Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
1696409ff5d130088b49c31a4fe2d7b1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1696409ff5d130088b49c31a4fe2d7b1.html
Resource
win10v2004-20231215-en
General
-
Target
1696409ff5d130088b49c31a4fe2d7b1.html
-
Size
61KB
-
MD5
1696409ff5d130088b49c31a4fe2d7b1
-
SHA1
07351e4d1e111c5ffd4cbc0987ebe6fef40f6108
-
SHA256
38e4bd3b013837f1436fe8def35aaa01521e70aef0d2ec0aa686cb304a43f0df
-
SHA512
6cdf832b6d71109bc55ff08bf53504685a118779dafa0c7098b67942cc594f06b8016352eddbcb5bc670411e4919fcef678f361f618e54c50044715063030128
-
SSDEEP
1536:/6S1gGkNO81ydRoblTVCCoOy+6fvvQFTnLUitQL:ySlHoblTVCCoOy3v4FTnLUitQL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410205286" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5323D921-A801-11EE-AEDD-4AE60EE50717} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000002495f608f871f70ff552893b6fa85b34837aa309a8f012a40008aeb04150e00a000000000e80000000020000200000007650906461d6a2573ea26dfd63f44d9b8ec02374fb3676dc319364f3544ed3c1200000007d67ee391202e4980b279590327f1514c14eebf195ba2de6a6b74783a0bc913340000000ce965be3d0c060381200daf10804e8bf58cc77f910e82b885630cf954e0cd5f2f48538d4059ab9cf66a075cfb65f80a06ebddfbdd1a7dcb365a5d7b091b1a4ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701bb5390e3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2628 2632 iexplore.exe 30 PID 2632 wrote to memory of 2628 2632 iexplore.exe 30 PID 2632 wrote to memory of 2628 2632 iexplore.exe 30 PID 2632 wrote to memory of 2628 2632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1696409ff5d130088b49c31a4fe2d7b1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52aef979b942ec6a79cac9ebd5e6790f0
SHA18b2fe73d5771e4fee20f5d7e8562923f39480095
SHA256d6932f1c5e810ac10f67576f79996c969e1bfd2dbd2e2f3bc3a87d9d30d7f1a9
SHA5126f949dd59b00ca7f10aaa24d8f6535ee28d4a5d0ead2a4d7f57ed79a8f6daa20bd2f69087322808b5577d8545aa373ba610aa71602fc45ad856d2d0956cbe862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a21da987537f8d55e08f4aaa9b3eb6bb
SHA17640b9b8fd28a5509cf265bb111aab40e0cf7d4c
SHA25688b90fcbca6a6cf5f0e65fa5b675a163dfc3532f88828278ca7966dd8a757022
SHA512eb7800ae54815ad395f6d0e947988c2ed913833c0c75c66f1a6cb889e69e476b29bab8eafb1fb6b9ccad553b5efdbbfb1e0963bd991dea641408e9f03e017b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7dedd6337705795b1ce436df2ea0ea2
SHA18fea453acc637b2dc57a6a9f9dead454b7a42572
SHA2568dc3d0b4291fe7a8531b5e72b0cffd115cfc301ca81bb4cdf661b81dc11f6ed0
SHA51226ca30bd8495a167980857de85559bb550d19386cd1f9832c4e978cbf7a0af2ed0c788c61ae89ff1701216b1a4ca36e1f621496ef4189c29571d75ada62fa1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562ac8df29332f199fd98363797ee4ab8
SHA19c5f16a9449701c3ba3bc776f9188efa9f453d26
SHA2566eee18970bdb75380385722b278c4fdde9240ba337990014af9c8889a18d845a
SHA51235a8db4c62d1eab6301003b5177a7b4c74266c10b4381f462f4e9b5d0949cdc674b1dfdd872ca9faabf607857d061e8af3ae51e7769566de3d501d6555356ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e29b03acc709d087cd624a22bdb6b31
SHA1e1b79961e6d2df1f5a0b0bd8469b110248f510e3
SHA256ff92ab9cec34430c7f68b77a5d4fd87b8e9da783671df92e8178c678582ee9ec
SHA51235820b70e0124068d1d36890e72cc97c662b0e1428390bd6111ba8afdd5097577580e4d032e66d6f4489b145c6116f38cb0f56e880effa5427d86d30ba6e63f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5897e6d8b0befd6e9f5094d74e9661989
SHA1f3ed67d6c34d369144e9319941ece1f82038335e
SHA25659e8301d363a9dbdd3a17fdb99417273b3771e157e1c852a94e83cfb0b4c65b0
SHA5126ba99c4092a49cdb4bdf279e7f87f118c553cd6ce78db9518c78badc5e3f9e2c9aebf3bdce834b834309c3a95ef5d594056aaba3981c44ee1de2bc6d1b099688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cd6e8880bed660c5ae6f52eb8b59648
SHA18284525f761bb936408e0ec4d0d841f83829f784
SHA2563f54766cb3c868539cf5b678bbfb22c731eb45e7589c186dd415103041aadea3
SHA512c5fc3c491573ee4f52c1c9cfd0893cbcc21ca74a6f30f02ce862460f4a761da6dfdeeea2711086b73ffe7401fed7615596124bfd074d082b5905b86b8190dbab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ac3c0bdd3039cd80b59752578d11652
SHA1d9ec76399c6f8d73f373113d1c4eae73ada3686a
SHA2564801c0dd491611ee1a4b8c07a4af970ad54b1bff011b4c3764bbbe86859eac74
SHA5129a5fba2e4727938218da7aa7da4045adeeb4c4d749808eba48c2a4b518771dc863f69b71713ed154c38e1f72da934fc200e0f309ddfff54c64bd5f8ba46add58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a91b8719a45857478d8256d011f15beb
SHA1c37404357b1cfb47a3cc77a899a90ab42b7a2898
SHA2563ed8ef914fb6554d96fb1366c1e1ab40075bfa58369c1cf7726d6a170567dcef
SHA512ca6afcc423bb3100bf0a21acf2fff9bbce4896e3e8fd02a25ec3c2a371c6d74710957ea33863d0a1badb036ff4964469d2529cf96e71043918d299aab4e6e2ac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CFHPCFFP\cb=gapi[2].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTGCPI6\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06