Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
10e02fd5c023cf6ef409b595365ad3c5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10e02fd5c023cf6ef409b595365ad3c5.html
Resource
win10v2004-20231222-en
General
-
Target
10e02fd5c023cf6ef409b595365ad3c5.html
-
Size
91KB
-
MD5
10e02fd5c023cf6ef409b595365ad3c5
-
SHA1
69d01e4c0fdc260f49b891a453dc477c81b5ba1d
-
SHA256
8e9b21d688da675f212ebe690bbf4d8769ae2b03c5c4207b1b47c4fa5ab2c469
-
SHA512
3c9c318e94c8ee68f4b680bf662ff1cb4e341d4a7abf7eed48ba45d140deba3c92b1398d9dae282eeae2f5b1ca60e910a217b53044b8e3c62d662364e7d10274
-
SSDEEP
768:CLm7t1Gwm7t1Km7t1dSm7t1Hm7t1jpm7t1cE8uQru48J5gNzWaUH05o8uQrMXm7U:F0aHkizWhLaM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601fa16d963bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8900A0F1-A789-11EE-BD45-D2016227024C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000000422a58e95e4f68189f8f6cc1349def9ff798cad69d045ff774c85b9eab222d1000000000e8000000002000020000000fbf992936b2e20cceb2d14c1f2b4fb6d6e32a898a8dac459952330d239a41fa62000000048c6c93f7957e3cfaa750ce0af62a36a7ce1a5d188bd4d9ef75ec43344f24137400000000ea4d975db2417c36895c5f4da4680438caa0a21e47b9daf3a1632799b9209531e76bfdc7a50e785942e436ea22c6fee6b4124e6f335a2eda37e3888034de903 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410153837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000e4cb5f81bf814fbe18b731ebd2958c4f8971125ff01ca2df8470770654011a1b000000000e800000000200002000000015f2389adfd7ae36cc3c3d835fdaa1862080f9cf31de93c19cc270ccfee15afd90000000bf91cd3f814f6c08bdde04e8fbb1cf581526146df44b88461866e6832c445b988fee48db2f4f547edb361bfc49ab455c4dcebd26424128c39402d87e03d0c1b36c0244adcb915e531356779cbe7094dbc69b08e26e3d1c16228e7f916ed6b452df37df5f83fa0e0e7d641859d7df5dfee3414924e791ebe9373c047f6da5c7312884af5fde0406f73d72c557be091ecf4000000052876d072c1d4600d07ac790036e3079c5501736c2925e010af0c51af54f6ebc3b0548bdcc0a3f8942c9fdbf83401a7c1bbfa4ff4af35b612856a78a01b8b34f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2660 2232 iexplore.exe 28 PID 2232 wrote to memory of 2660 2232 iexplore.exe 28 PID 2232 wrote to memory of 2660 2232 iexplore.exe 28 PID 2232 wrote to memory of 2660 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10e02fd5c023cf6ef409b595365ad3c5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5414ac206538e51ee5bdeaa9dcc5b958a
SHA190f816fc90a3abb58c8ff71e90d0e8973548fa47
SHA25647d7d46c4e121ebfb06f1086c05fcec6ace84ecd6578f3bc1618c0c0872b8bbf
SHA512cae84794d0992f49b268b33b4555c12c2f2db268873913c9a6023a5889ccd672605599684cb86a0aa1883cdd5411d7139bc59f77d585df4f04a8547b257a9d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cf9e635eb267e4bc72a2d17238d6932
SHA1226962594e785a26b0be1e29366806f149a5ba49
SHA256c02ccbaa8326f210e7e4686d1a5dee96d563be4a0381e84602d46eb221639045
SHA51278c405cb86b7a81b25337011bfba22e8e47fedf1a4a619c7d66baadc4153d4046bf544de3d7eeb6443ed7b2491b5085114ac43407ef86bc5b3dd3e1a34355e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e6a01dbc30fc875aed1c3d910663d93
SHA13a5d06c09d21098e1dfe959950fcddbe4e172f69
SHA2562d270ed43c249b555f5b2e2d97c0f0376a2530e899f93dd2736c12ce70573414
SHA5128c2fd6716eade28a5239816b54a7d1191a71157e17a52705eeebde22bc5565ece310f783bad7ffe22a5c4e9f42bb381e5e0882724837bcaf7ebf1bcd0dd17f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59989e77b0038d66e0c641d746b456615
SHA10db96c87b7b16b798bcb47fbff158b9dbbaf0b19
