Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
0ece34fd02cb354ae61925b18ffbf9e7.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ece34fd02cb354ae61925b18ffbf9e7.html
Resource
win10v2004-20231215-en
General
-
Target
0ece34fd02cb354ae61925b18ffbf9e7.html
-
Size
16KB
-
MD5
0ece34fd02cb354ae61925b18ffbf9e7
-
SHA1
d2955365e6fb32452fd46d33db69221d5612cff4
-
SHA256
9d693d71d3af7cda63b15e3b42afb03b40affa5c12448f458fca83f6a47a5c74
-
SHA512
f0e28000f65410c3ab1c54300e45f6ca42e8fcfabb11d8ef836a94726e57a2f411e2621f3b4b21607db7108be3c363d6006a90cafffb1f7db832c6bf967d6c78
-
SSDEEP
192:BVeMjuEXKsKhYJ93/BjfVngc5Wy+w0XY86miIEFBKc2KbcgnPiEENK+8yzxrF/uk:BWEXRYal/7WyxBdZ/4Kpn2K+puiPuiJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000d0c3877444b649683fd39029862c1ac91f2c174266e6857d48f78dc882af431f000000000e8000000002000020000000e78176b648ffa43aeeb26763f0d588bf117ae26a0e923777dc0719f8d57daaad200000008dd4414a42b6e36033e6bafa6d230aa708d017d098ef89c4ac18edc584c26d6840000000b53d9ddd759efe4d015cb254b4a6257f3932c6ff083b7150f8010a9851efcfc4fcfce509f8507d27850c06aaa9879250d96cea523dabc99d82619898cbb206f0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a072f9a12f3cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFAA5E41-A822-11EE-9479-523091137F1B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410219638" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1752 3068 iexplore.exe 28 PID 3068 wrote to memory of 1752 3068 iexplore.exe 28 PID 3068 wrote to memory of 1752 3068 iexplore.exe 28 PID 3068 wrote to memory of 1752 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ece34fd02cb354ae61925b18ffbf9e7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5960c45ef8e2039631adc6f85ede49643
SHA1dfef2fc096842bf2031bf250ee96118826bdb61f
SHA256b1c8f4a24927ceab80b85ef75eb4e1b3cf79f56129eb1a44cd5b525e852d73a0
SHA512f494fecef43d63ec1da81a364a03ba05799426985ef8529a97bb88b8b5d2f18c3cadad0727018b79d4e300c27ffe30f2f581cd2328a385b1674ed767c1a91bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a3b7998d50b747edf4bd1c7e539549
SHA178f64194b9313f3aa8b0060d424e8d63cf979ea3
SHA256d2bc0ca53222e7a6fceeb2c65f6a8ea51095ce152c07cb52e55f17468a1efb10
SHA5123e88480e08d65db5051602db3c25a61de35b9aadc6ac5393c1b29f5f45162cffc82775ddd352de0ceba5e7f55217240b22390bd7f7888bba9fcc48e66638a590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee2751056867f7da1f8c8a922408e50
SHA12713003250926d7d40ab9469760de5475fda08e1
SHA25628e2bfc8ad93299e9503c5438d4707152eefc4e98088495cfbc6a8783edff13c
SHA51207292720a7b767f7efe49af8b1446034664df2bba7231de9e98c8f12b4e9398ea14d589ceb3d6b321ec6a0489108e792c869f9b540a0d90e427e067a1cb0b6d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56551a204a4563892385343da7d05221d
SHA172bf9b822b3a09f24901cf7f1c1501e39b9a26a9
SHA256d20ed01764dff7c43a7ac753eeb69c19d34384406fb360b5062a69244e640812
SHA512753557a02788981a824b73c02bff592c8ec2e453e59d5e1eb62cdbe3cc332f272bca2809a824be03f567632ecb8763789e5ad532706b162f7012c3b42d9b5eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ed7b6986c95f32790b4a51762bd1235
SHA1f2e228253997d4dbd35aa52729279e48ea52de47
SHA256669a9679e7fc28f7517780f4e211e87f3b5f8a302a78e7533457b3830ee09e31
SHA51215e0f5130d9439cdeccf59a86c9bfd484b52f84f138777c329e22647c155d1dbbf593f8029566284dce178428e690a9c0881c8fccd9ab38fdac39b2b59b54f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2341e03ae455100314edf1576d6b91a
SHA1e1f1785aa374ee413a1aa54f659d07a468ac48a2
SHA2561eefe13b4935d9d315bbdd2529ef6db8885da0d92d817e6c810722fe1aad39f1
SHA512aa29aabd06b016bb41337f133d077e3d2b9d4d03686616f6bba8ac6ba4e43ad9e5cb885850355c1ced95d8182e170bbe36bea0b70d9a477bc5a8b3ac60353f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55512649b6e056464eeba03f350422f22
SHA10993eb20a1174b9bace72f2ad84a65591eba327c
SHA25655b8651e09efc79ebb91ab41c7a459a353bbd567e92ed649ca433fd4dd24d2a3
SHA5121124eac542e8f9bc0cbb62c480282f9385e3d1bd7b542e07de5006ee09e323b7af9ab11084bedd78d343048f1f2016375952ddb23f93246404c811db118bd3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51810c2022fe04d366d4ab243952de039
SHA1dc9ae7ceade6fc1c15053f0429a508ecc5ae11c6
SHA2563c6c46d4b9638c9d8973c815794a612a4b985fe84229f9ae5d9f555d37175c2c
SHA512ead3aabb2fcbc4b6f2d51bb7f478067f4557477748a1606cfb1b9fd024c89b61bfec5b979f786c2a2191f5f48a447eee5e2799661c31c4b0c744e6f3631b436f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5403811a03778cdb72a53ac51b6eed342
SHA16364907bcea89fce8d9547f7dfda50f1ce2648ba
SHA2562156f2ed2fb999f4873cdd53ebb7ceec8b689af548de8ba52015c50396830a03
SHA5128c500852be1cdc82edd53fdfed432d946b2738964d9ec9e0333cc8e8f5ef94e57c78f1b69636a1e37b116b3cf358ad952d3c0b336a39b689cfd82fb6e1f0254b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d17e8fdfc0c74b59d775769dfed742d8
SHA1d1f915662720d00d5460b97d41b245a95836635f
SHA25618e23382a2f2e130e239a894a2e463bcd12d4ac2094374b1025e4ca2731f5a06
SHA512b7a72fc581d307d8f1e11062210b71beac7474fad30e1144e16e10a2fc9687c6187aec4e8cb23ab995ea2f5c26f54e7746386eede4b60fd09f7e380648c8baae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V7D4Z725\link[2].js
Filesize43B
MD54c0f6b7e4e285ad18a92992e70a4b7ad
SHA1d0a9e6b1c80df6a666826876c401761511e0a4cf
SHA2563d1e37d0065624139f28a0c6ff926f3ffd5dd6c1346c06b1d951893b3067b34d
SHA512218b130be6c48dac7fb645204ab7ec3649342cad432d926d2bb381a53730ccc216f6975321cf61f42bd2d62f418c2b7931d12de5b0e0cb7ccc8ffca8a36d9a24
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06