Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
1317791341b0f72d5c7f8b27dad8f9bb.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1317791341b0f72d5c7f8b27dad8f9bb.html
Resource
win10v2004-20231215-en
General
-
Target
1317791341b0f72d5c7f8b27dad8f9bb.html
-
Size
3KB
-
MD5
1317791341b0f72d5c7f8b27dad8f9bb
-
SHA1
a69838156575849250b6b96a5e017ef0fc5d2697
-
SHA256
e25ca375cf1a58149d6c00fbb70cd295e4c77a6b1b3f43c349d7640b4d507bb2
-
SHA512
5e9cba7ae69cd89611ca25db1cc6a6fbf638db1c9e4f1992a6744f63356b3191cf1c3703ea9ddc7870b58613380d08b0ac0c568cd040fe06247d16ab2f12abae
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000054f446aaa21d0c81686610b5a7fafea6de741e353e971aab19c36c443e0bba5a000000000e8000000002000020000000f758f5c54f57e6d9ca73e37cd2e4629b87841da80f16908c798b3459b88be6b220000000fb22c33b4942e7896bfd4e66de5c66d31c02499d70011c242e2260e6312bf3a340000000a2ba9aed77c199f3767aa6f02123b959e3a2f9f760f9634b3d174bb4851a9fc3e84cd5870b9512b343e05aac52f5c76e629b7e778fed8c99604c181fb5e86756 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54BEDFB1-A7B0-11EE-9278-CE7E212FECBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d53c3fbd3bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410170501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2932 2524 iexplore.exe 28 PID 2524 wrote to memory of 2932 2524 iexplore.exe 28 PID 2524 wrote to memory of 2932 2524 iexplore.exe 28 PID 2524 wrote to memory of 2932 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1317791341b0f72d5c7f8b27dad8f9bb.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5df912e0602e2fb5832e4ae93af121378
SHA1d26b4aa8011c1029975afe5f1ffd1580b9ef49f4
SHA256804d975827ab53817c23e358238bd8af854e742c1ab7afdd443811efebc09f9e
SHA512062bd4d9a9b73d5b531da9e4620496db7afdea72896b38a77888acca549de1003d9c74e2a8fa7effe5baceee739118666261b7421fc61c29fe0195c0e71a976b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaaabf6ee61ab75ef33315211448a01e
SHA112950e7611e0f0c1d014568ffd5444ab91f94beb
SHA256cc07567af205c40a87be9757e795f6dffdd67a5b017b4188d592b70037f90b27
SHA512f05c559e9a90dd164f9b415e3d231e98cd7e5afd2bb33e95794e01ac419c623a00248e5eeebf0758d4e47faee35c19c0dafccf3f3fc6cde2e3e4014d2e571c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e901bb295512624d722126349177927
SHA11425d300a3e28c28679ab39dee5b678d9e98e1dc
SHA256d66f62e18316f886dea92ec12dcca1f17ad26ba7b62e6d0dc5b931c9f731d76e
SHA5123a4259d893741807719229c8e7def645612d1befee5d55614d9f6cef9148ba0ad687a1c5f3b043ae0a67038b4b2f1438eadf034b69d03af1f1442c14d7f4d73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523732f90a249d8f42739a2d75dde46b0
SHA14419b86c4ebdab58e2e045b8d69255ef205769f2
SHA256d9b42f7b05dfeb9ba86f6365ce4b7c87c6228c391ea4efb500577955c0c4c57b
SHA5126159db5466221da4f64bc65896074e7dbc8d3a144369f34f2567fb5edb45bc088523ab70058a90200883969bb880a42860b5e8123e996c01bd60110dbf300d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad1e64313cb807f1ee382a98c9070e4a
SHA18c64d5461ffbfe93c4bc0da3244dbef099f14069
SHA256dbb02d118d980f409af36eaceebed883536f97a081b24becbe89c21dc6e00cab
SHA512a44b2f2d0687f9145061d52efec78ea172356f7452adf08ba953f17f2d88c85e121172afa15347b7bbd7f1fee259861a7783091e4bf5ca4c435ecc943d35bcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b4d1ef0e9d4eee10f2d082ef247025
