Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
03b6d455e0c3b154d2071730d1b9799c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03b6d455e0c3b154d2071730d1b9799c.html
Resource
win10v2004-20231222-en
General
-
Target
03b6d455e0c3b154d2071730d1b9799c.html
-
Size
100KB
-
MD5
03b6d455e0c3b154d2071730d1b9799c
-
SHA1
3020816728f5467b60bb725a5864793f97e0204d
-
SHA256
e80ab6a283c4e26a5a9416f11e7896d10f9030e7aec5e028829e36ef3ed1ff28
-
SHA512
74ebae8adc7d9cf1a1bcce02aed70632cc7af968168c8298930e33bdc8ae6caf3f85cf57580cc9aa1b7af546ec6b7ca7f0dc15fba598702c03f249fc7d588401
-
SSDEEP
3072:QfUnbf1Uaf8gXmUafyNRBUafef6UafarvvUafrtZ6UafmFmUafNdRuUafs6vUafN:KQNQtRTY3OZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C875CD01-A6A8-11EE-AD08-DED0D00124D2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410057306" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1528 2408 iexplore.exe 28 PID 2408 wrote to memory of 1528 2408 iexplore.exe 28 PID 2408 wrote to memory of 1528 2408 iexplore.exe 28 PID 2408 wrote to memory of 1528 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03b6d455e0c3b154d2071730d1b9799c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3ef464dcc801f679499d2fb0aa36176
SHA11eb24f8dd84a6f7e1744d5e4f8be9ec118b2b6be
SHA25697a735ab29ebd75748055af29fd3032d7ba8fc5a7f5ba4fbd94761b15f4ac0db
SHA5124fa92e1a609af46c7201b4f6d5fe60f8c3a0b11430ca07ae3da795a134cd7abf7c1b935c351a5e8ea202bbc9afc46a385b54c0b4647cfb7e15fd48766d4c5392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6277ffa27f3699456951b446f83b39
SHA1d3a2d6f7266221b4523472846f544b2b18552a83
SHA25668d44bae5e721f784264affd91c3adfd7579b48e0209735f10f168c722e3f155
SHA5122bdeb3d040d63ed4975aea957c12c722ff0101bff5293f3cd852e5d02f2b6a72651f6ff2ddc4fe4abd970e47b2489268fa08e02cab5ce6bba4ca81089dd37c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5483c93c39ec6c7511a6280e664ec5417
SHA1f8acd11aa51dae673e2273a952f23f1d3e6cbb5f
SHA256da128b065116ff1779fd351ba219d9a8f1558da4f309aab4c9587394e18e6d5b
SHA51252e0ff6f15b83016d432e7501cee2af62114c62d24dfe560f265ad4d4e4f1b9f6ee25922a80216f010754623d4ec0f0b1ff5315b2b09709676a509aedaa1160b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d61013214ecd9ce9327333e5c308688
SHA1376010c3c0c0e83661a6daf661e8e240c5b919ce
SHA25694f7cba1f271b79588ec7b645d9529f02db04ccd0661d56a3c5875c1ef95d5aa
SHA5125c9e7d4852d7bb281da0a75c9f2b7bc80d20e3f00e49e47230f37c6f55f7810149a3f0b8fb599e66ed9afbbff9e0e5283d2027a933668a10482422f35f6ec85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d3e483228936f7f1b6a8f53eacd99bf
SHA1fe908ffad7c848b58faaacc85a85c3745b5d538f
SHA25697a987dc0805d1d53c5095b554c13b3bd49e4b84188f20c581cb3ed1a7a9963c
SHA512febb49fbc2724746e656120634721d69ab4adf5a5e1800a5495ae310eeeb950a9b8ad95d90de9c93ab5a76414cf1cfca4657e8e501cfd064f8688c036342b8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5790d119c13b2454ada4f994e426a93ad
SHA1dc58d2adbc4f929df5b920cf8bfee307488f017d
SHA256fff919cfd55547d74a6008a1b2f851c706f82e3d776922a6353c1d64619691c0
SHA512ddcb8cd1453f70092634e4cf52b3e159007919b51f751cd6963d51da70940bf43d494d466b41de99753453ce4ae6b6dc012001ddf113974ea6b28b195f5ab649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546fd54f54f79e281d1ec5286be34ede4
SHA14c4e3cc9eea3b5c4f1ca0b7bf387cb484f5e8041
SHA2565ec88d7ba7b030c3a9c2709ebbbd8b8cc9f73eeeb7653f30dc03cee81d688c7e
SHA512b5b9c7e9692ffaa45b629fde682d83562a5b5f3c417986fcbf1ed8e57994da4a66d752571655b6cf3d7b82d23b83fc2ab644edd1b231d37e56aa3e2f5312a52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54732b281f8c7ca6a6efd051f9686980e
SHA10416d4804b6ce21875ac4bcfbae43143f2cc508a
SHA25688d31a2db6a17e6960997e4bc11630d57f1f8f3c077b2c7cb129af30450ff44a
SHA512f3844985c7344f2561e55c8a99084516b327eafba865e73e61aab8f7f04fab17e71ddb9815723d1d16e11975f13642504cac7b6bd02cdace5e00aab6b03ea612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd0182f87ef87508e0ee3dd0ff18b610
SHA1ddfe4547cea1281d76c26b9773f4c04f838ce78b
SHA2569db8d37bdec8b20122263e943f799d51229a30a66db93665cb069490437f904c
SHA5126284d55f8b8337ee80431fbafac276d67ed0f71b37b9ac2ca4ba5547ce5e10d8074bed9f40550dcb964158526decd58c5d19821dad37236516a98ed11868e892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a7dfc9de7f27636db458d53ccfd9668
SHA1bf34682ef87a40da4b5db2b334839753b71facee
SHA2567175f5fe8b3e1e52692f6f676194b862a0b155f7e87a9a4174f76d1c913905d6
SHA51234c1d7804ac934547ece82a93afe2f2cb8dc14a36cf64a7635ca15b186077b844be9d2c0d4960f6e0aed20501ce13b57c7f055b1067e539f280f6aa3440a4b0b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06