Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
21d2dc0da58533c6113de0830152eea9.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21d2dc0da58533c6113de0830152eea9.html
Resource
win10v2004-20231222-en
General
-
Target
21d2dc0da58533c6113de0830152eea9.html
-
Size
144KB
-
MD5
21d2dc0da58533c6113de0830152eea9
-
SHA1
9a4b7edac7926f8d33f5964d48b692033631bc92
-
SHA256
196e9c02bb0c1d91ad916af5fa4bf2cca8ef125b0ab89515a4b39951ebd67208
-
SHA512
1b5dfd8283d916a182cfd6c9a1cbda5d0bb7f86e0077c57cdc91bc17d5e63e664616bcf43c3000a6791cb8ca1ff6e722928a2945b2edcda39799478c5e3880b4
-
SSDEEP
1536:DPAkclJ/RmSn2eDiMXHQyi15YCtjrq/gAhaj18V1:UkclhR/n2eDHwXvYC9e/gAhaj1G
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d718c7cc3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410287141" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E8E46C41-A8BF-11EE-8CD0-DECE4B73D784} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000d4d4b2066b5b0356f6427362bfd9f312371cae5fe25d455c889a211884846fa1000000000e80000000020000200000005bad99cd5a41d77c132d574c5bd0cf52943e4d0425f4c0c50b91c6b2d36d9bec90000000b6fba08ae3c69300ba96fac26d4f143989b8a87ed0445a5cdb0b74f2ff59e75197c627766844ad493d421d93fcb6bcb05077318484197b7a5d542a40d647ee97bc4ee247b23ca7a3f002a1fdf43502e3d965979f6e6e494dab81dba6a82bb405c13ec069a242bac6b5dcf13fd064d68b20277ef76b80223557aeee1f8b3246be35a4048809fd5603a5f693d3757283d040000000b6119816a76929708696771d7d89b22606118ad19b23eecf93b78f0b36ad7752ce164696090a50154f61f5412c7f64a31d7fea6fb4e34e795724135196b58127 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000053d5cdd1ce0f1c617273908a3f42741af2abb45e14e1c375bb3e6a470ef0506e000000000e80000000020000200000005e47832dbbfb9699e1185baa1729417258e720483bc48e9328361ed8461d24072000000072df7bab9c921bd8ad0672f316e5174dbeb49d4fe1276a58cb70ed0bff1e9ac8400000002135d3d44b646a5f002feffdd8656a16070d9b56389e1da8db754affdc83bbaaf5477ce3720273691ceab49f1c49516da7632dce17d7c58b2c211e1c96187c36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2644 2188 iexplore.exe 28 PID 2188 wrote to memory of 2644 2188 iexplore.exe 28 PID 2188 wrote to memory of 2644 2188 iexplore.exe 28 PID 2188 wrote to memory of 2644 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21d2dc0da58533c6113de0830152eea9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5034ec3b760b9b922d37ec2d86820ebfa
SHA170ace12a56aa61e58f53ca2a3de71ff18966278d
SHA256015e7444eb0fdf2cae85aef5c1d3d1aee98ed7e692c848ea45bfec3a35ccd821
SHA5121257126cb3ffbe026affeb47918d546df4fd018b1ef53971bfa8ab53c67106d7dbbed03695340c8b5a446fec87ecd100f264966d934a0982586bc45a7c38188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4d548b05cf19a9fd38a60acf9d4a4bb
SHA1ffce8a304249537ff9a982c62d6d678701aa5462
SHA2565e60819250396e2f034b91137a747400006ec199e6f3ea91fc4a8c2bcf4c346e
SHA512b2b1bcc0c2a5a7d742cf02536b74f024f7460c58a862dacc6bff68a401e4f0e0419759ce8033882c9dea38bf760577074765f92e81c4000f623f7cfd7d937e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5317a7571c83b10a4769e650c6a529b3b
SHA19912e1dbca5c4a3b62c4237a5ec456d57224fafd
SHA2565663d297e4cc412641e7647ce7ce1236e019fdf4f14f7e5debc244d0db624d42
SHA5122a4e7f72c280c1b2a636c9702ff4f95e2931b1a654e54658e76db71dcaaefd7b0c04a62dc0fd48654b20d76d8b7d7687ddde090226a15cb542823ad348c664f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577051e8dc0ead1e21c8b78fcb94a0cfb
SHA1e2bfc7d64ed32466806bb0c6a2d156af56beb528
SHA25611803052cf38cb1e9c1992996ed3699e0cc459bf4134d49b6ef03b8795c8c526
SHA512be810151ed13e918e0ef402aaa6d6959a4c799a6e84c8f191aa8a06e08e392bcf9bdcd647027b3e8c70fcd8752364d3d874312415a00953437126ffa55e01b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac742246e7beb9616ada84872c85347
SHA120f10ea1115ff546d54947f600fb96f061f93ea8
SHA25619cf4c8fd36d4d29de832097b1f4b8fac17a1216304f74058b16ee67c7a92d96
