Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
0b568ce14e9edc7d139cbebd88213f37.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b568ce14e9edc7d139cbebd88213f37.html
Resource
win10v2004-20231215-en
General
-
Target
0b568ce14e9edc7d139cbebd88213f37.html
-
Size
2KB
-
MD5
0b568ce14e9edc7d139cbebd88213f37
-
SHA1
4df7fdbb9fef0507f469224dfe85d4297290d3f0
-
SHA256
2a373b3ae2024286904816cc3b2daee5136bd4fdcc9b3768ccdd1f029ecb520c
-
SHA512
5b9094df08a28b16baae86a0a2427bf9c396bc1ad1395545258900eb860eb42d37d94bb55c619ad370749d34bb2a13aa762a3c94578fad0ce2e5bf40c5e1550b
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9BAB771-A72B-11EE-9201-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410113546" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000158d7025fc1bcded5e00038c3a73f89895e6cb0b2a746098bdfd9b01894e86ab000000000e8000000002000020000000e72a6c37e4f508697ad5bba1d91b5e89b2dce64eda7136e4abb4a24532cf82f320000000928dc0c0694aa4e7007b4265c2461895c921f3d1822b0e100d613218b30f098b400000000d85007544b533a7be04da3aa00322b06c4a0e5a911f6ba3601483ca420acc3c0f4833751cdeb805664650c11c6f0d79d504234050700570dff173786014d7fc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30af748e383bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1308 iexplore.exe 1308 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2444 1308 iexplore.exe 28 PID 1308 wrote to memory of 2444 1308 iexplore.exe 28 PID 1308 wrote to memory of 2444 1308 iexplore.exe 28 PID 1308 wrote to memory of 2444 1308 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b568ce14e9edc7d139cbebd88213f37.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551481d885055b64fc1cebc68af113519
SHA1ce4e16b27bbcb6e9fb0f0439a723b3721992dc3f
SHA2566f41b42ccd0e8806d42d5a00192bd8e96cc25479b1048bea4141254a44960f53
SHA512a68aa81befcb2a3339d39d84d5c556ea1d5a2214b52270af4bdcd0b991b0395fbc5c7ada2e6756d3e856e2d7e6c6aef2801fc405492da88a1a5b2405ffdd3f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecea59099a5cd6edae6d3b70571c7b4f
SHA1d8276b2f2b73113e2099e426f1fe2a5f19ab811e
SHA256f9f5cfa127ada74ca4e5b193cc2870c8860fc9eb3ba60018139f778dcd89112d
SHA512715fd76d557e1a0deca06675a4d9ca1505791571f35f55d00729fc2ff65a1a1fbaa59d895d810c9207853a9cb39c7fb95dc2ec113b8037cd615d3001bee8dbfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b42ed45898b1017266ac1975aaad1eb
SHA189414d04982eb794bae19cc1772333c1cb65c210
SHA256fe264d614dfe1caa681c42fc79a05de379e9db126ded03074e9f95b405ac821a
SHA512954c03142754c2c25556c1109d695be9655f136a97048fea54c9a2f33ccafb411ea405c9853f5f07e606f0c875b36e2f552379bcf215178cd86845d80318f363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588b5f8932bb190cecd2b4176621cbeab
SHA184125f4a32cafb0553604874b83d8e83a1a26464
SHA2564a07efa2f901eb23b5a20d75052e8f35d7c6867b924f871369bc6ccd743f5b3c
SHA512cdaec652056a1358a81148a438d68cc6ab7e8fc5f3dc8e301ee40217f93714b8160f2f4579424296b0a2e48bb4b0a3fcb4bcae5a4dacf8e02d4a8b0eb9a0b368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5944373386ffd69c670c00c5542c7e15c
SHA15a98b78577bdf41cf6ebf9fce2cea481f7ff7657
SHA256e5cabe00a5b1e0bc11ca4484989d7d2228e18f7651b707ded1f85e233d3151ca
SHA51231d172371ad39a90038d540850c087fbb823744cf27f7cf67352c275f43e93ef2f4cc397ac17f6a1259477c6d45abfacd437ab25b77a2b4b2cf5e3cccaa38649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1b5971d4abbf255cb99acb08f4eaec4
SHA14c9b6cc7107a2a8e78c8998fea4f8125a5a180a0
SHA2562aff8c784c84766e89e66ef63e3ea9d0d898344276a5d8adcdbc6a1a4f1a4b8e
SHA5123ffb949a2feb2d965572654746212f3f3d2bba7bb2e0c10259623356b287744b18d36e4b94662e15b704085fd22aa87c4a5ddaf0f740856e23b364fba2502d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51995da227d88e424f0aadf3e48fb9e5f
SHA16f76b97fa8accd811813b7c0fe25a6bec553a1c8
SHA256907c775ec6fe713f1dc2ae93e5b5502e40f7bbc48e6108ef5ea893014c28e894
