Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
ATT94636.htm
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ATT94636.htm
Resource
win10v2004-20231215-en
General
-
Target
ATT94636.htm
-
Size
3KB
-
MD5
50c0d444dde257d27f26557fcd781206
-
SHA1
377ec17d53a1aa9c08b53ad9121c04cf3940bbf2
-
SHA256
b08fe3886edd78dcf1ede2110da9ebee76fd98efb2590b385711b4ec1962cc27
-
SHA512
33f4a431669ba16853af9cb7390ebdf12515ebc1b699ab0380526bce825085e55b0a5168babfa902614d134111deb1cca9f3b0b18a04939aeac14a963dff65f5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008f5bb2863cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410257059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDF2CC51-A879-11EE-BE92-46FC6C3D459E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000b451efe07abf2b3b2fc8323d941dc3a6dad42d10939565c3fc75d165441fcf32000000000e8000000002000020000000c98aba0c181505ff1c82f8e808090444ae0072563142ea440952c0029129b76f20000000121c9ee9b7d4e60e2d92867332c5dcb86d1a90db1637ca86727af4518b6fd69940000000af7dc9a404fe5c3116cebb7e733667c55360e8661ca1878c72aa7eef91cf496c340cb01c5202d58b586edb7da566384459b41a4c4fac7b3c718cfbcf61895d67 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2384 2176 iexplore.exe 17 PID 2176 wrote to memory of 2384 2176 iexplore.exe 17 PID 2176 wrote to memory of 2384 2176 iexplore.exe 17 PID 2176 wrote to memory of 2384 2176 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ATT94636.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51c6d72c111145626a325b5208e7baa56
SHA1696183f78fbb85c187852748a91988e5d6c6e521
SHA2564deeca836012078fe57b419692823007b9c668f759c49b6bb0faf05846c04f2e
SHA512c9e62e4276f7b0ec3e48003806bb0ae2142b106a7c6c17cfd63bacd0c9e08e046b4582f8e2aa3a14443713ca1ef3afb2a140c23a09c23b48278d935544d5a785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f131cf8a5f5472c42d3025e3e00f58ec
SHA17cd2e1a6f8ce4e5ba88f2ac0086a0eaf5fb1715e
SHA256ff5221029db352029a7f90ebf1c3c7c43f5bfb5b4deb8419c6d4c42a57480814
SHA512d6e1a22531bc718a4adf1b77d98c3f55e7948d33552ac2ce8478befda167d39ecc31ba413aed6eba82ffcdfcac3bd23e17e0588377ae60e9711aed8f69b56d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d0e466269f95ed38f9204c4df31aea6
SHA16cdf189caebb22358b17c79dd4f110f78e65b224
SHA2568d44f0e050fc73257b58c6c0e0dd5fab4cdbc0a79270beca92c4323a10e652de
SHA5121d2653dd99c5547fabdf476f3348f42b70a4dc8603aa5e70f641e4050e79a9bb68d5610ce99dec131e9ca64196a96fce1328d3699023d3da4683066347af160b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0ee0edd0cd5105f6666be7ff94d1c22
SHA1ec668130b9da610993bc40dd52ac46bb445064d6
SHA2565baed1611444082eec76b51e87047cb50934e7acf10e4847993441323f37f187
SHA5125457fef371b84fe2245aadc706b7037c972633977f378eda72121005b0cff7f41a7873bee60288dbd2852141a1bc42ecad7170793074d9c3ee01ef9243665331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fad43abfcf1576056ebd5a657620448
SHA16dddf5d89524f0f741199efd6804115d9a62ec86
SHA256569d807696d6c761803950d87bed8ae0fd289c054cd857a77c6a4bc382ab0979
SHA5127220f587c73548921ea4b2473bd269c1fca80714834d50704ad0682d4db598e97c91d36e5cfb36506edcd26c2de481a1604a195cf8e705cb77b9600c99f167b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5766288e585aa8f078b5871b6cea89249
SHA1ceec21ff3e8f06b319b9b77a5030201fdc157b99
SHA2565e4a2e1542cf93c34905aae4b313942177d7312de56072056b8f4aaf7d680eb6
SHA512fe9edd903c8d9ed17fb906764254609e775c6580b98927bd82a4321ae9ac8493a799162a4367bb879ac07c11de96b50be283ff18e5645a9a301bd1ebb4291d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54f2416245cd73f1a1d598fdb35ee46f0
SHA1e7492476ab051c18cec55074d8b58e4d112eb9ec
SHA256e2ca8ee31efacca33110bc18182a8f6f36d6b9471ee3b5d52864bbcb21311402
SHA512e1c56e80b464fc6195c450c4057c0e10a039b564041e28ea36e31eba9714fc1bf6011942a27e35cad39fba5e6a96aac52e9bc03cbcddd570195552daf3a7390e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e