SHA512ed2657bc5d2b4d000515f8e0e768a8594b44338cb21c113bdbf7bf12bd928f8458bc32f6c5cf3e2dcaedb5c2faabe118cec03eb94def5cfe954f23e3887b7b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8ed36ecb945eb64dc064ad2a65e884
SHA15a14725496e2cbeb90f9cc747f00d7b76aaa6934
SHA2566b39a53d745ec6edd603a3957ac11b001bdfb2a838266cda73a0fcdb26773a68
SHA51282b283f1bebc4336c37bf3f3187b6897722d3894a7ff0bc6e802c63d799f0128c257b38a72339a66c1272cd41d25fe7c80cd98fa4ceed8e846fda38e0d8c04ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561065447360fd546666245beb6a0e571
SHA1473d8c3740670398eba15505723ab6f830d57a77
SHA25650608af92a381a026cfd6a26df2f3033d041d368589a316c6a61eb588693ba55
SHA512a22092af439180d035f7e4029d084b6a50d3fe989da2e99655ac28f01720e250d40a6bcb8ece5576c1f50d2bc74bd381852a52a3e78a275ff1303e9a804fe887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a35cc10eb994773179836a4a4eb03b2
SHA1ed3f11ddf2a82aca2e70736dacd38c75e31b1763
SHA256791735892301e92f2a726aaa0222abcc86c6c5424c806904da467ed8c28cc346
SHA512c5f8afc58c63a69696e7bd3535c5db6ad6d80c6b4d4dd241bc872b7eef1ca8484eddcc45018fbb5d292ce1defb0582e6031c4c37191ea4654fbdae4ff6d422b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb30774f53e4bbe2f8f9ac6caa64ab8d
SHA1662e159722eaec8e2368fc63e53da08554078bb5
SHA25601216d7989c4b4c2276e514294608f917bd3a74ef8e325468022826e8f19012a
SHA5122066548ebc237a0add9f24033d7300a4a7bb2e6cd072111e4e1cab1ddb6f3e1a302b5188e9d67d164630015780dfd4dd16ac6f7170b4ddf8feca34da494e668b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5439bbd8f164547922b8a2a1280bed388
SHA139b60ae505ee586383518a900a75b2fb0db7b676
SHA256f7cd2a398216bade14fbf9f971a0c7d6ce06108db192aed9a39bdfe1aa122b38
SHA512f6bdaa857536a62775ce9b3fee24caf21d15cb6aea22fc79085bd0511c94a062df281b3442850246175123972c267a7813c05d0d4072345373347f78f996f67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567fa54a1b1fa760b426d37040c10a6b0
SHA1124b004f0faf564f326ceb21bb4d643e44e7ee82
SHA256711e3b85efff083c00943b6310cafb1453c5075dcee3a84dd9cbb6c6a24e0dfb
SHA512491c988e46d63ffb34e6888242bd3e155a576bd28df88dce08bf856c43b94b2a7e3fd44c1d99caa02d47dba3152bda05d2a95ab484c7d1feec1eced559da615e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c36a7a6462e1eba631d10d51b417f639
SHA1fb6cf464796ad8afed608b6ff848205e42dd805a
SHA256de29cad8597b67e62c23b86b9b3139dcc4746fc442428f94c21021c74d71f036
SHA512bc099b35b3a9cf20ce6eef9c3a2cfbc517476f5774115fc2279af2c3c6deacd08e24033df5cf13be168d779060c2b24fbab6f3ead94fe0c537e4699ce963e1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a99008cab2a57e183bece950f7670eea
SHA17147e1d0f3518cc639b42eae4c4f61d25f7e420e
SHA25643fc0fd3e2d1954c64ff6d6bf19e6fba9d59f85f7591c224f191a5c2d0470070
SHA5125fd20e448dac0feb93da0542bec25cfbf97a1563bef8674ef23d7ee8f630ab9c0d8d272d7f389f7c7d769949e38d55d9481645b10271345cd423577745f87076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574ad92366db0f71d60c7f1b59ab0192e
SHA122980d515f6b613fdfa3f0c58cce9a19ce6bdff0
SHA256f5ebcc856a0931bc3b1af81229beea5b25078cbc39ad268749c867ad490bcfc3
SHA512269daa0cf9201740d23d232ad7a7f248cc131950942073677bb6594b76393ef456b63b84649a278740f38f62d19297f63c3687bfee0ea47761a3d2bf2d0cccfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538bd054e8c5b9be62e71208ffdb330b7
SHA19bdba750ba28b5578c6ab1499c0d0344877d9a15
SHA256a543591f547679ed2ef5c8db4403f77d3f29ca085d584ac2498d410605b622a8
SHA512a12cb9862d33a8e46186ac412ff01d62eb9ce75a15c6cfe4be332c86b0462fc7932a2949b557d9a2fe7c3f9841929e4fcf276dcd0524f4dac0dc860939d3dea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662dd9f2f4a39494ba7523e4b2c114aa
SHA1e16f27b57e7691ae7c6f6d5ad4a4c1d1d418a838
SHA25660356079f2dc578d4a933067109e231d0232f68008d083e7c1c76a10ee954e64
SHA512d128f60e0a1b0ce58c8985b1a4699bd552dfd531ecccc0fd768eecb91c360c8e3fb06f3b25667c568bd886ce1a9768cb87d14dffa8b7a905ef54a4280f4a8975
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\cb=gapi[2].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06