Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
176s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
10714c757ec8a5a99c8cf0b74271d6bc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10714c757ec8a5a99c8cf0b74271d6bc.html
Resource
win10v2004-20231222-en
General
-
Target
10714c757ec8a5a99c8cf0b74271d6bc.html
-
Size
71KB
-
MD5
10714c757ec8a5a99c8cf0b74271d6bc
-
SHA1
676ca5cf14a756a3d83cea0c1c3756236a83962b
-
SHA256
d74752f62a1eed23c5acbfc7447171b1c32bd792a73880cafb5450be91fa0faa
-
SHA512
5b342a18ccfca32a77f8dbc575c9f41abfc7dabd202f3878e4aae0407abd5364e12a5a7e43d83ca7a280709cee85349bf1af01ea335f440c0f063e32699891eb
-
SSDEEP
1536:AkGLNGZg7L9XA9sAogJ8JeSXgqnTjL8xKO/wyHWVULZpTdpUsmd3f4yaiVSQgvbj:Akw7Lu6IOLS/vY+mOxgF4DtN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410150713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FD62551-A782-11EE-B2BF-5E688C03EF37} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000002cb353ea46cfea234401b6d7aa9780278276c9fbe4380359395a9565a9928139000000000e8000000002000020000000a4df2e5d8ee9a2c45ff5e174ef86c9241c9db8d748aea8e28029a3f425073af02000000001a309b930f9c4b667e8972e915c893b4a9c40742eef3ebcf57bc4da0a73a038400000007d524c23866318e52015b7cd8d480723a1df979d45529366bf415c75007093cbda85499607d008a14a1b7e255bbca670f2ec2b7cb7ccf94c911c71cc3c942abd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000ac28a9957d77539fc0788b001c25eb0c9d7ddf3b303457189513183547b6174d000000000e80000000020000200000005df2ff6a6669cb8214ddda041f93b0041791e240c7058aada14750b38bb156b6900000000c8954fd6a72abb2b2481f6043cb79bed2c43b14bcb3101423599aa2fba798dcfe4847a3938cdad5ee771d21881ef9d5dfc48fb8f126f56e99229e33f9c67e28bf5e3f12e7fac042ffc80d3806b1cb808985c6f2022fb18fde397b1d725f7aca171f7e48b00c93a7197d88b35dad8a6ffd1aa538a321858f1a45a3b259899c252d5aa2cd6915488708d8fa9ba6a29aea40000000f22637477c866827c7260bb5486f0673aa96add57b9b61c5c97cdceebf44d4d8e3e75ffaeb7d29cba01ae9f6f27262028e0afbe5dcf428979e6874fa83d2ff13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01f89198f3bda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2728 2168 iexplore.exe 28 PID 2168 wrote to memory of 2728 2168 iexplore.exe 28 PID 2168 wrote to memory of 2728 2168 iexplore.exe 28 PID 2168 wrote to memory of 2728 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10714c757ec8a5a99c8cf0b74271d6bc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ada5bc477fdf4b14de1910de3a7cca9
SHA1099a45c747349c159a0a402eb407008806f677f6
SHA256ca7a04a10c39af76f34d2badd3a4e3c8af9d4357c78bff3cd1a08023fa7392aa
SHA51220f6eb9a6693e24649d5f6587c5ffd0c44f04de0bc3a7d4a8f97a257b31e3fe076bb6d92f0b956ca749b09830838c7b973ac20b526f58dfc33553051c04d4650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd96876cc782c0d4b673878024ad4921
SHA19d601819fe27a835a062d43f539dc4b2dbf13b8a
SHA2560b5fe22964ed87ab86f94699a58c2cd9d26b6a7e660792b7dd4bffc57a5ab755
SHA512835cd803d67859ec58f8350bcebdc615a2f2074b810e89d4c329273ad05039bc26b5e6f817915d09b6a45d33d850dcf48cdcf25db6a7c54df01ece8869e35a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59148d38f7bafc69bee939d9d94785364
SHA18150bb69189437742b8c61ad79d27137d7c3f7b2
SHA25640ff1f6d2b6aa9c3059de1cf7dcd6a5850da251fa716eaca39140460fc20fc91
