Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
1569b42c469d62fc8c532b0ed092e249.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1569b42c469d62fc8c532b0ed092e249.html
Resource
win10v2004-20231215-en
General
-
Target
1569b42c469d62fc8c532b0ed092e249.html
-
Size
19KB
-
MD5
1569b42c469d62fc8c532b0ed092e249
-
SHA1
93e35ab899e3936e71b3dea96ffbe5e6178ba38c
-
SHA256
5e5b643522ef347867d3a0526a116a95b1b51c0492d6708f5f5d66005ff32d50
-
SHA512
5413439c0011fb618ab53e55fd860aa756457db5fdf8e1e362e1de0c9a3a3d92a9491563fd067c493d49cda215e8f320eaad2121b15685551407451c52daed12
-
SSDEEP
384:rcDTaFE4r8ThuNG9W7rmKmAdKit1tpj/lJ99oeXN4Eud:rcoN4Thu89WvxrjBhmeXN4Eo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601014ee193dda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{160F79B1-A90D-11EE-A1AA-6E3D54FB2439} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000da690a8484cb1ffc5b479291b87230aa34b07eba905aad8b2f05e7e5904429df000000000e8000000002000020000000d0f06028ae94d37c59ce2edc5d1b7545e03dbd978321948a5d6d4dded38c4136200000000a9fd22d69ec834915aa3807652000455f75c8a98efa0e155841c3c0fa03759240000000ab7bf7d8d165bfcb0f21b4c8284851753030b28905661004cc4d617db23a1674794cd984369b8c40da264120aba0d38310cb0a2ab719c2ff9d27702fc25a36d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410320288" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2680 3068 iexplore.exe 28 PID 3068 wrote to memory of 2680 3068 iexplore.exe 28 PID 3068 wrote to memory of 2680 3068 iexplore.exe 28 PID 3068 wrote to memory of 2680 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1569b42c469d62fc8c532b0ed092e249.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed90b225e09a6d66e3ec802956a44786
SHA1fd4159a586fb3d8074ff7226e9ac02d3797217c0
SHA2569c192d7db01647b967a29d870f2859e9b43e86496b05ee215ac4e4c28c51bcbe
SHA51269961fe271f2b80d18eabff4c0daecf4e2b055af4f0f186025a8c11cf7ed2d48f7d75afa6bdedf10e50601db2f030d267405aa492ee5e7ad89cd79c534b90216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9b77792a08428bdf39d14a99b2830dd
SHA1ac00bfb78f5b0bf564237ffec5fa1f09f143e1e7
SHA256dab228527dd6cf56ef5f28960c94af2f721b21360daaeb9545c307bedf4e5687
SHA51208657d2d4b071b3f98799eceb2024d517944e371d56d3bdfc57b0ead74b5b0fd866a583b4bf3cdc86b7a7a1edb3ae09b4ccd9029f779cd80ce520aaa61eda722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb4981955c4ee51a7e4077bc3f354562
SHA145cda2284ceff10bf4d797b8dcad5f7739456f6a
SHA256a660c1ddd8232135d23aeb4ee73548a86a97387f2ce86b8f706a040e092a7f49
SHA5123713ab8493bcb9e70eb443f47dc0d8c96e8fbefcd24ce36afda9da1c7d77b215729da7e8b3e5c87a5a5c0c0784f355906bab6875c2a71f4a3bcc8018102f7c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5611078cb4d35a1a52c49bd3a5a49ec49
SHA1845c7a664a023705c2d47fbba1b3c5c1ab32f628
SHA256f6ce21a19ef47d86ebc6dd9b7bdf50a0de57f90a6393d7f5910e965a682c09af
SHA51262be58eb15d436e5cd4607ca8470bbcc3df83bf54d7c800b3019bda0f446079cc1679b7dadf0c2eaa418ef9dad6da164ba67620ae235862e38af985677137751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d000cad6895fb00108298608d5214e7a
SHA1682a7fe8100030a54b1f5d468fa1cc43992ad073
SHA2566a7cb89ea8a07c4f2d667e68d355c93d7eef6afe3c22d5c14630284592a64b4f
SHA512b70ed15cf251eefa988bcee4a6a171fa96ad6a6bb6ba6eea2e3491de47f0be6a69461e37b09ab27fd2850a72b9a8b66758d788b38b3581e2ec510035c50ce491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a20394ba243a8a7c07717005e6c0a90
SHA1b8ae4c23af3953e80a181b5b0d691d59d1037606
SHA2566bec5cfc1101b3fc75720d349efd6419eb53da5711adcee95758a5903cd8e1bc
SHA512b85deb230bcd2a06b8b8cfadde21f26b44cb4a1d84c7fb258171404e459fa3e1f979291c36c82298eb0170b8932541f35e2f185d62b5eb37d9cd74cda3a7f4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1170eeef85bce6697d004c24ca9ede8
SHA170bb225b4cc6c5571a6a6e03698403847f333451
SHA256c520ffcf146e1a7e90f7ca0cbad2f91041d1adff715197293e3279425e428c86
SHA5129f1e0168e121ae4ba6e966dcb883b2b37665fd8cfd9980d203e36404d300e1b3a19fce8118886b1ad1150f380641d0a6731d12d0d276214b8d352a2f1453535b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f9acbf82895f7fe3728ee81fc85dcf3
