Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
1776416bbb88ea6339d18060387f50da.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1776416bbb88ea6339d18060387f50da.html
Resource
win10v2004-20231215-en
General
-
Target
1776416bbb88ea6339d18060387f50da.html
-
Size
1KB
-
MD5
1776416bbb88ea6339d18060387f50da
-
SHA1
0db3525118cc940529fdd75ae61f2a46b2ca994a
-
SHA256
238486511f5180f8a8033f6befdf4c04353763b4a3ed83ef68c1a276ca80f82a
-
SHA512
8c6723cf874dc613c4b017d2e1617d8a2bd08801c2214be4f396c9f5ab61794031af1477249ef17f94ee4a4c5edb91803f6b65794711fad0968e65143db2ac6e
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC558661-AA13-11EE-A508-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410433201" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000001507c7cf44e4be7876ad8e3bcdc14d652bcc83f59f3fdb2a5b4e03d405a6b869000000000e8000000002000020000000f7d060e08e4c51eb2618aee3c5d91219d7b262d8d5d440e772f88849a6e6bd8820000000bff40f36121c2c43b169576d4b7725a7775d55816c468f05704de72c308bbb08400000003d5b8a5eaa9648d680d80ff6441535df67f768ce41871863986db766893a14a2953a96d3f01d6dfe37237bd79f406f9145955b1b5fb1477ffb2e64e11a253307 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2045b0d7203eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2772 1712 iexplore.exe 28 PID 1712 wrote to memory of 2772 1712 iexplore.exe 28 PID 1712 wrote to memory of 2772 1712 iexplore.exe 28 PID 1712 wrote to memory of 2772 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1776416bbb88ea6339d18060387f50da.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bedfd6abb43fc7c3d3d70b0b700e1130
SHA163ca1627a452ba5b74de7d0885afb5deed8c5ed4
SHA2565aa96c8d171999c8a7ee28cdae402eacb2ca986af83c755a6c3e32cbee3dbebc
SHA5121fdabda5bad8076543bd96d1f9693cebf6e18db203f1a213b7de20cc48ee4eee8640ebcefba0892327528b8605bd41d61e997b3133c9c4f594155d73ea642ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d0dbcb69914253fd566b8c9ac93acd
SHA142560d709badd59068a8dbbb068fecebacb8c793
SHA256a45c80ea940cbab18361b059bf6da54c7a9492dd020e82dbc7730210932864af
SHA512701b4f748700b3ad0af98fdd4e473f53ee4d70a32c79d81d5c8bedbc5805451b59dbbacdfb3de2c5694a5d1b718aedc9a9235ad1b07603c64a71997b3e628fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcb868e700c930c015b5c8fb34b0ce2c
SHA1eb884ae5d4ead9b3e6cd64934d9aa40b083c01a9
SHA2561dce7440edfba0879be19007b3ba0b8d674037abe0853c8641235bbb1ef62c1c
SHA512136fe240c93427dcab1ac64e64e3ec96c78a9ac148de508990593f8b31dc6dd0fd8ae1d19e11e5e131d979fc8872ecfcffe34a90b38b07e9c581b1ea6c176703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1fb9702fda16897339d86c7c30d404b
SHA120ed623e1142ad544b60d217d99c8b14c9e7b6c6
SHA256a4adb0711a0f17741f39239b914cb22a9e6378d05b39763948ac492d2d1ee1b1
SHA512d7fcbda8549a20713f4ce4ee85798b29823b56e414709bd5ed3751926ea5ad554ed069bc899020541f3c826f7c64883e471a6af439858f9bcce1f91485a547a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5755528b812150a1370524f42048c35
SHA1f61d82edd6cefe93776e4faed0bcb6fccd620ab2
SHA256e5e7f5e4a0dc4ff20931418fa0c2f07d84d7b82e0a7959e976983b89e5304c18
SHA512bc53675757ed23940339744cb3f756e63ebe450f847e3327d918450459dab30975958cf4c3e060f3f724c0072c81a187d20ec1d9e516a3755182998294291dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598557189800ea60ada8b8734c641d790
SHA1d9b74d6a9f353c5541068eafc94921a885d0d1f9
SHA25663f21c7c716442af5ed8d98c4fcf668a1f23a374e09057ec7f99c0e21a9912cb
SHA512efbcb39d9e328ce1e8be5630c14a64ae21be5d8bf71fff9ebdaaeff4a6fc2f5eebe1c357180066d654ad8146bc250479d52884ff95243f7326a387b3661580fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58df161c486f2d5a6ea220fc794671106
SHA187d3577ddac2ac0ec0c11fb4bbfc095b9bfc982e
SHA2562d86c60bf2cc27e85d0a7d7e2068b555f681833b4466eb131b9c2637fa5cba60
SHA512b76d9926333d23ea3d199e0c52e310e164301c1b933cb3bc698b93d1e0e1986bc86666d2e7868988efbdfb562ae61b39d422321af7d62dd8c61b2ad1077b0281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb0562e42322294bbc723395a175654
SHA10e74d6cc7972bb9212f833e898f62d4822464c40
SHA256c42dd54e638a050b055e38ece77d4d226774049c4b879c7172b835e55a63f418
SHA512c3242a862299b601da0af63b503ec592b4aa6209808e9f07d1459a6fdc0654da94db2ce3d7162b7fdadb063783c856282b871e08d34dae8757778ed531ae50d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561ed42b40879f9f2972de01ae94166ed
SHA1c9dc1c163dc7717e320d5294c6d069c13e312cea
SHA25638ffc7bec56dedc2cacf6e3cdbdec5358b4ac7718c97d5cdba1e47ebd2429245
SHA512d1af2ff1ed4e7ba28d1fceddcf7bf64c69bd47560a50f1c2025764811c70557b1c6640f9e1a3c68de6aabb0a0df68e3164c8c1e9cddb75ab34ab32e59a817272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4580cfa47b9ac5d4840e6fd13efb070
SHA11b27e47edff6b02b121b28a9f8c973465245ca8e
SHA25605d9cea9e4550c9e80d46b453d850b99cabfbf5849b3e777c3cfac52680a9a02
SHA512aacd646a320e26ed4ec99159d2573287511be296a3c603a22ca2af131d90b88e0299d533802728580684dd1d588e02f14eb509df1edcc3474d99749738d2ac35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582feceda432ea9978b4b626ad9ce3e88
SHA134cb6812f80e9a311812fd0c98993a4fb2d8e5d7
SHA2568806bc690ef25c40f4afa8b6c75343d9eb306a0cf289d75617daacdbb7e6e19c
SHA512eaac6dfa5d360892ede8d397e29bc4b11cf35f689c73843107307d27dd2e93fb028a7bafd2603b000330f0ca3551497cef514b3e7224d5d70dfb05a36bb93d7b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06