Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
114a7ba044de2822b09fb41185f305ba.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
114a7ba044de2822b09fb41185f305ba.html
Resource
win10v2004-20231215-en
General
-
Target
114a7ba044de2822b09fb41185f305ba.html
-
Size
11KB
-
MD5
114a7ba044de2822b09fb41185f305ba
-
SHA1
ed3d4f8f1dc60c5af5ad8e04ef85c5b303dbfae3
-
SHA256
e84fc6c2b3d519c596c0cabb83a2c41fa4fe73e7451c78069de5d09c41b90082
-
SHA512
5be46b2b9dbc98b5f28d2c4f47cfb4fe52a635069ed7a016e1a9b4fd8fb8dc250e43178523e6bb2ea9a4cb310fbae6455cce7e0c478d4aa02e0f5d74332a0a0d
-
SSDEEP
192:2VqlIsr03zazP8k/w1wvqyzfBzZzgnz8zrCz3zEz/018LOXuBuLbdU8d:sqlIcu2d/gcDBNknwPCrIT08LOXguLZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02220B81-A86C-11EE-9673-F6BE0C79E4FA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410251127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1984 2872 iexplore.exe 28 PID 2872 wrote to memory of 1984 2872 iexplore.exe 28 PID 2872 wrote to memory of 1984 2872 iexplore.exe 28 PID 2872 wrote to memory of 1984 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\114a7ba044de2822b09fb41185f305ba.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5552132fdf4929623140660e9f1d8728c
SHA1b30c9cada92be3e25a0ca2169d4f19f58a3e6c29
SHA2567d1aef572d7d513e21abc4fddfdb17568b9dc2bd829a0a9f423857ce673ce1ed
SHA512657faf1f3a8b1d47f003a43ec1fa63d61c230482e27c5d3623eca477f44c0bed99a60631530d8ac01041c2d021ac6907039f5d17786c0518aca00e90df5150d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd124f734f2637a2bf09440ece2404af
SHA17340a9685ada1e3924252d9cb89a068d9ad912ed
SHA256c11421b1d83a5772a5a824cb4404d14c03bd467bfcdeb778a221dcf5028fb063
SHA5126c40d8e23be625187529bbe04d6738498278a61e174557e7fd276bfc8d1a95f9b248f2f179cab52529731573bbdfecb5074e717bf4bdd9a02b2b906c7f9a122f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f8f226a4c6bdf9b5b90cea5e07e7d5e
SHA15d53e6bdb9bde12b392bfe4e97d79b26ffc5d2c3
SHA256b01a3a458f221cc9acf88940d17ba0aa705af5cc77c9577a2f9a9976d550e328
SHA512ae9a4bba7135209121013192d1e0a3f89dcc11282bbeaf60c07701c88843102db9d9dfc087a14fd1b3741f57c61bbae29303a477ec906a8a2fbfa785002e96a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b9034f3d817ead24b6bd2173071984b
SHA1bdaafb0312fed95528acd885b6e7f3d845128265
SHA256816c3ae2d063cbbffac794e9e6e386168605ddac089dad97c888941c768c94bf
SHA5126d0658a235f5d2b2db86729a28abcb467b46af933a4c5c848f4fe22d6a01d4d0198749642a35f2dd3d510759e7a83939c7cd7368d4fb2c4570d44b5a5837016f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5423b911af901516ad8f71c5f2f032d8a
SHA1cc6859e896c274cdfc8df8ced42221e0c93d8b14
SHA256d24ca4adbc12c348f01a388174f392fc1c1b29c3f4f66f4b6b4269557ad10e0f
SHA512c5d2b2207b5855004c063a3e53612be5ea366c395b3ba76b61e51373e61d435c125568e49a547c4352b85d3f036d0cb014febeb2684f52c1721a4700d8236a7e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06