SHA11178b59fe3671c9990c72b6d0d33cdce241ce372
SHA2561d4d72d17f3b9ebb23f43ce97c647dc8b4f3ca74a807338a34ae1c9c6a35198b
SHA51252b7138727d40fa8d6afcf15e797f0a4a013a625f8ad6f870c7bf87ed0cf1e72fb029e5662ada72efc08315d5ad80c86c64b9472b2aae4c0fd870e10337e3aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccc3fae3d42ac14aa35488a331bc83e6
SHA1da34559a39c8db6cea28eeb7e4691beaf8d8e5db
SHA25699821729c180d9e0ad60a7b570140fcbee6428a0ace78d711b8726ce702bed4e
SHA512c03cb1bcfa6cb62809e81afb462635280406fc727d43a83d748a0a2161c1531e9f4fe7e16a639204072896d7cc4a72e6a69c49967ac25f3e48e0449f3e4208bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1618e2805918e505d729e9ecc220809
SHA192bbe025b4f60859f2d8cf01b3435db7b65e2e1f
SHA256a27c4dc1899ed70dcef5be141d4674daf17143b2fa3d5c2114c47a30602c51b7
SHA512427af6f909b577e0f73cc24ca7f128bdc146981f497f26e7f811303804455be972406f752826eb85dfcca3da62f2d0f3865e59c1e256fe3aeba1bdeef98c008a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e4f7b7b3a2cd299a886837f8b569ca1
SHA185b89ac5e89835ea4418414b5428dda358f883c4
SHA256328257b3e95f9987021ad8faef8d749d4a659950c413c3fc07207ec9d4860280
SHA512a2e10c135bbccef53ad9c2001e6969d855864f91ee28b565e96cabcea8d50d4d7e3406cc03f3cf1f9ebff2f9d57933a23e885d0292d65ab96f4006463f39cc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57965acfb84ce113f63bb536883ec9630
SHA1e046ba3ccb32ffd1d33b79cc4cf7545548e45700
SHA25654eeda8b47f4bf524fba0b17086e224a3814500680e738bb8c684f65c6a68e4b
SHA5121d48cf3f79c946aea553176bd2edf8bf0ccc414ffde374b8f84139344f1882e406b01aa3569bcb54f2f95e2a4d8dd7b1cb76b0e2364a993bc21ac19ea432c5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e549fde9d6a750fca10e608611b9efc
SHA1058828af0ca1973080a2187154e0ed0ffcb7886a
SHA2565fd3e1776b76e6eb63c7c8cef063844b6ab34ca2800f133a7fdffa58fc2a9b4b
SHA5127951d5566497b5d67adc97949f55cee84b098fc63f742ef80d1980b3a0f14302384c0d8bf19102881853ab7bdf998d303d598b9de93be0fb2dd9a6a01386f986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb5471e8386f2833c6d0f55aeabe2db
SHA112ce8ac322fbe4f005e281fac7309c9bbed2fac5
SHA256a7f14bdfcd0d7b9a339dd68b3ed31d91fe6979d1898c42b87152a984d1ca680c
SHA51282512f160e7cf59952f11a2ef471d52e444282e9320afd19749edc74ff19295af1b8a4a26478e50d7e81c034930e68404b223a8ff7c19fba9201ba391beea74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b4a6a4ee16a99b04c23454649df86f5
SHA149f91ea141d41d1e3af1e48cc29f8fa467178d61
SHA256acb2575ea5c9f078388f64cdfacccb2366c684c63e71e371c01a42923d8debe2
SHA51270b22a53ced8c36559da7fcf3d24440930669fbdf66347c9b7ad2a776d3eaaa75ebeb2b41aef758944a5b4f9ff908eb75a2b0e7984a2e56e8852a4dcf59eac14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544dace6c4665dc0a28624c1da9bd3334
SHA1e9b18790230b89e9fc490c3ff66fedb97c12f86e
SHA2562fd4506203d78894ba78ac4ce29938ea788325d7400a2d482809942c171df094
SHA512db21cf1294642940887996bc1ed2f1272f54d5760506ea521a7d1557650cfe1a61b7fe363db4be824de66aa804ee6d777fc9298d6043178fc21139f2f50b2785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b45dd10e6e0df6a283316e2ffda10c5b
SHA1a85e5e6dd1af8456453630bb298232648aed54c9
SHA256aa9212eb0c5310810fff8e7f908157b1a94536618bd6775675eff35939fde427
SHA5128e20d913780bd45293b85c424fae8d81349735b62995dad0af3d9f43e9f6354a14183f179b9d1145242c0861a720998ff73ca74f4e9ba7234d23f0dc99f59b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06