Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
22KB
-
MD5
6b14e99d36a29732239355aa1c44e248
-
SHA1
6a9c9caec35488c19effb81278e651de31525e5e
-
SHA256
dfae4b482271699592adbbcffafb47a9bf8047fa39f5c17e8e5bfdc6dbcd19f0
-
SHA512
c7ce56ba2f2e6dd1e3771ae63a9c7d52cff9f51bab466e4518b48c831f472992af7977a8e70a752c7138cd9735ce170bb73fe142b2219a820e6ddd9d780b11fb
-
SSDEEP
384:wSFpvsVhRERIN9Ca9jSD1gqs67xJdH6/1RFNvMotdvu3hl:wo92jiINAa9jSD1gqs67xJdHoM+dvahl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e05d9dea3cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000002c479774c391bd1ba2c836846a509c50e5e4a62277d437d146a11129d4205f7d000000000e800000000200002000000009f9f169ee6c64166f81a4f249560300e8bdfa8578b999d9032214358f3731222000000017b1c3f8226f496455e418d22f5ae687a688dde63022af3d437e47b2813f556a4000000018f5d2f734a6730bb911c85273a0f4e2be5533725aaf70af4ee119794d58cd0a844716490baa819df9fb930c6e31067ae43b2aeac0a9e0258265457745a71838 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410299956" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFBB4501-A8DD-11EE-8E99-56B3956C75C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 iexplore.exe 1544 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2168 1544 iexplore.exe 28 PID 1544 wrote to memory of 2168 1544 iexplore.exe 28 PID 1544 wrote to memory of 2168 1544 iexplore.exe 28 PID 1544 wrote to memory of 2168 1544 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf2bbf45e26520a4f3a4ac4da134f41
SHA104d22da5b192759bffe8123ed5e23e6ba3c61eef
SHA2565507465b32e8cb6f06318da3ba6a58a97608d3060fcca643c32f55bc7a8e4455
SHA512c22732e458d6fd428d790c5c6ea68a4d0ad4196c225cb75526eb8da990d7214ae907c7e058775d9c31ead119e69ce50e15fc180a22624f05edfb943413e27b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ca76b3bba6940dd08997de769556ccc
SHA1006544097cda5b3ef966ad1bbd0090bc4f798271
SHA256e5bb642a4c467963524868cac04b39016eb0bb52e31c9cf83170221e59cdfc96
SHA5126bfad74c9f99183defe60827a66f848d5f9d19ba0f691dc25435154ab53824c94624371ba196c9fd68b4a3c0baa27aa80d80eeb4fac94dc370c55f1510377d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53850e670272ff6acee298726abb83114
SHA15dd65a13ad7bb806de5099fe2bb531b1cb51b49c
SHA256da44492952891f1326274978f005f74acce20a3c6887a4e0fd1d6e760140c04b
SHA512631b47bf2235f587d097c576f6d3da1128a315e2971894b8a6c691419c6c299766d3166c883aa5de5e818a4a932ada727aeb382c1d372c39b2f1c34c5704e8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb319f3ef08ac09407c409558a7650fa
SHA17e8fe180bef17b92d7ffff259993f59fb1275246
SHA256d27ec240f5bb35f8254aa9a6b102e253e04a9eac56de14233a802e5d8b1b9437
SHA51275b1bee82f0d4f673c6ca9ffadf987b66ab4eccfbdf97b7316ec96fb294268dffb22a7ddeb7f856982361b568d68606dd5e165ef2d3c2a6a17dbef06d567f123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a319af3a71df23daf727832b0f7b5c
SHA15bd371c309f3b6c9f9c79518ff3206ed68aeee32
SHA256d1728fbf62495ab0b6f2bb703de5b498e0154c787948d5a56d7402fe0d086f9e
SHA5126c65ddabab32349ecf96759ddc3546ffb5e8bfb75dd5eb3644b904bb1c708a6047de68ada569cf78f9fef7f7767e1b2d675c16319adc43286d7575cb0797d808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54104386bab9ff75a56a4ce22333ce165
SHA14c49049373ef60e42ba8074b2861f4a9d648f72f
SHA256f406cb69e4d6df85676b7e6be8ac8bd34308b8c90dbf9a40371b9b2f8d2ba4af
SHA5127cb3d85839651499121f04be34b52d2bc16784bc47d8c38495754df2fb994d72dd99efc05dc39bc6cd89ea5ffe364091aba80f17b99082fa7ee049574017e734
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06