Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
0d671ed179e0ebe06c97e14fb647cf53.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d671ed179e0ebe06c97e14fb647cf53.html
Resource
win10v2004-20231215-en
General
-
Target
0d671ed179e0ebe06c97e14fb647cf53.html
-
Size
13KB
-
MD5
0d671ed179e0ebe06c97e14fb647cf53
-
SHA1
aa0ea1e7fc8a42210e8b63c43f82722d8f5b9114
-
SHA256
6f2d097bcef8bd0bcf75bc47c0896fbbad188de062619843e1297684a4540b6c
-
SHA512
037ac97914af1ac1cce0fc8f989b57efad824c9c0aede4b13f3666d93583750f6012b4c55bf3c0f4d72c1485c48bab95afe683191431a96445356fc50c3c76b7
-
SSDEEP
192:r9KbqTcUkARSh0/foqzCY1zRHciXxuVERUGOCaNOjHhO9Y+wLlQncLVamAuId:rQbqTcUpvByt2HE9Y+wLbRU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D39160B1-A7FB-11EE-9C0C-D6882E0F4692} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000b94ae2d88fad600e142c0aa97ffecc781e16a31610d10a019e05843fe28768c7000000000e8000000002000020000000c19e596aa46a55c367d220c4d1927045c0ba3652560424e3f68b357061f036ec9000000052beeee08ffebe413e4527a6df3c191de659276561f8cdd22927510dd625701a0c9315ec1bf7d7828a4f74d85bbc8dd6c984ee91764a0b5fe59cc59ecd46810ce9b7beb16863ffa767a9ad4e749e7063a48f6ba4da3b4dc10da9b890df6a13b150e4f944980416d77f815e04d512e9779c584d5416ad6746276d6a7fe233c096930efa28c35a6831e1400cd8410ffbdc4000000013b72bd1c6a6c70e16ea07254df1c972379c890ec95122b27106ea5a608c667c8d52cafe23f0d6db6f26e4e3eabf1179977808947c17512082ca6c72324bd00c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000005c09c64546d259173d0d6044b02c83c0c1f8a9cb731e989270bfcfc785c3c086000000000e8000000002000020000000bafc35b757b9577903d6a02ade18d8122360843d1b31895a461316a800ba0ada20000000935b4330be9ccbe533231b866747a1fabc9c8ed0b641adae9102f540692ec87f400000006d2f99808117be7fe051b3fcd13c8d3b39d41680dd202d909489f54a3266ef9b1cdbf9b5643ddd9cd215c40c98b4b69da2644af56e36a8840b4ce2b2b9171002 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410202926" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07ecca8083cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2516 2496 iexplore.exe 15 PID 2496 wrote to memory of 2516 2496 iexplore.exe 15 PID 2496 wrote to memory of 2516 2496 iexplore.exe 15 PID 2496 wrote to memory of 2516 2496 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d671ed179e0ebe06c97e14fb647cf53.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dbf1b0493f6ef0551364769fcf46e67
SHA125c6b2e9ac84a2c56b66091e5429a87a716bfb49
SHA2561de0ca09e3f907cfb53deb48117eb8af679c56a6a9ae9c2843d296f59f49b424
SHA512f4f2a98d11a4af0c7ceb11907cdf213b77aac67f8740614fd74cdbcdc8a1993c46a36614107b9dee350864f86cac9be9464b7dd7ed072e2c41e8dfc7d29cfcf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5bec5dab423b4d1f265192228c2440
SHA19c79b80c11a84840ad626a7335b9bd47147af73f
SHA256b83c8c114e7cdf06c2be6d5e17a8a9341236115e9d01f26263653d1a4d407961
SHA5124f8bdb35badacdb897d7a69b4f45e473fc006748df3c79f942d913fc9e06139ba6246da952796b232751e1d5eb0520e6fb25766143c0ed170d1b98acff017f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5369f321a13c44c8571a8559c1d8b6631
SHA19c57cde263cfcbef00a18dd8358b9237709c2e52
SHA256165f15ef8590333cb37835d709166b48f9eb393999e598c4cb32a355fca85263
SHA512bf7a6a752b887038556e25641adb873b713f4fa8d4a89907f054489eff9571d801d194b8cbcc53416980247d129072f09188961ab9f02316e7f254bdcf9ad145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5996a7a8ec2f97a3746987841057e07df
SHA1e29dfcf3b1da5dbf1aca24443d416eb284f671ef
SHA256a846d60876ac037f6a98bf824abf3eb4bc3a9169794fef1605e0372e30bc3b48
