Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
00ea506f1f2c3679ebd56cdcbc332a14.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00ea506f1f2c3679ebd56cdcbc332a14.html
Resource
win10v2004-20231215-en
General
-
Target
00ea506f1f2c3679ebd56cdcbc332a14.html
-
Size
11KB
-
MD5
00ea506f1f2c3679ebd56cdcbc332a14
-
SHA1
f9a7b09dcb8bc76e741d7553162c492d73223635
-
SHA256
365c014309dcc829a0a8ae0778354fe5a951df775164f9635403ab61e585957b
-
SHA512
bd340b71099e7fc397ec3ad7878e17bc8e0639030b84437a589100efd03f60c32afbd9b1bc32c4f85883c3f4dfe4a80acdd81ebfba27ec9f248f586d0e70338b
-
SSDEEP
192:++J+zpIVzDxVk9zq8BvvDSVg06hDsVx6NqSp8Hg:bQKhxq9jOV4hDsYyg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6017faa2fb3bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410197333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC976141-A7EE-11EE-A371-5E688C03EF37} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000094731303e82e79fbc769e689de253abf380da6071829585610b1803467b7bebe000000000e8000000002000020000000a7d0e12b9da3a8bda690da064c964c5e70c304c70a2c1f05057e51aab00af1cc20000000028a4f46122b01d62c7897eac56538aeb7d4f2f6b88556f0473e72306171e3e44000000092a7eaa6440a6ae3a4860632d5cf53be68d5289177fd37a5ea0f00fa2a44c36a082281fe476e10ba19df5c22215147a1e0b3f48d43786b4b8202b1045fb68529 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000d6fc8754ca88c3530bc677ba305d49ed495aea58e804e815a1bc6c5f885c1b42000000000e8000000002000020000000eae91e78342dd4ad5f319285c4027e82d50b471b3ec589c41a04ff9711109b4e9000000039313918a01af73a6ef6761efeb7716893a97053da56ad62721d5d685860bfcc56bb98ded99f08a01cc9d41ed2e3ae3450ecf12a2db8dfcd5b5fee276495075cd168d697bbcd363f0d7bf3f02b6d76d266a96340ef268c87aa83b97e63d6b50c579297090867eb01f950293f692e487b96a64870d0b18608196d1adb8645bea2f52d0be384133d6616262c8683bf3c4040000000ddfc9f28683688a1fac5e79c16d6de4d8d8abda9649f16d499d0b0c6877800da8bb1030ecb0540e479299c26d44c6bfa0a47ca8817b5b077a2fee9883760296c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2664 2028 iexplore.exe 28 PID 2028 wrote to memory of 2664 2028 iexplore.exe 28 PID 2028 wrote to memory of 2664 2028 iexplore.exe 28 PID 2028 wrote to memory of 2664 2028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00ea506f1f2c3679ebd56cdcbc332a14.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53990fb8a752a503e515b0e1840b43fd5
SHA19732f92e322e7543912d09239c1c3322ae5840fa
SHA256518c016d401d2318c73c3ca48ef97a6d5b9c0559f3ff0766b45746b1ff32fc43
SHA512834f21da176ee8f9136d33b2746a2ef7d81a039de9aa4e2c0c4a174f2e35eff5fa9eeffe2618d380a90bee5ef9847f96de072b1364b9e2c1f699460144fda17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b0dd91561a1f2a0001b5576732ef82a
SHA146b9eee9e88b7a520958f160037594d63a3c006c
SHA25695719d5511a985016ae9a5b84fe6996ed69031bead3c79187ad832380f758714
SHA51213faed8416bdb0911bf62cdfd2bd00ff773aee47ec7e2debe18ba2dd83c1d2a4533a81f9abd5bbe16f4b3d43bea5d4807ffdc5fe2be700285c3596980057eba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52169871a59ceb605fb7e26bb4e2eb723
SHA1544ac293b77d4c79342c231d71ce1189305a6138
SHA25660f7c0e36e5db5a1be1d3a576eec70227502d0bd03e50ecfd1470332461671d3
SHA5122eddf502ece551151cf3355bde3855ad23ca582fa842c2583e8f628e59ef6a82859755e1d0e7e445422b0498cc7e05887981234069e732dffc03680e24c777a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1804b9c3960cea6913266fdc3245850
SHA104a846599590ca953717ede37832351489283ce6
SHA256e44c195f5d717c2ddb34d5669d7fb2eff3d4f2c80a7e89bf202b100cb4cc0ea6
SHA512b141542be4a2e894fb18c7711e94813ee1e1716e8b318dae1ad18e7f38bda31099a99be9ed4cb9d7ed7dac6ed2ca5b3f621a634ce17b62da210de14070432265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e925af4a8aebf0024c057221f595ba76
SHA1da616f53dcb153d15723bfa7449c8b7781639b0b
SHA256fcb150658beed4849e9f755e5599e1478633881954aba71361e16a65a41bae80
SHA51247ca24e2fc600a2736d752855132ac6b10118152f9ba77069bc5b1904567aa0321d8364599231e71cb62d8aae84ed051c5a30a490883529abf776adb67f75c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca6de732c792b23d970db035c7905653
SHA13dd765d4b221a88879ac076597274695f893aafb
SHA2565edb83fe0c400aef8e4ae41260fe4600d65f584c7b2dbb07a41f72a6bd827887
SHA512b7c61320efa691b53cbb9628aca8db4ff52753eced3ca84647f28d066eb8ed067bf3f0e2cc82521c795b986ea9bd56d8de75acf70b99bfce0d84cf66bf46aea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ecbd1498f17c0e11e0f9d0ef13fe75
SHA1d055d1aee703d379d785278de419a31c3eb9e8b1
SHA2564447c62cb1c259dc4868734d65447f18f54943538d5da2ada5cb532cdb639f8a
SHA5124320eeba5fcf50f3058c5ee323b6698a3433aad954725db50605ff6baa77e6719860010e91d808beaa884943032a7902ae381491bc55de825ab6297d32223a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7898daf831db0419fdeb064df90c207
SHA1950e29274941cf303a759fed4d25ba69337b22f6
SHA2568cf6e285b5efe49e615a48c3488dfd56d83e5c880ec6417a3355ced1405d405f
SHA512c834ebdbb529c1337bcb2ecc3cf354e4f09093bd2454c7cc1f179b48681709a98830c14ee7f487980369ef9caa8398cea01c5158e10e70d7d45b779e888edaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576816418f2a5a1f5b94f1fe856900c43
SHA11ca4f8cf0bc0a357072aa3d11327cc381a6ab920
SHA2569cf1632a1f12bd6e8b84d6b2e3722dbb0b717c81781d25094d02591ae209083d
SHA512f334c49ff7b08c0b7d615498b525b2bdc7c87ebced6fa95410b97f6699a4b47152d09dce57602d4bed00fdad8082f2dc18be760b3f6bba61758f875d119f28f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1f3e86a513c01c038e19bd8cf77041
SHA1711aacc5c99b9ec2a0d15ae00eee1b1a7d794e4c
SHA256773fc27a9664a9a1f84eb15bd537fa2877aaf4da2416941fb86b6d1e0ccac001
SHA512cd2fdfaa715b2bc1959bf1657de7482c0cc246fbabb9f38a032348a29944ff7cc3f94306841140f8fc664773983ae1996b3b17b5a6cf61940a8f7f105be32f5d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06