Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
0c7adbf91df93e19412d2fa3a0707a44.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c7adbf91df93e19412d2fa3a0707a44.html
Resource
win10v2004-20231222-en
General
-
Target
0c7adbf91df93e19412d2fa3a0707a44.html
-
Size
11KB
-
MD5
0c7adbf91df93e19412d2fa3a0707a44
-
SHA1
c56be047e163334618d923600d57bffaa56d0402
-
SHA256
e45aa0262091d5e7f17097ad7ba7b9f3c8db33825c82054a0a3da2d27f82f6da
-
SHA512
9d6c2f63c27650b4fc35f8ccff944493144300750ffc0ab07f0edeb4eac7a71e03594c1a7ba089bb2d16d6d612fa8675e2e28fb29e5a73066ef5e4fd7240e633
-
SSDEEP
192:2ValIsr0r57M4IxatT8Io/w1wvqa11AuBuLbdU8d:salIcIQ4IxaVo/gg1AguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410121640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93B98521-A73E-11EE-A586-F2B23B8A8DD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2292 2096 iexplore.exe 17 PID 2096 wrote to memory of 2292 2096 iexplore.exe 17 PID 2096 wrote to memory of 2292 2096 iexplore.exe 17 PID 2096 wrote to memory of 2292 2096 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c7adbf91df93e19412d2fa3a0707a44.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac9310497d3dc5d428da2a27daf0be65
SHA1a6ce6d874c67c9e30c3f786272999c6711e7fabf
SHA2567966d68d3bb153605e89870700bb98e24a5b7b513c8a6f0d8c5c58c565c96654
SHA51256350c502a09116e1ce0b4697ab99dad354e2e496d10087585a20f4f648f10188e1cb75eb8e67b474821db58b0434c91a4a3e161b660c87b9d4b2029adfe87e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b14b0cec71397102c21b5b0e5ec0002
SHA13b5fbe20b32a723964621f9ff0b8b7e188220890
SHA256e0c77c95bbe1c902946c59c347ab1e3d93a60a4afb4a2f0a50419f36fe0b6d28
SHA5121e9939caa52bdef75e06be0cdcbaad25b3123fe19a046ec34d33ff305370f0c64a3bd46270efb5f8d7eaa06b8dc16b50f27bde34afce02327471f933cb21bee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aa341a4dc924a8379ee47e0df136a4c
SHA1ed399fa06a1c16b2ae12c181d66774197af2aeda
SHA2568dafb0543a993d503afa2ff45dd70378b57d2bfbd2659e6a7121761849ae09cf
SHA512a52d7822f430965d5564d2777796e55a4c97e4db9f5bdd602b7ea9cf9de73bd756c4050365e8e6950716c22711004f4f300d3802cfcff8fdb1535e07f398e448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde4bc0302b021128269c205ffd3b9e0
SHA1ab4bf648d17227942c07144371ea5ff0ee7badff
SHA256fc3a0c6ec5b481e31e022a1f2dff946a3cb90c7e7c5a0131848a2f7e0da33730
SHA5129d3f348061eeb3d8e324728ad6ed742982755a3bd57a14232d742190c94866ea499e6543bd7e17ab0680dd9d3d92d3fc2d6380cd7126cac56c411a32f39b0cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5606a18046d4f9b0676513d6660728cf5
SHA19a8a9ee3a3a00e27d11f011d79f1bdca8366c347
SHA256ffdae991c0a620205f54a656933634242707423b9ac86c383af6967219bfdeb1
SHA51274b755ac70747cc5b8b002c3560dcb45d7c02b4fb18132d52e98df6c794b225befec2563b25578309cf5f12bfe86870783d681c02811bf3ecc4cf50ea14016fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c587b1f9ab45adddf1f103421f806e2
SHA14445617b3553850885ff6ca987000e7f3473167a
SHA2563e1abbb0cc675d460b345f9a2a2d373ec4f4f2a8155e4e46500e4cfb2c4d6a9a
SHA512187d685a4f2c1680f7b7df28b0e1a4b309108760cb50ee26a03dfd532fc8e60c008964248fddb12b22c20e96bcc778de06373851f6f176a8963ca467fa6ce3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f8f546c1f6d69b7888e38633a96527
SHA1957df91c66375eb78a58e55d36ffbf061555818a
SHA25683cc80bcd77d74b114902601f362cff55f9c3296ad1307e5b33b567c7217ac2d
SHA512bee35306aaa7d5033e64ea4339f0b59691512d87d096164c6db94f0636a43cfd62abeb579acfdc82e33e65b8f00083cb6a8b8e40529bf78982040f5f76eda5fc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06