Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
0d1d8f15509b28a5b0574909160e82fe.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d1d8f15509b28a5b0574909160e82fe.html
Resource
win10v2004-20231222-en
General
-
Target
0d1d8f15509b28a5b0574909160e82fe.html
-
Size
123KB
-
MD5
0d1d8f15509b28a5b0574909160e82fe
-
SHA1
5e84f55ac1e5164a965b8f170488c4cd2f25b607
-
SHA256
a45d5ba6e646c258fcc1db6e9b938c3e9f16400b2d74597ea0fcbf38178862cb
-
SHA512
c0457d59d2c840b6eaae35536b1e5756a884b598ed12ed7b108a38060118b1c534ab97efa6adb346e620ce7de1e1db9abb4e492ac12f7e13689afe0bc2543842
-
SSDEEP
1536:S0K1DpMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9w:S0K1eyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410126468" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D203C651-A749-11EE-8383-46FAA8558A22} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703736e6563bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000032d4983e81d062457967fec68487fb2e555cb2e467a07b461e6af6c0f16a3791000000000e8000000002000020000000266177894bc13007642608c6f53a1c3be6f49fcb6f192810b4e4410de7c069042000000066adb45fb3f370d8ecd1c91712749af8a2c7028c7e9b18cfe32c9df6228d6546400000002e09ec66c48bb04291169dd0642c22e64dab7932cfcf02dfb1096dca276823a71764fc426cceb2762087a93acdf8ee2edc5c7c4a13539edc69b92d8e999a259b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2000 2020 iexplore.exe 28 PID 2020 wrote to memory of 2000 2020 iexplore.exe 28 PID 2020 wrote to memory of 2000 2020 iexplore.exe 28 PID 2020 wrote to memory of 2000 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d1d8f15509b28a5b0574909160e82fe.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f7c301cb0fabe58cbc566d455ba0f4e
SHA1fdf6ec9518e29b95e3ecf057628737275d343028
SHA2561b312a3bbc17f6c8b909c9e20cc2128fa59d68651a44f4338c2c4f5a36216b6a
SHA5123dcbc9502d61ba1310beaa6bdf34a02a3a1f383acf226399fe61d57c545cb0eeea487bd3b5af7cc330f017677330cd138c9152d8af5ea8b6506e2371786d31d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d3de8caa7943cd9eb4ab97cbca785fb
SHA1ab11df23517f0adb3a89791d9b98986dc1fb816f
SHA2560e7293dd4bcd2e7d6fdb6d33fd87c8dd7c0e3f975f4e1dbddd725112d12e316b
SHA5125ca76a60c2ec02ba4ecd527c4583dd5cd65eb4c73b3c42cae2c74558e1f3e0600c13e3850638fddeed3ca8b2853b6901f263ffb45299280843a905339825efe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ed358db68571763a9f46c38c989fc42
SHA1c06dafd48c7df90123dfa27e9117e66e1b1ad9ef
SHA2565ac5edec7c4bee97fb1e182142327eb0327c22e311896e82d6d6a02bf4bac3e3
SHA512dc167c419f01b182f92296e1bdc3bad297767fbab822244b4dd32d57aff0f7f2f74024a0c19e59dce15a4269cdf3422174a65275f092d7e72e46d43b2462d689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d44004bd7a35ed698a4ede96f6078e05
SHA1bf21c223f0b5d0e296b8fef73161eab86c7adf22
SHA256075396cf73619ff8a5f6be21ec008d27b25f275bc5590a7bcea51c56dfc83ed5
SHA5127f3d2c4039cf9477e010727b811a5bcee8242b4c8344cc40dd8096e07e968b9ab1588b77edfd1681a380c7964e3f8df7210c2acb137529b71407815e75553b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d638d4a5518c90352bc4753fad98475
SHA1b1b3a53a9037f2ab63a60d9c8f10efa7d1af0f0b
SHA256f5ab793f11d34186e5f226748b5c4adcccfe578c713c9329620023aca492d04f
SHA51228ebecc70a284afd13c2f18e376d29b1b1ce15ce6cf5699b03662cfa035040acb0dd500e1197cd5849fd118c582adc64652d9405ee65be8d68e78ffaf818ac86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b481a24ba535e942e62f2b374ad803fd
SHA19c93a66e9cb29b5a5496ff12fb1304dcfae4f67b
SHA256a27ce36eb61a2aac387f0d75874f18b5b9c105810c3f97cad8d4f5545ad69252
SHA5123b47f50a646fd2cce3281074df003bb10f1b2873b7d697600ed7d86a18e9653759881a41be62eaf199f5ecbb797ded1059a3934eb52b50b527724e564e79c7db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06