Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
1956d0ddc3b33854f32a9c7b14b90d64.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1956d0ddc3b33854f32a9c7b14b90d64.html
Resource
win10v2004-20231215-en
General
-
Target
1956d0ddc3b33854f32a9c7b14b90d64.html
-
Size
61KB
-
MD5
1956d0ddc3b33854f32a9c7b14b90d64
-
SHA1
1e4d6d9086058babe7503bd358ae8f21a5638a02
-
SHA256
8f748be4d74fad1d53e5cc31063b859a0b57e024625b00899faebc3648083949
-
SHA512
a271ebfadb5bda768ab06fd1cded5b83fe956e707571a9c57b92f8404680743030e153e706b445ff05f4e37a591689f937d9df19863ca872fd12b5f2b263b1a6
-
SSDEEP
1536:FHvYoFU288lFZqxUvC93IxgdR6TJGv8f6GlnKF+B:FHA6p8SFZqxUvC93IxgdR6TJrNlnKF+B
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000e82bfa5e7e89ce5e9fb7d12c3f9acc88f7c113f9f48715e97183458adb7d5cbf000000000e80000000020000200000008a8f4e439c3f0eaef2d8d98ebd94980d98ea319722ebc61bb9185d86563935ef200000001fee34e68a159e692a9c3d88fe085cc825390d6dbd866cc88e031563a2d350324000000083ce9fd92ef16ef00dcf0e9c5f23ff0043f22fc600788f278bc7e3ed6cfb3d1a06e055fba2553c9496d74708a6a6c8724e05d2a4da3ad812cccca6dfc11b063d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37823961-A82D-11EE-A3D4-6E556AB52A45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410224135" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f2a0153a3cda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2576 2240 iexplore.exe 28 PID 2240 wrote to memory of 2576 2240 iexplore.exe 28 PID 2240 wrote to memory of 2576 2240 iexplore.exe 28 PID 2240 wrote to memory of 2576 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1956d0ddc3b33854f32a9c7b14b90d64.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508e558b6122b368704b2a5c7535bd1f0
SHA16fec45705b888cc454c7c9c866feab6f546406b6
SHA256c4bbb4ee20dadd97ef0ca2bcf9625c05875b8556fb8b8a4944ee593b7bb331c5
SHA51207c19f517b726a1251d99bf078664e32906b51e0bd884572315d82699d1616728327be5357df82a409347963ab4e6c2612204127a5943ceac5417b6c18e16c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c038dc3bd177eb76c3cd28b1a4931f4
SHA1e96abc78ddfadaa9f4aa4bb2963bd08df2a21d9f
SHA2561fd9460ad9563c7fd9afc2d05c6b78d619cf03e306b5a4ebe13fba9281c5bb0e
SHA512c1078a2e0cdb7809aae92b52475e30b3bdd5d461796189b696037d027cc7ebed3f849d6f50791cbaaf98ca7b4776c3f4249b0470f771127fd0ac061c74c2c5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddff909677e50fd39273e4134a3df5ab
SHA1bcff25b10140c108ccce2ed7f6b388cc29e38a27
SHA25641d464720a7c3153d65a97fde9d4192bd62145dca20dc079e44de449c792f900
SHA512c8d8887733cf28a9315715bdad2d1fb2c3eb69d61604dbcdf5968d79a2ee73e3805b485932e92aa37634f49602e42551033f3073b64d2ad9a81ca9e0680572bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a805311a5038b23ee9ec5d2629b1cce2
SHA15ff59be8f04e6ba2973181f21324192a49d3575e
SHA256256d5de48d09d3a2b4195e7ef8aa92f8cc2704b9e7609081772cdac08072b730
SHA5126a60fded8ba26f787f859b7c0f22a9175aec39d5d1eded375c8aa480381082e07d27aa9ff2bebb01844829a354fd3b4565232d1e29dbd760e9b3b7bcc913e52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53814f72f873a65c9d1e97860575ae06c
SHA1245efda8d3bd967f012a4c5ac3dce1c9a4c43c6c