SHA2561c6f4eca21c36b51d33156092412fcf064e25c1973590a39d8aba73661d0cbe4
SHA512a4549df530b153ec2eea7fbb729973697d9b6db335202c709214840b47ab409bf082c2c0094397f3755e415ba4353082c1d85a958cd0a2bed69ce821b182cddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559864b307c9d17d926a883e789268ea
SHA14ab526a7403bb07ba0ccb9d353e84ac78bc0e96d
SHA256b5455bb09eb7a48d8b2d015c9ac52b9e3f1ed088a0c8ffddc8fdcd390008ae47
SHA51231de0623892ef5dfcfea46fc8d65ca91eff82821168177f87b75429b18e1141755ff7653a368e49d67ff8ee335aa2fa3fed24acbedf884a7c3c8db8d05675f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6027c4bd6cd6fc1d27da31b9f241fd6
SHA17ce4bb9364bf52651972084d1cee0aceccfcc34a
SHA256536cad863fd71ff51338a8ac8aa3fff6bee8f1b994ac8dbcf32012bec68874a9
SHA5127f25da03568a79c654f68664ba415d181be17d51eada96772246eba81d837cc02acfaab6d6a7aeed2f387ead509fa154c8e4f889c44db9e15b5ff9b3b2a6d125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e55adbc66d2e223733cf4ffe8f8b9ffb
SHA13784a9a88bddcaa3e0fa8cfa02e774424154220d
SHA2569c598a21054ab8bacdc267afe53a407218b8668e4d5eba36d8924cff27180b83
SHA512d3c7cbc3e18aff02cc92fbcf6b6c1861f9c18150b7883c76aebbf56b4cc0ffc5d35f4ee54d2f2814d7e22e07857e93a66179e3dcbb5a1ea22b9568a8e8c20af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553c8041e9016fbf1d0576b22008112be
SHA130ad9435e14877936fc97bd08700cc7358f86e9e
SHA2561c0bb67216ac6d67d8de1d1944ea8f0cc8e5b743e0829b22ebee848d1311fd7f
SHA51246e47755a3ddb4367636f035c8446c07cdf99a6381651d8cdfba33b1b6697ee2d11302eee31cc0c7965918a14d8c910e84cdc6b83da847732ab325836146cfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8f0a217f5ab960e08c9237528588221
SHA1177dd28938a8e719070aa7a26cdfb5715ae12b1f
SHA2569ada484f97877cc93df4925dfb305aec9b8e1fbac91b9f87215715586957ee88
SHA512248699c291a21999f89487cce4097afed5e99c0cf266025b85c2574812cc80b8b1bd59962b0779caf157b258a1971ef1f9b59e36b2202e628e4f44c5d5ee4677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525589e3b5b16079704620dd1f0ff0f18
SHA122433a57220e02419a6aff4db24886a6efe39969
SHA256ba1371a53be49d53cfbf781fadd8d2399d32e8c32c6a08de98440c31f5a876a1
SHA5123948ad35e28ffeaefae990780ab0bfa35343df66868ee228884d3a9b5898fa9e60336af17d3f64db7f18354d01eede1747c7fccdfb0e1a91c770d5db31b4525d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53db51cd01d480530b1d7e645540bef46
SHA11787036d7aefc6147ae63153131408bba35bd3f0
SHA256892718b0d3e8fdcb2b9a09da1c9fe37548dc04297e2b9c75a2b8506b48da4f69
SHA512fb88387ae0f9736acf770c541d5f05f39d1ca7db4a22a3213eedbcb28d1b7c73a26bc7992b7883e14fa6fc534bca919c7329441d1eeaa821640f1864816228b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561efcaf1466e0d0e08d24ee61cb7a71e
SHA18d6c15aee54d78a11b22e73d021a49b4697fa9aa
SHA256705e0eb04d8d579952ac25c9659f1a1402e138810ede8b7f6cbfadcdc05c99de
SHA512f5b5c04c5bb59e6a7751fa772f532d0d8dfde9754340e0ee25ba8988bf72bb564ecef736e3d6a088a755960a9fed4825263d3e53ef363bb746746b1b39bb955c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e335b2e1a5e5f8445892f366fdb061d
SHA184bcceed27e66721027c44ddc2707cd117be2d46
SHA2562871b135b3793c86039cf65190c85a2a30e936d0a596371f98011a264de9038b
SHA5120f6e520837a7b9e3b5c8e5bbb367624e551586553bc0da0f92e5234da1ba9eb4d8be755f78b44b5d9cad3c8249257952e00d3c4e6df9a5d15562a613f2cddd3b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D0I6KXNQ\errorPageStrings[2]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LAJVCBJI\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06