Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
0c3998047e9ccc90b7606b754029c289.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c3998047e9ccc90b7606b754029c289.html
Resource
win10v2004-20231215-en
General
-
Target
0c3998047e9ccc90b7606b754029c289.html
-
Size
2KB
-
MD5
0c3998047e9ccc90b7606b754029c289
-
SHA1
967e8c572ed78f78191af0ad0f78ff51d7607cfa
-
SHA256
274584e338e3bf61d716d59d8a4987418c36176be1eb7fe6d39355144a635dc0
-
SHA512
fb2308ddaa66d1fbc7574eeec7082bec773c32953e613a65d87e8bb8e72241b0eabf32457cf2447c1b99f330c4cc43b05a709bb5767d3916c284e18e91f24870
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000577c9c0ab3bf752b550d47daf0e484ca9782385c73cef60f80060653ed4f20a7000000000e8000000002000020000000ffe7822dc0aa19a55cfd71cceca1e85f10c2314328cec59343b30e2b33b12981200000005b29a68af84cbd46074e3733d0022e181df627a60061c1542cfd61079bc514c94000000087ee9eb8287b1b30e0eee06c488cca6149ebc227241ee5b64cbcaf01360c3e5149d6e819507c7f3f167e0e7718f14b823a40bb2a7bef8ddd82844ce54fdd86e9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410120029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0065a0a5473bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0E943D1-A73A-11EE-9240-46FAA8558A22} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2324 1984 iexplore.exe 28 PID 1984 wrote to memory of 2324 1984 iexplore.exe 28 PID 1984 wrote to memory of 2324 1984 iexplore.exe 28 PID 1984 wrote to memory of 2324 1984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c3998047e9ccc90b7606b754029c289.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af33dba580a2fe877b22404ef5f2ee2
SHA1fb3003b0220cd74dc415143bee3a6a24654b6c6d
SHA256e940f499ae5d0f5fd5c0506c712f28e63337ca5b047d0cc6bf38fb42bdded8e1
SHA512a1e3b63406c2052ef39930161a3ffe354f66e3be887c7602bb6841f06d585856eaebfa5ac14ab4b05be3fbd1760360fbdc89b248dd5bb2089f2d9afd2c428260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550aad42a4e2d5cce85a581877394b6ec
SHA1755c00cfdc10d1ba57f7106c9ecfdd5e75ef68d1
SHA256d37061d4cf86489a308813b36d495d7e347d5015c38fe01b9692916d343f1cf4
SHA512ff168829de5f9a7076bd5362bedb4b941ac7b2dbb88c6f0dd101bb33ba85ad58f601dc580d9dbda6fc99a2eb97f89e9d9a8cc8b0785f89dcacd8768b8a82a201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d90de25758e93cb65f08b85c6ed8747a
SHA1949f5f78c709fb6422079cb8499223b3cfff884e
SHA256f3da9f06707e84f5503780ae88e1e5bf249599b3ab5d6926b5186f2b4698c373
SHA5121f12490caa4c07d8cc240425a10af1c5ce486dd0ecc0db91243f0364992c5043923974296afff0a0b063c6ec4a2379fbf99f6781007def1724e2bc48667bf4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bdca8f8f5c227f886e9ec315ccb2ae4
SHA1971fca7c23b40eb273b7d90cba39a42a11aec389
SHA2560ecb1662fc03a82e4432d2b287aafa99003f795f595012d756c0d435ec7300d4
SHA51254e34f2f707b5926859c0c3f85f798f0fae1ec2f34d8800bad6ffbc8f6e1faba43253cc1c57955e99ed8993c264216cbee15d5944895443b753e80e41a30d35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54222afcbf12e0d7fd92c86834efe241e
SHA1c1b516df773c5ac430c23012364f73ee17f56868
SHA25606aebf3c386d77938374e49e1bc18051433dab087ab973dd5b1af3a29c9d5ef2
SHA512d2ab6cfcc3047a0a736463e94cb3e9077630368fd30ff8496dcd935177ff79ffba167ddc7245634ffc248036f8234bdafa5d64a001d358a8314e0bff1a6ee21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d33c0a554e8646da5954f1ea3a5901f
SHA1c36f4f31eae84f6b423aca0c50c8e10dd4a43476
SHA2567cb81955be2766dfb76a669e3a1b8073529360ed9d82cfe6663f591e1685610a
SHA512d56c349e10e34ac891bbc5cbf83834203800affed9c59b2dfc71c02541a4417ff8304ac43e925b6fc710e3669ab5fed784b8aa38c9c47e249426bbb74c139ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5145f82ace4fe6ba30565426d5a07e413
SHA10c90e3b3304fd4abdaf37685e0e537a9b0c9b373
SHA2563238583e95ae274032608151554950b18f35f7f35e82d82b45e0ea8698a64eed
SHA512655a03d4bef9532506ea2f2861d0d40f9c575b79482ccc5a25b1bd8175f6067466fd601c5217c685d4b473879fd3da50b20a4004c0614ebb285d31720e261873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ddeb9efb47b0dacdfa7318cf4a396c
SHA111584a7d1fd3929441e93823469ee6bf0bc82480
SHA25611c7c5f4f5a53596ad418935603fee036e6f041d14c8d54a29b15155e3f8e949
SHA512e57cf10a5439dcdd086415f46d5e71235bcb7ffa99b6f315619ec9126d4b1eb2ad0688dc88d21aba88abafe0d4cb4057c73b10871dda90f3f830ff4ec3e7460f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a41d5b51e8ad1274a4d28db848035bba
SHA1fbf2f66926f14467e9deb4df1e33da5176d8c1ec
SHA256685050faba89f242f345541823c3ed3e75801cb830b82da19637caf96cec74d3
SHA512aabfa18ce9f98f6d584bce192a5523e8a3031d538e6c17f59d8326646b11cf42fffa2d1fdfb79017750cef2275fd956849497a190560b35b4ad1fbb12c45add5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d5fd2f20bacbc592738402caec1863
SHA1d05128f9ab99f4b774928c812d411d71adb6d363
SHA25619664ff889e11f06e7d8a2e584dba84572a227ede13e21438a04524bd03f92c8
SHA512ca556e694c78424fda1910c25890d1cbe149b94dd118646d32f61ed36a449cecd1e4858ed4df984ee61ef44c866a56ed849382e7d1a2d1f1f0dfe35838ad7ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbb7a767c5a5c11df0b082da2370e939
SHA1ce32cc65b5b011ea4ef40d66cffec58899aaf468
SHA256e801882d3166c87b382bec014a8f735834fe9c6625de623f373264c752805910
SHA512e6b14b9e9fd00e7a542ac5cfc35e557fee6e721f1fc022c2ad227b0d0f0b6d12bd92f60d7fc1c7afd240f7022c8900f44d9d1d88388c491095c609033cfcd8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5466f1ce98fc148cae1890d08801c45bc
SHA152885110234cc4b1a57522d78119d0e6b93343b8
SHA2562ba1214a1b8b25ec9dd1164aa6520823a377860552954864ad24f63f0736438d
SHA512e794b0fcfbf5227dce59c557739f80a1cd9f139ed502222bc3f410cff796e768a26d1f626595fbe61e43bd886c74af979069250e67a3bea6d3522463cace0d8e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06