SHA25662a428d97e30fae651ae76e10b0f5972f45331d1404b37c65b7c2d7e7fb8532e
SHA512d4fc03986f27839c7de8e71f0d143c5c03644af43d15622ef042e8a206c9affd07a0733f120923cf67fb097cdf187cda41b6d071980a35ba3a1ee6092ec77fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e54f2755241c25238c9f52ac6681349d
SHA19a4a36109b7016fa6b6773671dad60686c33500c
SHA25681976bf260ff657fcfef1b744ddeee116aa9ba0d8c61ebc701c6a3d2af79c9f8
SHA5127850fcc5c799e24e3de5b1173c8f80f3113870281e2dad5913fff08a717433403f99a7aa51d2d8d950b565e12d71572fb51e49850c35168e3d8ff5420dac6b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3491f7a4e7ab63a7da4de041a96ab1d
SHA16fb345fdd0c43797068942612aa31503ef46b9cd
SHA256a2a02b25c356b13b7a177742e8afaa324e81db939dbf85ecd63d456ca4fb45d7
SHA5122dccc3db73dd4e4f8f28d6b48ef4f722876c0dbe57c820a1dcc7c5094943dd1b79b43bc324f997ee153e84d217c700b0146e6ea030ee356bb55e4ddc0bcbcdcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b963fba251600c787fdafe39b4c61a34
SHA1e44e2f6dce018d774d4374435e98fd7e144f81e6
SHA256707dae2d6449238482e38bc82c069b735941ffcd7538bbce763771f5a0477699
SHA512ffc78a94fac1c5c9b91e9182b61ef55e0b155762cce34537405068e92c3e6ab8cb5b27c953c94ce1def6cbb710240bb3600f23991e8737d52d3954a7dfe4705e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66cc78820d937268a61845d32955ed1
SHA180b95f0c1d196af9e6b89e4a23547548f3c50c67
SHA2563de34825a439ad79df464708dd89581174adf9c83279c9470b323af051cb1c5d
SHA51258a596ff04474e6ec787ea28b9016b79f7b6843f511920de1de2346a4b56d65263e2c2abb9cce366aa6bb505f3b6295e057a57a20ce31f743947bd21f160b56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d8170d4fd41aec66cd28bfc59039dd
SHA14fd40030a4b78959bdce92927484e08df15da297
SHA256b40aabf3792711498229947de2edbe455ae498ddaf467ae773069b45ab432af7
SHA512ad0e5b8b4a6ed791994888b9f414a7759601a3ff0bda4a8f7824560998ab445cf8c0fd70a23b7ddc765ad3e31bc4d1586bd47be015f457d656204f7e100d2830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c3e733ed07f7fc0b783ee147645d3c4
SHA168878d5bab65f6ee914371c442c10a364a1f431c
SHA2563444ae4e3de355f7b018cdca201564d5e038fa1488af81fd913d2ae0bce332ee
SHA512738ceaaf58992565616087e88fb8807e56dcae9bb32dbf390b79603b2b4e19b89cfb23b1d217d6b13e449ea2a445a8b6bba923073a3e952ed27ba9e2c74b9625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a8f59cd2009e70438b9ab5874cf9f95
SHA1848f26b2d3a2b73e3bcb6ac3f1650a8bcf9ca75e
SHA256a6d877842cb3f1e042b8b21da5cf2a7f69d9ce7bb69e68d6bd95a885c3f2e584
SHA512b31fd2ffefc02ab0ed0a708b505f1eea7fbcbdb507f35d8662a6e300e637a81d87c3d628bcb14fcc09a2396198345c747676f48166ff891cb3d77de7ac2b96ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5861a7e5adb41a9d9a2fa9714cbab87cf
SHA18334ad4cbebd2c7bf66be15a5ad344e5ab0414b3
SHA256e2710c4fcf3db0bc456ff41045e5ca39e077e4ccc018a277f322f181c5559f57
SHA5125b8500f38f9e97eb38071d205dc57320e63c54293e6b7d8e2b787897e42c11447b16a2830a57302d08f7076599f8a9eff39519db9c072f3c34496473f21f34d1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FIEDGG3E\cb=gapi[3].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFLWQ602\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06