Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
2210242024a6e71c523cd94b2fd5de6f.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2210242024a6e71c523cd94b2fd5de6f.html
Resource
win10v2004-20231215-en
General
-
Target
2210242024a6e71c523cd94b2fd5de6f.html
-
Size
2.9MB
-
MD5
2210242024a6e71c523cd94b2fd5de6f
-
SHA1
2b051ee78f571ce358fcbaf91e43f1b51cb9cf2f
-
SHA256
a2e6f2eeed061f0fbeff2f3830fdd44214813c97b9dbebaec4e70bf5b3a3197a
-
SHA512
c440b85326e5621afc765b7197ca529c0d31109e34cf1ab4bd35840a9a6fdf512bea7a38bd1c7303dc9ac59f4c854c1ac7b1e969090f064a6fd33e5e0c449ff5
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6N43:jvpjte4tT6G3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3BED1B1-A8C4-11EE-8D15-FA7CD17678B7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2164 1972 iexplore.exe 14 PID 1972 wrote to memory of 2164 1972 iexplore.exe 14 PID 1972 wrote to memory of 2164 1972 iexplore.exe 14 PID 1972 wrote to memory of 2164 1972 iexplore.exe 14
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2210242024a6e71c523cd94b2fd5de6f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD558620cd148150f2236757b145da193f9
SHA11c4b8e821f75acd7296d5fd593d7b35017548218
SHA25657c39f4327ec324652ff5df9ec6b82a4e0e7458b61e07850e6f119e32cc5761b
SHA5129d52a4e536570475d20586c2519615f1da25682adb98f8410a67afb47d8f0539d401b39bf6e6df37ce29409cd7847c968babf6a9aec67f94e744ea5390d3e28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582ca73d793b408b1fd5905dbcc73e09b
SHA1a2e1edaff6761fe57fb2beddb690551b1f20e945
SHA256e6f153e64416039499068245e65a87176cc476c75906e1631f6f6d676f9b5e36
SHA5126418bf15d0b939118d0c56cf9bb1a7190ab3295a9fd642e5761ff1f85975277457010c1e008b6eb577eaab8f7b96d9e5c3d22f42d0188bd908f792866cae5c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5285fd629e032b689ddb744efdcabab3b
SHA1fe97f900dfbb8a913b97fec7d01d290d9462eeb4
SHA256a395e655e059cd522751c322527b1222669d5110c18affcab1f2310c5ad1b65a
SHA512320cab9f6a8ba03eba6d36a3b0aaa1ad8d0f645182c3b31c162b857f1174f39de30ff5102919a958b85d95eb6d60c303def34162161841773d68238ccadc462e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940a417e5060e85d4eaf76bf5a563d9b
SHA1a02fa8294ef72ac8a2e3ee9f236e2b8f5fc92ba3
SHA2568154ce34413231c187dffeed0d974e409afc42da54199ee9d5b85eef6342cdbe
SHA51256054eb032de2e452c2b824c8a8327e1f61e89dc00f8e4eb4db88696e5496afd82f601c2f23ee3697bfadd6b0de1285419dbd1e9a3362f3d076854c00b04c23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ba9e10e525a1bc8d208cdf4802c51ab
SHA131f57a7017350664bccf0a9913e542a9dc15739b
SHA256eeaf05fdfa12b002f9600fbeda917e72ab43f698094cb3d067634ed1472a57a7
SHA51232f45f1dcd00c544fef8df1c53088b7050c3dad66fad3aa8a77279bd23020a16724d3534d918ad2b651cd817db327328f952ae5f45ecb5a10c840f093feaad99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56de36b7622443194d1011042811e2f1c
SHA1a2cbcd4038b1214ca46d955a733683b620cf8402
SHA256e6953c78d85af8a75fe79df49531e6397d0cb85c1e182572fc46205a7e46e962
SHA5122c2efca610cfdde584a2c227c434b736e18fea1adfea938a70360e69a6cec1b146acc8fad0d7563814dea91c83e32f577030dc09d89744c19a37ed267649f30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5777972ef7f4c9758da23ca39976f8d95
SHA1e34683f9623728d4ae915acc50b285b9c97d2542
SHA25672a13aafe77531e6d14115cae64ca968057d9b1587a70ee82fe65f3bf57a22ad
SHA5129d73ecc67beaab7c7f0087f8d60ef04ea04ddd8b4ab7bcfa65b6cbaf2705216ba3057a5c6b0d326382fef830ff0302b8c03c1cda1a5ff0c610f4e1dad37a1bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6841df9213ad78b972c5f9247b770cb
SHA1f58b0b69209508d2e43816d6c04ed17366ae587d
SHA256e4257c7d8ce73aaa3afd3076949327a16c1772de3ef6e41674d1fa73edce2957
SHA512c3ab953e9044658c36705096d96f2ba7ba16051428109e3659dd6d18a61b4d1fe578b44b54639fd913f38bd662441039825633a82ce3f83b5e2d9c01ee13347d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56034d3a747aeb36eda2cf652c10a9579
SHA16da3d17d7bd0efb90f314f9961ad5fecdca491a2
SHA25699b166ed590f97aad0f1a4dcba542bef8e5dbbedff945ebe104c848456c831aa
SHA512cf7f9e7ea3b07ad6e17953492077079a99ec74cded7f04f44f194ff25fd5ae2308b0747615a1b7fe7a4cfe6f89742566d85f131b5dea82ae45924ccf13856172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504a8a0aa2c4258e6d3d9fb47157b6689
SHA1b64b50f8a0c439975c412f1d607ad68b55338855
SHA25698374df208af0926c1797e4242dcc6a985494c128d0bc30ba199867177357ede
SHA51263f0f992f495d6309fd38dd4b3a40943fc585ddede909ca01c33164fb39e4e4812ba8b27ef3c3478265d6d9f79c59067bf4ecfc0bd82522e354b73676eb7eb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593f202ecc20593588db992ff730bf025
SHA18b2984299f1e98f66234ca9897e0cf976c2a724f
SHA25620631046a0d559ec85a1ec5d389790e49f0676951e44148c3f7ec229bbbfe63a
SHA51244c56679f71cf78b7f269d647166a56b55fb8de2b23c2fc040deaf0d1caee8753dfbd62228a29754b894c2c84f88a4d9f93123ee60f6e40c4fd244b746ab02b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5027ebff7a4f731dd47d26ebc19c63a28
SHA128653017a65a8bab4c4f63afd154cd26f1786702
SHA25627014aa782659dfdc5ce89913c61cac1d2c12590a124dbb19b9ee5c30911deaa
SHA512d31b54d62ac8ab6776a368c57c0da40fc973e7eda71f217a7dae91c29ea5053a070275483ce3d46dfb1ca83d3bef4d602182b82db038e4d4ece7a56272f5ad1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e