Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
12512827d85efaf2949c64306489d417.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12512827d85efaf2949c64306489d417.html
Resource
win10v2004-20231215-en
General
-
Target
12512827d85efaf2949c64306489d417.html
-
Size
6KB
-
MD5
12512827d85efaf2949c64306489d417
-
SHA1
8cafec7fd4cbd0028dc2db29ff96f3c273194e89
-
SHA256
dbbe868f62b94fb5a860fd39ce36154f537de2ae5b4faeb4b83fa35139876115
-
SHA512
ef87e0609fb55e231666059f6db013d67902282df463bb3207969815f1440f0b0df29ee3727ee65de605aa53468031e88333eda07430f53dc028308b59ff6b2d
-
SSDEEP
96:uzVs+ux7VyLLY1k9o84d12ef7CSTUVbca1sLiYcYR16cEZ7ru7f:csz7VyAYS/+4R4b76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000001a1df3ff2531a2779db323c2cf066b62320aa6b7f5ef614e47a8a0aeab7437e8000000000e80000000020000200000006c2fd2b02e5c006a5cefbaec5a84fad16d89cad0ddaa6bfba98cdd371d4564102000000043a52dfe190fd0c59806a1d9e7f23d55b97d8d38b157d8baf63908b4f3578171400000000af3e7558802e23ae7da2dbb1ef3d9b1d9bb9acccf19a64b4bd12966eb2de9e19a8fa39e83a0232eb84a7ba8d8b26c85ef4e2c34b4c76d6c07530b2da51058be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A35BDAE1-A889-11EE-B989-46FAA8558A22} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410263834" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805a877b963cda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2748 2336 iexplore.exe 28 PID 2336 wrote to memory of 2748 2336 iexplore.exe 28 PID 2336 wrote to memory of 2748 2336 iexplore.exe 28 PID 2336 wrote to memory of 2748 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12512827d85efaf2949c64306489d417.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bde501b03f67031f4eca44db75786d0c
SHA1e37506ef520f7b1862b09b84a73e6cf5d68dfc5b
SHA2563fc9677682312d6ec4ba22bc1ca73babbaf095479fba9e78694515c4f03b906c
SHA512a225ebc709a0610a5afff035f7ee8bef14454d802c5f40d18f421d2d52ee702ebb114db40a5732ae7ecf6b065f967a2babc1bf297fed637a3e41a377a531f8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a70b556351d92fbcd4b08caa824c06f
SHA192787c5745e041c67233d28bcc9deeda503b28c6
SHA2560d5210142aeb8b29f80342f2187beddea8f54692e1bebc5706e25e856cbcb882
SHA5126f6f96a250312ca3fc1c85f6d6b1ca1f97944c9c273021992fbc05d62fffdc164213f9c326cd0c9699a733116adcd5313cceb9ca5a67fe8e0335f753c60c0086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bf21f3469b8dfa3fc6fcff4198b0071
SHA1b6432557cb86355f29b58d1fdc37491092b65c0b
SHA256e8f875dffa11ef53a94a4940166b973b974d5742858e0c1488cfee8c46b4af16
SHA512514d5398c1b6380263d0d7ff8997e90d6bebe01be33c6732756ef451b87ca4de52ed0e69ad4fec57b0403d751c5ac08425970879a6ce49246f062495425f2544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bb260fe5d25e80fc346434401e32d1b
SHA10b6a2d5545990a3568d8b178f5f81c34e06c9e87
SHA2566a5a1bf2496cf3395634176488307c270d22fcd0057982d4b7f5ebf1fffbbf28
SHA51202afb225fbcb1d9b590bbebdb1aafa1389ade7455de620de07413a8603ca8b6008763030817bd869d5c650d58177ae6978a45494219481154dbd9b0452a22721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3f737677fef567579269f84369bfb9e
SHA18bd87712c5a2269f66e20fb64ac6b974392a80e0
SHA25670cf7f1c3163ab6affed2c608303cbbe6e40a857102c910e630b485112348ca9
SHA512b1c6276c762ed00132b9da5dbcdbc9b91f5dfa87ea8a5fa98e464672eb152ae36711642f1a5012ea315df819ba2b8265d9cff0bb5c9770bfafbfb97aba5ba167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a8cc318bb14176e4ccfbe5c29b5af15
SHA16e1b1a863d21f64d61aaae82cd7c55e31abcb170
SHA256e2c0e8b4221a5284d537c0dfe774be40fb20351850012891a0469768b5c4953e
SHA512635c08f8e4a841438f5dfb4d94266a37d5cc1c01d0d4efa920cc2aa9bcf2c7a746711bcc4148bf10b51903247acbc01ac99d99bbad8ac0c16c6bf19700e76248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcd37a1cd4b8ada25106c2cd49371d84
SHA186884844cbb53ac9018e1c37d5af412a4438b0d8
SHA2564a2d8a3ff695056fbf27d7d7b329c8aa4b657f1bd7c14dacc60b2bc63f999946
SHA51286039e718c9478065a2485c462a399301292e0391a0d3bce6866a840bd9f9100fb0c42a82ad475215361b83efbaa1b983057bccdb372690114bc06aac8c5ac2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56763dec10efbcc842556929c16700c07
SHA197cce954689abc9324d489278b430a3d807506d7
SHA25625332c11b73ee5f11ef54c64ab0d395a88c2234c60a1a47b48c0201ee44da63b
SHA512a3d142906d9d478438fc556641db63b330f45ba098c83ef9f70b0ef9ee3f1110929da61a0be055a48b70af6817e025b528a787875004ff9977d2b6fc61477796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae3443b5ad5c922c8f6b4bcaacf5bf2a
SHA1bb58531fb6df337443386a078fdc34415ac601cd
SHA256d3d6a28b3a90fa941481d6f479c55500bd755469928b567ea2fb7f273ecab268
SHA512a400bc8d84b75510c3c75c5b11d352f1b94f56dc2529737900b9f617e7e8f869af49569673ef717a3dd0837d9c2db07426dc5b91f83fa535016ffcc649cad73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9b02750ec6239805e0b7426f8b9696e
SHA1a7d0ac585e49f18d14ec005e44df256a6517c578
SHA2569c86082f9215adfb7f25bcbff8e8657e12837633ce214729998ed01d091c14aa
SHA51267c61da1e9b17d7391f9b42992753bdf156e79ce91bdac29747176b59b9969871cc2f0e6e6be660e2014051eae05aa383fe261de0c8b1103c109c65cab91dc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a5cd1bdb4fdc8b9012cfe81ef595595
SHA121ac4db77604827a0ef2ee6112ebb1f6f555473b
SHA256b1b3d90a46b6d37f870735c39c36ff2248c287faa19b01a6677b4728c7e96d29
SHA512484e4175cb4ccbf5075840799661964533032b811769fd46bfb60401ea897979e67f371319af8a81eae796601d7b4424b0a9c4fb05562dfc8dc4b827f7c9dacb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06