Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
158579ebf405fffc781842f04bc41b70.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
158579ebf405fffc781842f04bc41b70.html
Resource
win10v2004-20231215-en
General
-
Target
158579ebf405fffc781842f04bc41b70.html
-
Size
121KB
-
MD5
158579ebf405fffc781842f04bc41b70
-
SHA1
7d5023925a001d39f1f7ccade276f1ccd120c2e9
-
SHA256
ad7e2385ae00d9413f29cf2a1d5e4808112ec4bfc19d617c431e3635cd57e99d
-
SHA512
41b185517072bab5a82a57025b528def3cc8d68574b72930d5804ce7fb446a364903cb74d8c3c260ef99c5ca4fb0f0cc217b2b93945e62e87bf18451283be3ae
-
SSDEEP
768:/xZt6DI2eTqxv0OolnGVjQvMsPa7705By6qrv3bUA26P607zX39HsjwPFIM9A+ZJ:/9bTqB2nsQSr/WziddA+QwCUqJK3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9027014ce33bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000700521f2dbda7a7bafce65ec24978a0130d7b4edf36a94174ccecc5cccee4616000000000e8000000002000020000000fca34924de5e1b74e2c2140f71de96f098a6d54f780202310717d31f89da32c020000000c6437b9154528d8b4b5b872a732ee0f09d7f80d0e93ff5745622b4c3ce3b29a1400000006eb33d9443b83e10c47db9b90804ec00a1a051ae191728e253ace76f3ff9f611144c56d5499b7d97eef0e45ce736f4d7b70a427cad191f3dfc99323964ce6d34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410186796" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{472086D1-A7D6-11EE-834F-6AA5205CD920} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3020 2964 iexplore.exe 18 PID 2964 wrote to memory of 3020 2964 iexplore.exe 18 PID 2964 wrote to memory of 3020 2964 iexplore.exe 18 PID 2964 wrote to memory of 3020 2964 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\158579ebf405fffc781842f04bc41b70.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD549f84a2c1dd985eccf62262066395b87
SHA1a2937fbcaaca8eedb639fd20571d8bd70f486e5d
SHA256a938cc8d8f8d4abd4b09dd301a830ac4066076a8733e44515356cce83f0b35f5
SHA5122860e54230c99050cd24e8f6f5f94045f4190a307e3646d9e7b1722ef329831cfe2ac44d75ce2275aac980c8738017d8bd24483d638128b48a1651ee0b83041c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ce742a907a9960125d33a03704f97ab
SHA1d0f5a726a08475cf3d30d1ce6faff867143407f4
SHA2563cb7d8ceb30b972b1fafde8c2b807bde004c52e946dd4b4651d1e29369dfef20
SHA51218d2f4941d20c3170a55aaeea9fd7142803176d86e38d159873e83cfc9e6a5d8c8b8fff2ae4448a23209eeafd7f0a1cba100dcd27c5411d9b0adf4bdf53abe08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee9ab560ab8f7f07f1d3a445215411f8
SHA124c2f3bf7fc89676644547a18cbd3acc68782de0
SHA256aaf91347995de2c167267bbca1026ffd353b8429f0d9ae73ef5b6a3e718f1007
SHA512b032bf0f2c9278db7ba3481ea033a968884b9138db22094dcfeac2654c06b9def6cd3d594317e229da110811d7c8ff6e548ec825ecb09eb0a4fee7055b6b53d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce325ef57604b3681be59f053105e8a1
SHA1a8cd1ccb7e64a318ccd49efaa1ecc2e24df893a1
SHA256af2642a3bb918b9ad18484934f02e51d98ab8aaf934a0bab3ed44e84c1da6d3a
SHA512fff067ca0587062667581a1c0c13ce2a5e581bf8cf32aa7f5fcc3d40683e3405ff623aeaf7226b85539c7131e8e89f741e133f3525467fafb223d6530d2192e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52107164f40107fdfccad4f3c8816486c
SHA115adc43fa1dd9e09a2a231cde13f2c498e5975f1
SHA2562c30078bc3e7834db9b80c2640d737d18ad23b3c190625248a9fa6233f0285a7
SHA5121ff2253f1023a50f165527b2c71f556c4203a99efde3795c6126aa1bbe58833cae8fc5916e3b6ead139cdf6e7bebd32167a7bda9ed78e8bcb4f4b800690cf9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d3c23c1b715170368655e08b76086c
