Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
1ff29658871a4f46b96b8b031929ae62.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ff29658871a4f46b96b8b031929ae62.html
Resource
win10v2004-20231222-en
General
-
Target
1ff29658871a4f46b96b8b031929ae62.html
-
Size
40KB
-
MD5
1ff29658871a4f46b96b8b031929ae62
-
SHA1
865482bd1c7c5e6cadc3a91738d532186613ac3f
-
SHA256
9630369002e03aee43ed5b4d657916a96a5117696204d360a75d51fcf7f0e214
-
SHA512
6501ec6a87c8b28ba3e5b9313654fcbc2fdca89bc8897e7f7fcaa8c1f5401d1b377fc4828ab9d72f679bad5e88ffd49bea8d6e4f902cca212d79b38e25931d94
-
SSDEEP
768:E+WKsjU5DdYZTUXJ7NU7a87NfH1Myfq2TNUocoplTjR56zd1WC8RfqdXHKh4rF9T:ER5g5gIm1MRRoplTl56zTW3fqVHcO0+f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f69cc3483fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410560300" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E739C881-AB3B-11EE-B377-EEC5CD00071E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000005252feca773688f9b53210008990e0f2a78b9917616b376f21d20da577f283e7000000000e8000000002000020000000eed07020d3a0a7ea3ab20d001b0141c645733fe85728c51e6eceed88eceb05e52000000047b922c5ef6bbb2fb7b78d23edf4567ad69d640fbf43ada6be41bcaeb7c27ac6400000000e22b125337e2da8873da4e8520b78f75376656bea9f70540390fb6115e6f39de420ab814d5f1fa752f3d5a1345549fa0b27e0a13d144fab44e2d93f4a09f698 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1936 1696 iexplore.exe 28 PID 1696 wrote to memory of 1936 1696 iexplore.exe 28 PID 1696 wrote to memory of 1936 1696 iexplore.exe 28 PID 1696 wrote to memory of 1936 1696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1ff29658871a4f46b96b8b031929ae62.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d677f9604aa6becfa1421511601b7698
SHA1cc0ea62eeecc35f0dea5d8e3751da5936a62c53e
SHA256e92e3f33d199c7a3a18e18a1178996362d6123a579024089fb0fcdae74813568
SHA5120464c1f4a1a0ed58492090eb1caad263b7f45d9a8b64b8f2d1deea46cbdb7b72cb5c4fb637dca29a3b31783c3c2e26df8e43df5dd82ba12c70ee736b09a326fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0c8c4bd7a8a7a02af80bd25e15bbb3
SHA1292281efda334331b8073ab0949be5e8200fdfd0
SHA256e92e2274f13f2d73eef3e3bffc5f138d87aa3953c73c50cb3c612e8933ee4056
SHA512ee8966f5b944e252858b98911acaff2309f9de5eca5993f0e05ea8e43509ee874787dcbf6cf6c06c8a121d2d9690a0529c14a6bf6f70006295ceebbf9cf48e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cdb06dfb32f9d81913bbfdc7c12f2b7
SHA1edd2fb7bf79063d44bf28fa93256bfe988761943
SHA25672f7a06c9fe3a7847f287a65c02e1962353d1b6c68903b57b5384ceb9e98a69a
SHA512da869047541abde6e043eacac5305e5ba73ff40b27e5b9f4d187011804a98c7399320a4e45027af8d1f55f25763a3b4d3e29e627f7c3721e1d65fca9080e31ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce531760715d58d905891b949cc3a2f2
SHA160482c860244fb31ec265e4c3caecab657e998a8
SHA25677088bddef7e84d716ba276db9e8162db72bc7ee67213a6cf38c978e876c83d5
SHA5121a7e740e6e5c7e544e7d70fbfd929ccec13324f2ba54639c203cefa08720bb89d4f1386bbedcf61b7b134e21692a48014c4f540da5402fed8510c712ee823ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5598c75557766f371739bd01a080d9352
SHA1a170ffe03d0a812c4be9c0d18df5ee53c4760530
SHA256c88ef7dd95fc471e28ada8d270dda6fcdd52f671878ae8cdbb960f367f771436
SHA512d6ddceb8144e538b6343233213b62ea338b54eee79f0581268760b2f09b4574d5c775299e69db5e11ebd3942ceaa0b963ee111a9a532cb9992c69d4b3817bee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c656e1a65210c0f933f464e39e91f2
SHA1c8cb252cce87dae00c579f57d325d53cba965432
SHA2563300d4fd75da0a39c19a8e1aca2faf496afc828dac4b174a44debe1ba4527de3