SHA51283a52ad9ededacd540506ca4eeee5a938fd6a0cfd8222d6174e85f3cbe1af7de87f7b9487e81311a0325242a8470fe4a6e498a89236ae11b8d10a9b60df93632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5327384ce836cb694cb796c58b73d60cf
SHA12d363b0de4be2fda780a89ba71e65c0e068b74da
SHA25619f2efad0f50738da74409dc543d2c929b17e32541b8828820c2c274d2d55a83
SHA512ab8e94b53c41286495bd6628170d80455b0ada16732a0301e3efb1bf6e78868d1ee78ed907ee23f83065defadd98f8f18a6d3394988c93d06ac4ef749949062d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba1585c2916af1b85cf4f05af64a83c
SHA1723907950abc7e1142670ef3497c67d2ba1fc2e2
SHA2563c22c2a0b419358da7f4709865b4b4668c8706ea5839a616a85b0f424df63b06
SHA512981274390e7926270c099dbe4d6e005994c7d03437a925e69825adc1c58baad0654c00531075c55f4552250a6af803563b67e0436512d15c2558ff7f73a40be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e36e73e57122b33933d8e9a013cef3
SHA18a00f43880e050cab619c30545121c31a42ad203
SHA2560da5c3dc9492439bfb0aa544ace203ffb60e6c9e6a30ade2336e3d17889a935a
SHA51292b8019b0261e6877b4ebe24a65390777f2611f8de5ff124a9cd1852ef2830260073086789c5e97299df238352f615deb5d4685ab030c3f8f948e2a1ef3b5950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f6527ca1f9288f0e4f00a631472e319
SHA11453db80e206e8e5d9e8da260534ba4cf6302a4d
SHA256e1a3a87cc3f4f6f58811d63dec6252f3cfdffbae6d893bcdb345048cd3668a30
SHA5127ae8f1f0d95dd96795ea6c4631c3aef1ddb6422e5db8110a7e18ae131da0629139ff78af35d78c50492194b092702ae3873e3f46d532fe7afda8a4a720eac09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5921dee863f06eba61064258765596602
SHA1b0a37ef620e6696fa066e9d7cbbae861a749c41a
SHA256ff484a35ecb1d6fb0c0f695606d9aaccd41aaee262977ea4d2f08c00f30d33b2
SHA512328ab4a4d50754e0973ca5f60ee9ed5ecb9bb12746b7990b0760fb05fba3bb301b1f5a1a91b111d5ef3cc3ff481578c38cbe55b4a84377a3d0264ccea5ebcfaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c958fe99beb49d181bd9390dbed221e4
SHA10983caf12197707b8c859814205ff74ad6ddb5f5
SHA256f2129147b154ef64740ed1ac2baa5f613cd31561b6fb4d9297ab04e3a5f481d2
SHA512be126f3a85c363237fbd08f99fe9ab1b67d65c49dfc833c918eacc51936a75baf66ed6ed32b5645112b26df6cc1e751066813eea9bb34aaaea99723ee2590292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544a0cb3c33eb36b983898d20aa121311
SHA185e5fcb2977e19ad2589f17d3f6866cfed719cb1
SHA25619fb15207152aed77924b274020ffb5713d47576452dc8582070b9bb32298b48
SHA512e2297d781c6920830ec2bc8db2b14c21e7f35c0b6ed8258346a5ebf9f2d1fc1051012acf59a7e6dbabb58b9cb2b52e522b559051c684dd3e11a517ff9c55f184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5000615f68b2fdee8c7fcd2d56c682f6f
SHA1b8a4cf77ace09dd1d08b942a33336c190369ae78
SHA25688d0ec01d43ed27fc9208a75861bf023b81c26e811e49e89d65b03c403a18172
SHA51236ab91faae26959439cbddc7ffa27e3c0b556afaa2307fc2f910c06349cee2a45e658ffd9c5e0e65d2f65219dc957701feec729f904af63e6b543b64f4e54652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a74d95ae4b6d1225a0cb562d69b262f5
SHA1eb7bd0516da6746e3f2b4c620f3ca2e783f98045
SHA256a6ec9abd04b1b25b22628969b705275395cf1dc1ec7c791355aa90f7ddb2310e
SHA512797b1dc2065efaee8575c70dbd880edc2d4fc0adb722c8987de1aa9d0cfca1aa92fce0879c4bfd9b8d7012aa08a347fbb67803b8e970a7c12bac4330dfd1ae01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d3ffde0d191a607def07a8d8a1ca34
SHA13f5aa8870132e598189986312fce3a1011c1cfe5
SHA256e1a105037497efbb7f184437b01cba40b00ede220b9ea4ac7b5ee1890ab02eea
SHA51287682efa64524824d18c6ec27dfed30bd52cc01883f10cab26e874c8e042bf5a7d9d58c3c739903360b21603d92c03797f5c8f242d8b11edc343b10f9c780986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4f27c712ff3716c4ec5591ea47e8957
SHA15a3eb9defa7b641e11a7069cf3638364a0b26c32
SHA256c487129fddac5ef89ef2baf908e8ef04c2f239d214436085e5d41e6a0e8f9476
SHA51228f368b20fb00b160084c836179d99b0a92d02c478357b408cde26136fd55843ef69a616d669e4389b1ed4ea873429b66f29b81bedd11294fbdfabca18075ee2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06