Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
0344d01080975d8eadf79b8eba7201f2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0344d01080975d8eadf79b8eba7201f2.html
Resource
win10v2004-20231215-en
General
-
Target
0344d01080975d8eadf79b8eba7201f2.html
-
Size
1KB
-
MD5
0344d01080975d8eadf79b8eba7201f2
-
SHA1
e41e94c17aea2730fe503ca1817e779bb481dbcb
-
SHA256
29131caf9d18d748fc1e28f837670839a8352c037d39b3302dfb6bec85554205
-
SHA512
4956fbd4170fcc8b076c69c1e6fb1964411514d1cd4fb598bf386b407cff9831e1fa135b8bdf92f0782ad6aea37d5f213bc581ace8aa4ef48d280038fa9babd1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0da3ea5c13ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410062464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000009714ca604117225804757eaef21ab3097b1b1a145d77ef9753248be69e53846b000000000e8000000002000020000000adb643d80eed7ecd560ce722823a2ee7abbd01953cf82d7bca13d522fdcc14e12000000045e16bca3a6599276fe6c41e0f30af728a05ca14c1cbab6dea4975c8ab915ca040000000b48fd6dda4f54f545bfca4910f400e30631e96e4168d34513b5b89ca3ff523b9f70a06bf00737561bbea38686165099a59c1d15880ff7920561e9419477941af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB8B9A41-A6B4-11EE-AD67-62DD1C0ECF51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2600 iexplore.exe 2600 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2240 2600 iexplore.exe 30 PID 2600 wrote to memory of 2240 2600 iexplore.exe 30 PID 2600 wrote to memory of 2240 2600 iexplore.exe 30 PID 2600 wrote to memory of 2240 2600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0344d01080975d8eadf79b8eba7201f2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575992b5b8f9ba0c856a6b17568a572fc
SHA16a202dcb810f8485e5cd38934bdcd816655c26d1
SHA2566f153095079f15b7ef919d97028244031243c72bee995c137ebe3cef812366b8
SHA512880bb14170d6dd754d83ef8f4ab5b74b9e4d2cd1b4d66ec54d1b98269bb78c9810790c3782f9eca2b967d2c01623fcb8eb133d7b0ae338fb1820fe9ff29faa06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5795cbd3b2a65a46120ab6c5acfc40fd7
SHA18e0500af0ca008914198c7f26f4965551362e348
SHA256a3b0618cf4436fc7c468b884b524331838d0827ec60adbeb519d3cd263ca8090
SHA51291246b8dc43f3e9aa29d31f4544ee4fa377085678d450ebe786d1128cd548805722c48076ee7513153e26718c4f956f09b24a1a81602a0de8a477917d1e75ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9eafb63cbd61ebad2e83a698a2dccae
SHA1f1fd817e5b377d7e2067e197c7de7b664bd0681b
SHA256cd5631da66b947ddf6e906eb3abe765a0f46e191a91bef61fefe89926c452bd0
SHA512d7fa25282bb546e98803100a21c7922d73ac5d047c044331731e4cd6f647516e3b2860bb0d8d3f59d297e01c6f732240acf0038ce2e057c1c20283ea5e09e747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124eb64962cba1d9b10fbd32aa0de296
SHA1b2d3839d7e3f33b72cbf6f745d220ea847be1fd5
SHA25643679b6d1d9eec0953bc283f278748d227a0f051c0d4919f34728d5ae71388d9
SHA512319793e2b10c1673f708e6ea6905d16e4aed27010c5a30202f9a679abeeea7daf0bde229030dce04b294a15d797bd3a45e605f8f4c72c7ad85cbec8a6318d3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9b0b2276c558cbd1cfabcea26d03dc
SHA1e46a464ac569a84270f8351136734ae9054dc3b2
SHA2569e6b76c5496a69451c72e8c7076a5ebb06f9d18e152e3a6393b9e1ccc0c053b2
SHA512b2422671f1314db49532c891b29578ba5d25985e08b1db7a57551e9441a305963c5adca42aad41256b1ba3984709c4fcbeab5b822333ab487322dc771e9d91e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ce985dbc8f70144416dda351422e28a
SHA18e54e7304cd4d707b504888af8d61f3099763b7a
SHA2564c7eaf65de34b370a89600448c47e925b32fc4ffcfee2c48da85e6fd1aa5d5ed
SHA512a4a37df43ade8c1ab168132a1fbe1c6529f12a7f3fc060dbe3d95c2e01abaa164d013f82fdd011a5a62dafdbb122c13ae2a11c78f7a0dfcdaeb1ba17f81f2c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f7cc2466d983e4e7131d3b9dfdc5d5
SHA10d0ea5f1c7d9525ee1979dda849dc2ca7bb91127
SHA256a1a5940efcfd994520b93cad9d184525bde0108ecb84d87dacc0ef6098766d39
SHA51296c5f1e954b164963a57fbdd06c676de72cb134467ec9ac6f3d349ad6726fb99c8feaf359e22dfdcba6b7be7c13db710c67c4c8cd4b5567c74bf727c51d6d0c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583ac3658690cce2bf1f4091350018086
SHA1f083b6869b9000eeb9bfe2d401f41443db4d12d5
SHA256efec9ee25159f395b7421f7241218b8d65565f804b46d8c85d824ef427ab9273
SHA512008dbcc122bb8b45ffe3587b1baf7c4407a64513ae1477e89687263cc10c015ab05d1f1d9ddcd8f720fe879a94f2d5a051f4a052b3d2d93ce745c45951746577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b283af849c77341bfaaf9b711bacbebc
SHA17bd046af0651da42dac4ec7f4b593cadb2016338
SHA2560c00e12cdab85f0399abbb1d780c8ae2362af01436f259542318c9bcc282009e
SHA51217d4bbf5f2a2c57993dbefa0692c3bf0d63cf9c2db305bc8dedf6a216e1042f45a55af09b0681eeff0c2ead1411e8320474b9d51e6f06e43e34eb204bab4e472
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06