SHA51242a6e9a277d269782f6a4f7bf0b4ac1f68741e1abab6de09211763229fdba3a2ecd1df7dcc04f811d6dee276ee468bf0b948bc5394cc2bc3d4bc61705874c1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deb27c98ec108da4291e83ef0bf5dbc9
SHA1f747c36119d350c685d72332daee9b1699025631
SHA2566d45a880177236afc36b1b93d63bda0ae0277813572ae7730f4d5b54435154ce
SHA512eb3c8cf1640fbc6a837720033441e1d2cb4475d087e976f50b9a2656eae5f6bc66072bf2f517e202d0de1952e9fa390d818d17e2782cc82598b3e88f3624dff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db0f4862b3257ad56fb6b3576afe0e0
SHA1d485957043ade2d8943f537aa5ae400ed866772b
SHA256aa54133a97f9e450eada0080bdd5f8e7097abba512a150ae5414e1f9b53577d9
SHA512fc707a82a26fc2c713f0ea2cbf183a6d0bb53ff7314e09eeedab2af1004e1868a5dba885ab5f9b4a1692abe0401ffb61aa3b618c2054ebc82634622bf840e322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c0d9b89914bb188e5105b96df92d864
SHA1f98b9469a5e7a3b8d74cb254b5d031d88619bff1
SHA2569739165b9cf8acbbd1d1dcb4145228cc25bcc7a6c6cd2d242cd7fb2d5086938e
SHA5125947bbd50c6bdb0787bac393263b863446090f6e7f7b6cee88b75642db33f14a1f4ede94b832da6db7f5c9c1c66abb71b6cf2dd29a562a23d38de65234e15e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5065c6747485fe274097c98dd4b15bb8e
SHA1bb1fce06676222a74e39b5b43c18cb971a38ecef
SHA256b2a509d9d3223a885454442576ae185de135c6a4f4fa1d9e3605cb229586b92e
SHA5120eb147ec061a83634c56abd10a72356fbd41c4373244ff23e4ca947047d13f85e2e05e7907d8b39b28522601b57aafd36b68aa15608ba6da0c92463553c8a249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5618123bb8d356fc00f9ef3a5d0d16057
SHA11c13bfdeb9713442efedd399911dac514ad5864f
SHA256528b6734bba0ee4cba4c0441dc1fd05cac17138927b1877fde4d9b3712ed4c5a
SHA512661804a6c06b947686385d619a692f580333a3841637cdf0a3af0c830a0fcfbbeb7785e7863abd62ce526f173f6ebbe03035277fd7d5f333e1cbf8a3e67761b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f0f0bccf93b1e88bd1f1f871b11367
SHA1c257e2438840775f84ae25e3b4fe3b893867b069
SHA2567d2ae97e1875566ff31f880c07114a8b5eaddef4fac60081bcaee8f0cc9a2041
SHA512083d6535c3d1a976f0ae0ade473fc7a74fa2b7e2cd61eec08a5cd64cdd1141dc506fdcc0d6b85c819d82fba821278485cb5c581e67c918376aaa1facc0034a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af6edc45551a366137a2cd4e1416e750
SHA17e90efafa2b159830bb8305ed19c985e0da2d15d
SHA2562f16924913e2942363f047052387f46a6dbbca52aea7183f57da6cdfbe846689
SHA5125fcd62658604ea4abfd34ff85b7213fd47e6baaadc3872ba78460430468911e5644ce1dac7969ed0a1487fac1e9ad04600c9a4e34fa1278b5d828fa802ed7b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f20a4fe7df87b511c5a943c85d03cad9
SHA1175c54bc6495748dfbf6ead4a96d2b756430646e
SHA256f2e0cb8508c5b3b67699cf0ab47d42a77666670d399b9945dbbd8356540352b5
SHA512ca919021df36cf6f548eac866bb3c076e9d2243f215574eec84a3d8fcd969f47e9b8f377eb485a7dfc41b95df570f9e09d384069e8df16e93792daf85b4192db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bb7d135cc01f097cbe1cd83fff39371
SHA17a89ac1a3fa9f7c9333f06d7246f42fbc34fa44e
SHA256a508396a48a3178200e7936735b734a4eb5413d45b886afa983f9afe7a5596ad
SHA51249e9ad0a4cc90a40841f006c5773a4f2aca59a3a9c74fab61e6c0ee7d00217834f7740d55f1046ec2524a29411bde228ac27bb3c6b8dc57ee4b68467ed013fbd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06