Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
1d35ed4c972dba814cca4d1aa7ce55f6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d35ed4c972dba814cca4d1aa7ce55f6.html
Resource
win10v2004-20231222-en
General
-
Target
1d35ed4c972dba814cca4d1aa7ce55f6.html
-
Size
37KB
-
MD5
1d35ed4c972dba814cca4d1aa7ce55f6
-
SHA1
43c6afa6de43d476bb1d50adfd1eae78bc52fa9d
-
SHA256
dd926587788195ee2b81d1a39a1c29abcba7518ec467f58613fc2245ff4e3d05
-
SHA512
badaad8957c60048efd45f9f81425599738b47ff41fba09c2d89e0f117ae0218a14d5a6721072a424f129f6fa3e8569ff88c19a26a116b6297da795eb95a0c3c
-
SSDEEP
384:oQ/IPK7zLmZCv+2H6uV/OOhXKkCnz96+OE:BLmZC5KkCnR6+n
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410253012" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70114E91-A870-11EE-9C0C-D6882E0F4692} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2196 1956 iexplore.exe 3 PID 1956 wrote to memory of 2196 1956 iexplore.exe 3 PID 1956 wrote to memory of 2196 1956 iexplore.exe 3 PID 1956 wrote to memory of 2196 1956 iexplore.exe 3
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2196
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1d35ed4c972dba814cca4d1aa7ce55f6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe4b39db92b3c9879eb050c60072637b
SHA1dafa8fd0353710a94e71bc89fa5cd840b59fc4c5
SHA256565e00afbc9bd0aa8ac1e7f318677f18c75176f4516cefc3d6b98297b8c1ad26
SHA512abe902705fe5dd2e968a204341950732b22bbe33cf975d01e0a6d8fd8be05727264b4745e1e6c35e9e4dddcfd2af1a67e3df25bacc37d0c624772fd6881933e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c47f5740eae7f3ccdf97a816b79cb8f6
SHA1c09bffeb91bd2228899787a9da9294b402ed59a8
SHA2560bff3217816b4720d83b554dbc1bf789cf70ef1a2eb004c87d363dbe7e5bae9f
SHA5129288d44916bdf7a2f603c256196964d87c9ea15137a935f188fc49b7d6db4994cb22e23647412ba3db8ffe31e21cedde7e8a51fecbdd3d8525d842b667d3a433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ace0e5c94ae8848f3118e08be0b21c8
SHA1c50f13272cdb56c644693940caebd1081be1c14e
SHA2561833a8b43e2ccebc932564d557e5f2f040cd38fba54a62bc940e90c0658a13bd
SHA512e11a3cc4ef13566a1cdf3dea16e6694b99ee0a33f8f6ff52977c4487cffbab70f103bbd793b736f85aa244007341b4b03c8c63eca5c9f48bf7d4366d85a11fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e61c993e7b66e5c7d0a148bb6dbc502
SHA15efc5d955508b0f023411a9d8fc710969a5b7d6d
SHA2569ae27f4b3afa28b52481913a5fd650f123c06d5ac39e108bb323219b9cd1c491
SHA512ce05de392377f356363546343d067b8ef643f993aa373227d201f30284ec3bbef185571616624506895f2c7ba610c962a8fbcb2360d8315feca89ff9e69a1687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564340f727bd7a4bbb273618f49e273be
SHA13c09afd1ef930982751ed7e6f92c98eeaccb35af
SHA256608ae716c7f9040e93bae9b9a708a17cdde4e2143a1a9b2a5bb6e5e01bcf8f7c
SHA5126a7c8b679d851dd38269a0c5942f2b924b34c5df8b869bb46a53f12cbe16186c005ae45e5d4b4ac611dcd8bed92292ea4eb58384453bbc49d16e00317fe5f75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b02140ef09fcc6cf0a9073e38815a4e
SHA184a4ad681b3ea2f568b49cc52b801b6646a3bbad
SHA256141453ccb68cea3b1b8b47976be81141c7f6959c08e265d149a1c5a368340827
SHA512f5e6dfb019adadc61fcb66a2af56cb29894716c073b77a483bda107f89888dcf4894b8939d20e9507d9a3cd8dc99494b0b789e74b75c470dc14ad56b5b979287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569dbdfc1dc784bd5ea037c284cf40e15
SHA16ae6b0d2f971519ebc9f32188eeb090260b62388
SHA256f6c1fa5a2db153a882fd28c747e55cd5488a21aa3bf1c88d7b6ff4b893db7dd7
SHA512cbfa2c62430b1595d74627bea8c92abf50634f66b17fbb3274587944e0a84fc0569d9cc84e7c59086105a63d688dcad852043e545b7a6b3145d9a021b39fd210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a65d6a67c9d4333e690dc753c5d70cbb
SHA1a2de361d422c24c4c4a26074b89ee1aaf114508e
SHA256236811bc79646d8ea4a22c05949db73522cf2fb0d6e7f5b770b838b4260c30c5
SHA512fb89bea9285b9891b479de28b9d6bbd95204079baafb831dceca1319be0ef24b7fae58018976ea33c93020d050a685bdc79039a044dfe685a3af069c04763c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b80ef8630ebaca434b771b737f3070f3
SHA1758bb84fde3e3f36a16cc4d5ae4ae8d9c688ab10
SHA25617322b9b6139ff168319058aeae2f883bf758592111c82f452a1cf2f997f0230
SHA5128e583be0607e189df9a6fd10382463e70de21dced2f30c4aab4dfc3dc263a2a316b6068cbdf08ab4fed6a60da6b787b23648b0be2abf0407b15062098e1856aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06