SHA18e5c2bde0a53aa3d7c71dc86ba25d0d412608565
SHA256e0b3c1194e2147d275c8ead3e91701671186065549d62b4f9fabcf5599b53dcb
SHA51201a78561cec4e36f6f5f239b674639c8571b56a43dfe33246ec96eadba5db04240f820081a3b5e221378fd9b4596773aa863df790e3866c8b5d23d2fc6973267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2bd433a93a144c19ee07144f591c696
SHA13545d0c1359ace136baaa19c0873a2740e3209fd
SHA256cb5b88d9ff309c0f58c3fe87b9fd19dc95a6dad9e2c50e6fbdb23247b507584f
SHA512d3cfd692d22a579ff8fb066f7412016de556d9169de17e94b685d4865f563014a4190d5e63af4c54a4e2e29d118d10a24c191333c4a76ed5407068b57b48d786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a7356b4b7f725d38132a9c74aa97c60
SHA19157127f1c6286ff9f4d13ea5c5d841ec8ac3824
SHA256bacb76cfb7a7709c7780e83ac87a25b96a1c850eeb692bbd1e87cb49396b06ca
SHA512638c5524c5dd7b4eeebf95e8f911e9b6f1b86b2e2d8a93430fb789a2eac5b4b268e2373c27e06a53b660ccfefec26ca599ad7ce7a176911eb9a6fda6101f7116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50906b1b66e22c4ecfb6d259c461b1a2b
SHA1d2cde44379b0b564704c5d0b9ebdec26374f6bff
SHA25629895a313bbeabd2b330477b0354591d3df9ca06b32eecebb7b7bac9fa5c20da
SHA512e3910a04ff69f4ba30442bcc4e7b51d04c5258c0a16752008a4ea635587bbec6c2552946eebdbadb2001975b92da1b50b042a94eae62ea7e8490d014801ef8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e66ec01c48c3fd996b732f897aebb4ce
SHA108987f447b56f5e29954aabe1d0b49405e1c2a18
SHA256677364b6d2479267b545df1e9ec7819e23dea1855c0baf6fcf5d21f4573236dd
SHA512badd0bf4aaee45e4ac74f5e292e797f4becf7009bd75d3de057856f363d603c8a5be18fecae860067b14a090f3b4689bebef298623ad1c8d301c00089b9b7c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db4fac56028113eb4be3964dad12bf5d
SHA16564d34966609507ed09da872209b42135aaa9c8
SHA256a5399cb7f3b9aebdc653ed2187424de19a78418f7c42d60681d0bc9f3de45624
SHA512aa8962bd475689640204f8336fe9133ef0fe333f1bd0297a2d4c79950babfb6f420fba4e7efeeca83739696f701989d46bcdeb58b55530261ff98b45c8d40e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c02a3c6f52c103e85671a902d44468e
SHA180ff416f287c04f498084396de89d2643ba3371d
SHA256e67ee058383a8b02a725ef4df911e7df90c23b83ce8c12e7ed655f5d4c7ff66d
SHA5123cb94c245a1a831bf30f352698e2649a59906da5489b6afb6fde303c5072c86f35d2e3f8cc54e29a363d2d44cea24f4079ecd6ffa789aaec825c53a216341e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e80d5ae2e25005f721ccce4305f6e82d
SHA10e848b364c790ac2e0818cc8f4c5d6e3f97b3991
SHA25667da508441a3e32417942c9ec4d87f86a0603cb2a46e394cbba1554f530d3b2e
SHA512d584cd8586d18812eb9e4bfea652ed9ef4336c752398c3d1869f2f60f496d3694f0df22c088ce225aafb7d38fc8cd7cee551fc51eda7409aa2700c1b888a2f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5721453b3d19ff30e71d8d1484f60f625
SHA17441425386f6233a90e26bf31154786c94f2057e
SHA25612a6ebd502a2060740a5568d49eb0b0b12b8ff41d34c9a72fcfb9346d9a931ae
SHA512b4a0d6c3d70f946e8aab67e59c620e3c99a00b520738974cf18622446188be753532918ade8f5eb4e9c3001070a95a61e67e9b87b4951b66123e0189b361baee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c41ae067a936ddb77e9845b3432d07
SHA1b1949570348e6582591a532b4cec6f941f8e8243
SHA256e200a2f8102933882c792a5e0cedfc0da957d1f76390d3d3c5e90bd53002a5b5
SHA512157799a44cd3c5e8e8e632a3656e804e3740ea2b5cb84528d09528ec6cd1b762458666acf3da8d9d4ad6ec85c3b442d21e6d30f2be6662a6df42b933a23d8320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4ee90a257827ea127a997d300efa62
SHA10a418d574c2fe0b29316e7a03d5c2b237fbc1b33
SHA256eb8217a8141fc9a83bac8841bfbb1d5fe101c5c0e9fa8300d6fce5ab273016c9
SHA512f10d9b2edb6d1785caaca379b77df6b72fb4d28f5d69af8efb30024b23d7be28b981c8c61dba951d616b4f323f9c35f53fd27f4238f1ad1f651ed807910287b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\geovck08[1].js
Filesize6KB
MD5ff056f5e62d322e0ffb8006810432ffa
SHA16808ed4019feeb2bff2dc335ee8bb15b2433465b
SHA2563250a0f23574ff6897cbc4f49c9bc4ed6dbe0192de6e12daa2fb01d64c04ee99
SHA51294f02459d6b0527cc553001f0379df19eb10db181c475b43d60115a3ce434af96cc9bae5b372b960360570ff247616f09b7279792b6286ae2ebbb5407763e084
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06