SHA512dfbd87aa24a9d46e885b20b2380984c76ed76b4540b0d6b3311495e54013c0421a02a14ada75ed9156cce633746937465f4f0b140ae2664bbf64be868e5bc93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8c6c7223ce773e546f0305ae70c3c2e
SHA1861c01732bc3f36f2931cfa9ce4c9523da46fd72
SHA256b201169e49563fe2e265254534f61c1ac16f4453c11740bc1d88d87ef41db291
SHA512d57816ff2b67ecd59eb3decae1fd5bce0b1dacc9c92fe0f3014ccad48aaeb4dbb75d4f9a1cb2588b8b7dc6a28dfd19fb29b8bcfbb5c0cfe7fe0639339e9758be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f84d936e4e912388af3584d979089a0
SHA1b6fb58552723aa432237866c99f7778024511ca1
SHA256b6e2d54f0711779b5cd59e85d6c96e1c14ca7bf0df378e6969e6461f1b297207
SHA512c0070885f8a65577c4fed402958a9a9fd2c840be6b38956a7b8a7e0c39156ea1429bdbbd618a345ae984e2a49f713182723c57935b2453d4a15646e88967ecc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5437ef1c40c284536caad430ade0728ec
SHA17e74c961ce9b08a00b036c2dd317807a67527af7
SHA256091232bb2d4c3d8f6f2857af6020e691c6e12077dcff0820b9a5d5d7afcb52e3
SHA51246f86235055eeba1fcffaa4dd784fafc478a5cad574cc99804f08a693d22a70696ad955b55a3ab8866309c2eb2bbc400b2f43d9934d2bec641ccb0ec69387a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f2a9a552d3ddc107cde8833d8b050a0
SHA19c83f17473eae29da701ea614ee3df9cdc03235c
SHA256c69086557decbd174c0a047ad00932161a38958a8188167a9a432b01a4b3a67e
SHA51286566f9328e481952895dcf123ed4bbef8961a09b8ef33205126a0b716baefcde2abbdb25dd657da495b1ee3899e486bde4ff967783fd47eaa00b4c8d891136d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1a607f7f8ac188162c3ae7c49dc065a
SHA1fc4d4b19353057d0c2dc9f1db82d939261be27e2
SHA2566ffdc4345f7e7daea863959c8d9c07a9fe0fd35df6c23bcf47ed2ec52ebe586f
SHA512cb663a1f270e7f1d23098c9a48cdc88c01f5122d534fc0b1f097ba18fd108e4e0edf6d026f06cf88179490e34fd88a65faf06417684b4b1206cc1aa82c6fc849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d6e5c4c86b121d09ccec8a4f4a1c3b
SHA1039cd5ee6d8cdfc75094aa26d7a0b241937afbda
SHA25680492411eda6de18e8383333e106e548bd6885fe8c3a4b15bb305e3f6cbe65e8
SHA512ed5aa9729c1cbd778eed140c504f445ac54076b02e1ccd4460931d9f121dbc19eb27154ad553e46c263ad61de596cc4884b790e5abae2b9df75d604a91df4f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c965a474fb6f611cc6b54789b969c33
SHA1c002e8f4d6b8e3b7c8316f5d3a508e0cad8b3f3c
SHA2563f493dea322dfe386486ce65c56da83d65c79b930422da0645e64129aff28ba8
SHA51292195261356e730fc9b6d89375f16f81cc739670a82897a1a94e4509fd08d076035abd84a5af5fe00665a4e4f0594d014f2317c57918671d31d1932f6da64a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c5d52ba1c357b562b54ad2d5eb8d81f
SHA1b104656b5f54eb60526c2199fa062635ea29a475
SHA25663ff45263d48e131221f74dd95cc20d8833370ee83b6ed0f165ba7b67ddae576
SHA512d81d54025d96238b9e7d44c61d6935563b63d80e8e88251189f748a40d654d606341c983c539da4b9072cfe05cdeb76176bae6a7c74ad317caf0084fab3239c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a5ff86d69d134cf47fcdfbd5521c19a
SHA115d89c559e142cb82db9b866237d78f392e3201d
SHA256e81d8c8e3876dae84f60135d0f1fd96239341be08aef6e880e8c90fd59b79cf1
SHA51238eb19bf82514563bdb1d2bda5884f935ef09def17db069d02f47744de9aae554379427b7707a6f2482eb177c2cf30ad2f48f94a739f86185625a0f9c99e980a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
95KB
MD525e5c004485abad6ca17d6b6d9692b35
SHA18c32f0cf8c2d005007690cb246d47d1cba187040
SHA2560a8c1e9d08f141719351417d710ff6a389fff056b61bb6455eb9ef0227058d70
SHA51269a7fe2cc9119129853780b1e329cb583c08ac4440872a95e940a5fd30264d1a9c506c470bec3abe4a9fc20a21a53d59609846c31f9b2902b6ce07231520d363