Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
18125f48e08e3ace671de16592a272fa.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18125f48e08e3ace671de16592a272fa.html
Resource
win10v2004-20231215-en
General
-
Target
18125f48e08e3ace671de16592a272fa.html
-
Size
68KB
-
MD5
18125f48e08e3ace671de16592a272fa
-
SHA1
7ebfc08338269bb022e659bb471d1dbffac78315
-
SHA256
0278e3f211656c3f8f98be480f3709ca6597cd08802e109e4487c21b6758d6dd
-
SHA512
ea93d766c77b90539e872ecd29686a1b80b05aedd9fcee5f9ca9aa03fdf560b67586c2d02767ca3a0acec8052cf54064fab734c086e33742fce9a07436e30195
-
SSDEEP
768:qpBBOAuLT6bYN83/y9/9wXXh5GDcDHmzAPvutb7YhVyVTVoVpSVZiF/rlqKMQ2QX:qrcAuLT6bYu/+Vh3zogHYVrlrrMY+b4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6BC74A1-A817-11EE-9AF4-C2500A176F17} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410215013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1340 iexplore.exe 1340 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2424 1340 iexplore.exe 28 PID 1340 wrote to memory of 2424 1340 iexplore.exe 28 PID 1340 wrote to memory of 2424 1340 iexplore.exe 28 PID 1340 wrote to memory of 2424 1340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\18125f48e08e3ace671de16592a272fa.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5065a89dc24ca7b403eee87d5cb504fbf
SHA1b1342831642764957af46b160e1f2697d636fead
SHA2569d73f1e11f80a3344216870a6267e04403cd0c6f3f8a7707e46d9bd08f9dfd44
SHA512e5e51de37617a9119b09965efbbf5851de432f739a75621cd7d6e838e612c26a95a4cf0e803662ebabb2bd9fbd485fec8b85f5b708118c0a70d77f382321510b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506bc8272a4fa755c255c4a30cafc4035
SHA1453eae07883f7b106f6f151439e47ff8b22a28fa
SHA256b7d04c8fbfbd6c7b37eca02ba982262a9cb21aba82699350d401ed4ea2951555
SHA5125f945783efd128434adb7db5a948f3c871e03f060d2f213f89595cb5c263bdf6a16496efab4d6a50c2da22f5b7219ace146011b241c2be68b5c7332556231677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ce5fe2ade10c2e2db6c1ae24fde7d6
SHA15912770b271bbfbc5761c1eb0314889b0a6501b7
SHA256f31b9bf2318867b83e06316ba4a86c60d62a22211592c9141693fbb066dae288
SHA5128d0f9663047dce4766888b426d84249e872dd6c89084ff97eacd6ce56014ec169bf661f81c45ce97dc5b7a6136d2c77af6c8a741d0498bbc67b89d3483183358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551ac026a0ae9408e5b03d3d81110755c
SHA16ec3b3cbb46a7723aa6479ba28e239eceeb0a006
SHA256fb3e0f8b61235b248edf4c50d52647cb335593762dd6a878d25eb8eb87e5aac7
SHA512dc95ecd636b23b0f33528671ac9d91ef9fc92c6f3323b66cd86e99008b49654dddfefc871d8c2c029879826764997cf142449f7edfe3b3cf0c8f7041180f75e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56759271fef717bd5d2867541b575c2bd
SHA1c30c3c20886dd23bae66abac42078b0fe8755b30
SHA2560f4d003fc913d289a1474762423ec89a68962874f72ac8bf9f7ab4331f41ef67
SHA512e7272bb993737739bed8e3ea4a1fa153abde11994c26766dedd437fd654fd44ffeceaf2acff6985442c7a200f932f3da3a2a387d569453eafc856ac16efbebc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa7d2a029a7b648cc9b133e7df69edbe
SHA1ddf5a2b7b4cd2853b98723f0ed359fa02b70f2d0
SHA2568f78498d8784e502a3a7f24f679010feca5ced6a0e60f85f5872232834632180
SHA51277b86ec09b3a1d5f977f3195554132d4350c9120518825c284d40753d9b2e87f61e9a5fa0ff7bd8aa671a3964bb12a5fb090bd4a6668b9b3dcbe8e04dff9630d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd2c281c584dd220c318e857d69f9489
SHA1e3f83a2b1317cc047ae163f756a830f47ca6e971
SHA256e281e81a7b6d7508403030aa9b23b6d2e3e1d44c4f5dffd68ff3a0b321af45fd
SHA512af491bf9a0ce2f1859b8b9913ee9301225afead8649e23f1ddb15ac70fd8e9f90fe49a2b4762b682fd587a23e2d213e8fa04c16003c91a4b55bf269d85045c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a662b273aa9e14e38bf939607bfd84
SHA1d97551666b565968811db4aaa32fb0c6a741e0d4
SHA25628eb7c96d617148d1cdf2566cc144c4a459644cbd4abdd3420c81c6b97f0e5f2
SHA51265ce0505a553bf90ea285f7cce704127d1af367d9c51b6f9a02f152fd2fd69cc28b568e1040f51d386f39efc9d6e10cd7f9176b20c8645a42b687d133c740828
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06