SHA512ae9f6fd402d3ed6d00a2b60c02e8ac5a2a2507e2d8ee0fcfd7784d74a984fc858f87c98719d9ac799f534d82d6fe9af625d0245f85dbb94b4f797a428cd1233f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f119e43aef6403158257bf733b82d19
SHA133be3e1f33c2fdc857178d781434515798a338bf
SHA256b430ee0a12a3f1189255e401240cab399dd4de9b0b8d43b442851b368a8c9f23
SHA51208df37070841e44039c2423432d011f6830014abf51164b91ac3c951124756ea214f97f989029675a50c121e2b7cb7ff6410d17a1849419c8939175fe50d3462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b38e973ab96b344f8472a395ca6be6e
SHA102042e27de3191013e9d11901238b16994562354
SHA256ce5e13abecd8f4f0d23182767959b178966e6c3ca16ff56c373b4d530e8b4059
SHA512c0425e9cec0d98b91b43e1407d6b6e98cf3e9d23dbe2bb618c5887ae84055d28bc3fe3ac617c41a325f4c1f7818d9cae0c97fc3cefea5906510b8fe467b63172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bafab6516b64f2ada060ddbeab2fa46
SHA1d5b01a8222bd05205fa876b43740add63e49e8bd
SHA256173c75de3f8b93f0dde1683894ae4b7bcdc398b4aacfe3f207f488a465b79b98
SHA5120cd82db63e8c6182c1a8212b761b9b65f50996f3bc20f170426292b9968033c6e472d8f6ffa07396fd0abdef96e67a9a91620f4db0d386bbcf6df48325b56a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f0f3376618f569cf28a5fa2aea35d4
SHA11c84dc074bd3b8bf2cdc37ccd012ea648ffdffa4
SHA25601542cdef7acea02eea9e8e69e524d9311f0a2f5c4c45dffbe15cd46f2a839ad
SHA5126a130232f9c09413feda82c2a86e50396a466ff278604cbe2619945d56966b529ebe59d2e0f22ee35f7c686083deb0db0b57d83ca7f3648fa1ba49f630982285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533cb6fd537c453bd67300266db59898d
SHA1ad8cd5a74b435439c030c8b5f748cddf3dee04cb
SHA256fabe32b5a330bc741e16a0b7a22b5d68b45f1984dbdf2124d9a752ea68172d00
SHA512211012abd1487335d1a83e7b821c76ba81488302f2c58fd0f4b931062fddcfe12fb1c49a0f0a1f34cb50bed7e6fd23cc0ed6881d562c294150648ddb85d1826c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5491207d9bceb1c888c16ef1b15947720
SHA1f1f8de5a21a576eebfffef07376f42b00e6ba688
SHA256d57c6ea7ea31c166247a689c6c1f3912c28756968aa16c7d6137c7d80e3bddc9
SHA512ed266dfc20293dd876f8ef924635463c8471d255f023da1eb6b911d26fd60f09e4879ef763723e1c77fd3fa1890151387952d7c1558d1f8fe437910cee15ce61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8056b43955c5687e63076eb52c1a0b8
SHA16632861bf0d175b36b2d12b734d5bec6b0ebdbfe
SHA256e8cfd5706b7eb9cb2de32f972ee083f3a6a915d81d0473e954de6ee0aa915452
SHA51260544a6cdfc0ceaeaae9b3a24dc8a151714650a5af6ab540dfc56b3205d366199db6521b7fd503b36ca0a3b684a06917952ecfc992d2c461e6ba8c4df0b93711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb6fb162dd4cf7278c1cfaf4384d50c7
SHA19ed777c88baf304ca553db83cc4b44e7ec6dd61e
SHA25697558bd1825bf1d0e2dd74e0995d9690b964b48769fe6f30dbca41a1a6487f02
SHA5120f0924ca4878ae3879a4fbaaf0511bea8ece6007611339b40787c0bbc2c4ff356c81c8748cea4cae3dc51aab8fcb9ea9c80cf79bcde4040c990f368fa4619852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d618aa0e6a91497d3cee58bfdfff882
SHA13aaa01e8fd1386a50690ac7a7022ebbdfe3666a8
SHA256bad97765b4fe4a60df4136c7f8f2d448d2777e550c566698e6bd16d8230bdfbf
SHA5121a85e05a600c96df8bd7d1f6fddcff2188457a0eae42dde9fa8665b0dc593177f9b0f9967d855b3d152d1f880ee77d8d648a1c1f414edc52249bc8e260ac520a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eab46e37b7eb8dfa1f387536b000f14
SHA19e56d8e924f3daaef9aa50f48aadc8dceb7805f1
SHA256d4d1f3ceaad18bd41c2686ea62fbb6f50a7ed4783943b8accf593da92f55cee7
SHA5126d1f9253a98dbd994fe1b85963ad26b55f0378ac18f7e280c36514682cb70d79e410e1758b31dbe7c38bf86b00aa080b00927e84da0bc6c0ac2fae6a5ff421be
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U1J1BPYJ\cb=gapi[3].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06