Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
1881c4e365cabf010642ad0948f2186b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1881c4e365cabf010642ad0948f2186b.html
Resource
win10v2004-20231215-en
General
-
Target
1881c4e365cabf010642ad0948f2186b.html
-
Size
12KB
-
MD5
1881c4e365cabf010642ad0948f2186b
-
SHA1
60c2e313dd779cbfecf1503f5bd91fa25c977415
-
SHA256
5d73207da7f29599850c9f732df4b819ed2438f07536648016f18aecd59dcdfb
-
SHA512
4b92348f9e9db4b613fabb5a6392ce392e5971f537c0c5f29455c50894795e084bda9b7fe037dd8cb165280bf4d43da958d718ee3d2d15eb7cd818345bce5750
-
SSDEEP
384:xy1R1QREDBeVliO3LCvU2ee7Io48TXcRaY353CPRrMO77OM0TCtxYLuZ4mXYHbw0:xy1R1DeVUO3Wcz+Io4aV77OZn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000002a7f85496399c049d51128a3338d89fb618388736c5f57e67788227d582e5749000000000e80000000020000200000009181ba201e9672795f7d050527bea4afdfe7644d36e3aca5ad7b79239c18d073200000000f97d3dc2ad9d6d3f5f7402000f5b3969c0582a39ff6a30613ddb6d113293fa1400000006c430b217595c1c57cb75abebf401fb80ce1434b0f6c601dfac5b32fad0f40630dc98e3bf01cd9dd30632e30336e40f02a570d7eb5fed60a66810fea8b9821f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0482e47373eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410442851" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{729FC631-AA2A-11EE-9610-464D43A133DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2004 1740 iexplore.exe 28 PID 1740 wrote to memory of 2004 1740 iexplore.exe 28 PID 1740 wrote to memory of 2004 1740 iexplore.exe 28 PID 1740 wrote to memory of 2004 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1881c4e365cabf010642ad0948f2186b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1f12009d35d1366a2aa8cf33f8130eb
SHA1729019e3ca862dc7be0b67d0ddeb6a08a9b5bb7a
SHA2561f5332484ec3fa27d838056c8c8cda9fa2007ec2ba70b4ea8d844fa78b316a51
SHA512aa7b630077d713277625b2c214b8f36b3b364d04e38de2cdffd141b6434a918ea6b7ca5a5d64b9b5a99c48861c63ee8df748752400cc2d2c2e652a5a011acc0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e870ea413cb5f123d39862887c9cdaf4
SHA1e24dc57544c8717c4153a3687d32a9c13eb9ab56
SHA256a6cec64852adfe702f796ed1ffc390c01a19fe2e22ce58ca1d7ac7d6287d3b14
SHA512b557f8830f1080c2f50b55abcf3b8ec055f173bad3965b728d6de087fb7079c883fe787c74a2f9b672e60b6d4d40f37ca91e2dde4f118b40f214041923e427d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f1e1c632cbf3fd8b399bb0ec1903be6
SHA12fccefac7e63941bbdddab5c48e69907729f58e9
SHA256971e4a5cc7199ef19c33f77783fd368666ae22c833c8b073a2802de59541e8a1
SHA5129e15d7ae4b59b8a748cc0a76b3e8a3b5496fdf2bb3d8e93df50b1c576c1608fb72e9aeb7ce1251ed3a78c65d8a457fab5a02870f878c1a176c50919ef736d5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8b4ef5bd4d84327ee1e928d64d4b08b
SHA1954ca04f31ad9a15ffac78e084f736d23b24adce
SHA256a97970c928c5238812bbdb4f33d24e932661e9be2f9b62b908d4fdcb32d8a91c
SHA51276a6e136df8fb1f10dbb0010db6b430e8143b5b416e2c711358e36487d71fd6b299fa58ee3c289dafeda85b890392e3fea34d6170889c19e0c6eff64924b0a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54368a6f9e2ba007a4b0863e28cd87d94
SHA155edb04edc7a69c2ae6e32ac7dcea14642a47932
SHA25626e066cdc858bcd8e89e5f46306e0f38f8a02182848502a9e7727a25633c49e7
SHA5123088f8f598ad7fd181c0add9db0db6c23e38a2b5652300be79af51c91800d02a22cb821a0408ff190352dc5455f5221482b2485461f9fa862ac85a3592f784b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f743fc7a99393f0c46f3254fe18540bf
SHA13d0b41efe8410699983718764c459fbc1e2b5d64
SHA25608ce3ff37822e8d0748eb546479ca89876d965d1aa0f058bcd098e946e89e343
SHA5125a52b078288f1c64754126b2f5cf2754caaf79fecdf9a9bf7f2783e0fcc9645eaea570452aca4a00674fe4f1b1c940d59514d21ef04d86afc817c5086b8ac834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594fa7c5b3124d718ce063f6e971a735
SHA1f4d164a4607e5ec05ec8415f7dfc2adf8e3807b7
SHA2567e566d61db5f7cd2e9c50f1c8836f49b9db070c36043255cc5ef392ea6bfa664
SHA512af5491a2131033518216a36f6265c588cc6de1aa78d7701ed5d55ae9b1ce27ceb8969b54a95009ca5e7639ff85a3e1a2a7a2e1cd03d1cdbed5a52dc56e8bbd68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccfe76711888ed599e9e9a638bd84b00
SHA153569dd2a3706393ec2961cfe929c12503507a90
SHA256d01279d2c121311083dc273541f5f9aa58d0fadc00f39ab9ca0fec2e73194ea0
SHA512063523c3c711c8e02be0277def21220f24105b3429dc7906f30896908a9bbaf51cf9cabd094117c56b702ac23d25158ffce19e596cf46a33ac37f987568d710f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06