3fdb660143f06728814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb69208748e8fcb2f1b82a8e82e71128
SHA17927953adefaaba4245a0d362402c7c324a492de
SHA256a2c8f8dca1049d01df888481cc1b249037ec95271d250fee58e223a87f853bce
SHA512912bef8af6351dc92b1f735b8a6af40955413fa314f4b846e6b54906fa38229ce1c4f106ee2189858736cb4aa860b6a84edc09fcfb98819beee237242dfc4efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5288b43bb986938003cbcefa1dd1bf66f
SHA1f6ae8e101ca32ba6d4a4fb24160f3e87658d97b8
SHA2561592811c14b12df7bb5d85eae8155857c2e6a2e604a93e96d921f3cfc923a63f
SHA5124f9644e771ceac2c1b07b9335a2e08b655f011a687ea029d385d0caa65a5785c90c99b8cd7df8c9ee7f54821453daeb09562cbc4adb14c2a1150959e69d5ce6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9586309a0c7740c858e0300f359c2db
SHA1c3e735394d6e6bcee8271b3a069f61ab7c8de916
SHA256f2037891b8f5e5cbfc5a3e05c52a9b95bd4efc2a3790e17a81754b012a097e6e
SHA5124f1c19caa53f41436e9b9d45c375224754b85183b9497ea6f2f87a216316ff2d2cd0fbb7d9c2a739638dfad5544e4d2150bd02b57efb32903ef0d3297ff1cb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525a8d3b4c202dc93dbf097dae0684a30
SHA1a5f6b40585f0e10de910de7598792fd4671777a4
SHA2560000ef8239b7cac9b647ee7dbffc7c97445f1f721d7d8260ed81fa735ad353cb
SHA5124b532b5a15ee863d27975a44a9eddd8e2d7a850933704304d1248b862803d28c0d71f0efc76b81482653e65551226eb529a8fcbd4b775cadddcbd0566e7966aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57502a3187a8ddd7d89ed63473bf595ce
SHA19ccd5bc073db9ef4e6eb911b6da52a166cd3dc33
SHA2562fe4a5ac102c1a0c82b97c20ab9d8a33f253995d762b01cb40cfe5bc459b5d8a
SHA5127ee5dafb8465c3e2f94917db1444f8f3a0691d8dd726d0b4be6c5a79fa5b5169732d398fa47a0493a92c2a44a9a23eea2b447c8deae4ef38b18cee7b68c67e84
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06