SHA142cf444708639287671a042144bf5c48323d32c5
SHA2560e9ebe8ad488476b80e89c82bb47c2b2a2dfec2837c755f312c277d8cb8f75a3
SHA5122032455967b7d3816b447ccd33a47d178fb17a1645305f1e24305fbffc516c2394d2f251bde2a6d1ffad82a82e00a1c463e2540ec257f3baceb04a14fee7c602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d17e9f64c8f0bf491e5720c0e73e6936
SHA163a19297a4dd9d39be3c37f628e8037895f9cc6c
SHA256c55f40083869355fba7d0f849902fa4ce705573bc1a1f581807a3ed2b13ea37c
SHA5125387b43bdb2f0e684206de0a3d8e6b8dc64def2891821676e0317763b3b19030ad8715bdc5803b411dca697818c35b22ffea86d7f26ba9834dea4b295f033fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578cd39d3fafe408ae08c192ea9821622
SHA1ccc3917f6ca7bbe7960a5a036ad9497aa5069149
SHA256e6832081cb988ef8f70da269b58eb6187518a03922add79dca341843f4d9d0ce
SHA512bbd9ffd0d939b9c14dfba254d7ef319b1df90b1eb96081adb1143c4bddb0669d966781526a3c13a5e9080eb6abec70c9ea31222f3cbdfa531494ef35f900bb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70ba3097f61f336f05b6492da392d79
SHA1ac0ae4bd46305576b3381dabc8ccaff8a0f47df8
SHA2565967bc664850a9db07f53b7635c2b20ab3a0da874f239c39620f18043fcd8a19
SHA5120bb448c1102f7de035097d73b8c03d00aba9c85ec02eb558c17057117deca335c2aeeecf617fd74319c28d6d93afa4eb34271cbd7ad8d33fde802f09311b41a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542a6c365b7c566965eb6fc454728b5e0
SHA19eab1b6610444906d5b63a767ebf4ce6b5c78c6a
SHA2568b605a9b4fefa233d88ee833bc058a1b24c29c66a02808e5da9d851caacf513a
SHA512912104ab8af316732a89e62531d062404036c9d33096281488b350f467bc7eeca2c9e55b3ef71e6f63b3c65bf72e38bf0133010e79b4120b2c535fefc327c807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ad79c576606244a1d8fcd0242e5812f
SHA1d60506f06503cc0d6945117b985c968498b6ce78
SHA2569cb82d9289a50f98eea4d3fd474c3b9fee9fd45d2a0f95d0eec55d9163393630
SHA51282ea4cc78fccc56284979030d35aac37c3c308d18217e4ec6ccaaba9dcb7e850cd4fcd4bc12ee36a3ae339bee7e05f767393aacb93e75ca0c46d0db85d8a276b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba7994ca48c328ff868257b3011b4457
SHA19a088d2afb0daf2ed5e5a89c1e317274d3f950f4
SHA256b92c375fc7d3f1936280353659181f13eda482aca77ce7f78e0a1b54d9e9a2e8
SHA512f2c63ad1fae6afea4190d736decd6a097262e368c3cd07608bd6822e0540cbd3bcad554d20adcaeda9451605ae33d1632cce4ef3302fe5793b6f82687618e1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c41e49ab064a983a394b7259a116dc0
SHA18fc1189373797aa47e3e4dfbf780f03392ca2b0f
SHA2567111f2217bb3cb3a0eb5348e17ad5518aef1e1b65394f15a36fe3fb8d36a50fb
SHA51262e71a5fa98f5222ffad602bed61b0aa3d223e3d19f74993ab15db090e1cd9a6e7a92e4bb86137d9ab8640bc05e2dd8366ae0664b1e86e804f91f77c1dbe5f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b8c2d6e769b23a6b831b9fdd6c2ddbf
SHA10333cec445e711cc4fa9ac3a24e5515f1181b3f2
SHA256e100b8d21f290fd04192932fe5ce942ffdcc2039c752dd4027ef7225763da130
SHA512c7c15d514365ec52f9fe0c030f2ac388a0f3ec00f41d93409f139bbe21abe5600d73bf78646c9a18fc90a7f2f5d1d20a777804935b6d918499a5ed635f9ba5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD591c783320126bf6b214a2eecc53051c0
SHA1b35777035fc446b833fcd0e1a09f5c33b3024489
SHA256cc9286425710bf929f850a1fcf54096a378a33311bdea486c82c69b57515e16e
SHA51285fc9eb1991a79651fd743e82d2b4b6ac5fd896a8c5dd9ba58ec05df3f8f281fa0cbda12733801e6d06c52610bd4dfc12b7aeacb1a13fffbb731d24f903b3cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06