Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
283ec268ab8b0e1256c63066d6030c72.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
283ec268ab8b0e1256c63066d6030c72.html
Resource
win10v2004-20231215-en
General
-
Target
283ec268ab8b0e1256c63066d6030c72.html
-
Size
14KB
-
MD5
283ec268ab8b0e1256c63066d6030c72
-
SHA1
9b48f676ea0dba306581d96189e97e652baa9f71
-
SHA256
c7bd6a07be30b651d4b672675f6e89df2472f7f962745855493aae0e588a16e7
-
SHA512
373b1bcf7103188021b0d05579e62f584b2a8374100c4bc01bfc9c3860ce3f1b65328fe10ec1c425e49de85f235394d4445ac788e686dc573a5ad78a4f814116
-
SSDEEP
384:F9Aj9FZEgXSWXMUwUTynkofGMoSDN4YMzeJL4fHx:bAvZE2SEhaqYSGeR
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000006f9b7874ff43e9d0997a5d964d9b542e9b8daac5fae511b2e26999e15b4557dc000000000e8000000002000020000000b7bb7028f6a73e57495216c5688aae68ee83f7c400ba2ee71d1940c966a2d450200000006880c2be9fda13005e4bfd5551efe6d2be6612d27f90fd65c6e05aa9415daa384000000077dc69a674655cffa29c5c4e58f9e6bd675de36480136bfd3de4e8eb60913f0f81a067a1b029575ce8aca2fb93af8a3b1ae1d2d1a2975be87b4ca4253ab8c7d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410335251" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E64C30B1-A92F-11EE-8CF2-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40532ccc3c3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2900 2712 iexplore.exe 17 PID 2712 wrote to memory of 2900 2712 iexplore.exe 17 PID 2712 wrote to memory of 2900 2712 iexplore.exe 17 PID 2712 wrote to memory of 2900 2712 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\283ec268ab8b0e1256c63066d6030c72.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5784ad5203a6fd45ce74d94b22c943f1f
SHA19b7e47feba46de4971f1e6ff7185ddea71fa48d5
SHA256cc23c213e3e67e0367e9b5fda0e641dd82c9feae3541f72b4302c6b02521fb0f
SHA51285ca4a34abd2752735dafebbbbb47917456beaa7bef0a1ff5271a7d999709267266c0501ad6aebbb92a69afd0e0820f263b8f042eb9a37fff7c0897ca31d055e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df61cccc546ba8163b98e53f0a6e6b4
SHA1cb29b62007e8dd6fd855b95d0d5a3cb84c8de38e
SHA2569666231df8a41783e72f66949b3d1950540e6a773c0b67042ac11cd44587ec18
SHA5126265a33eabe6eabf01751bbecec259dd16356af51c85c2da131a6c52f6ab700ae3b3ad10e7232b3cf01b7fbea07e67d0da2e905d6e105fd58c7b791b21082bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a37d01a48060427a0bffe64983708721
SHA158e242dd695c8dfc6976eb5c5166c66147685759
SHA256de071d6676c4333eb6717a9e001083a7b9d01fb3fe61c5d5b665a531d0b22984
SHA5123ef9d31fa7f5cbe3b066d2dedc05564d6b6f78d69bbc8c7c30dbb8b6377a3591e1b6affc63bc3305e48ae44ee6b1eec2e0a55dab6cee5989ff2a59e408d2edf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb9c3449a2a6585ab4996497a2c5537
SHA1643dcd4deca0df67cb378df5bba4ec20695af4c3
SHA2560ab41ed57d5ceade0db5fa187b85bdc037ae6849e5cf5aef0cb42164d0dd76da
SHA51256ffa8c6945edc66da1cddef2b946c7c0417a0c92470f98af77322fa22f56d43368daa3f5941db73a9aae1001a69b35b7f3537e78861188c1d28e817ee1018c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5fdfee95795eddfff0a8896b0158522
SHA14ce0301e25a8ab6f02c4525d78a0b30d980be37b
SHA2560138ff31e2088968611acf4edf342529a5a6418f2715137ec466dec7ab119eb6
SHA512d8cda94cd7e0efddaac72c9e49ccd969bc76d8cafc25473833d69870f7e5d901ee3c08d73efd62bb5cb4eafd7fad3c36516d4e08dac8d0393a96ad80c2737317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5564a11afd0cc2a8466145198ad61ff53
SHA1a57ee2ff20f55db6071f78103dffe030c5247cea
SHA256fbc3149af3b1ec2326c227fe41a3ae32ebe86220194ca1c8b035e65af4599312
SHA51263175a4ddbb41f2fc3a063ddae5e31ab810af2a4663bdd12df4881bc7ec2b7abb57096c28a9f6373ff3632c39177a63908c3a2a07a3efdaa24ef0b831d8f8186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f70eac70f92590f4a17ec2a6274de4dc
SHA1de539cdafe9803fad892b9316de7d90df2e1695a
SHA2568ce33170d379f508bce1c2d95f8230744387f87219aa72d519dd23fa42bfa74c
SHA512e4603bd9b73473034c47f0ebe4df5dcbf42a0b1c72d5a000f57b01af30d0fcdf5c00be17e06f0e97a74fe9eb1a168d600e7c2d1d3d4c9a1d18719972cf0bfb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e787bb81ab7b3c0cfec9e1c399927b
SHA17d3f241ac03b161f641572cd97e1dfe602d34b21
SHA2569656316d880f628e631cfdb4a2e213ca6d582c3c2c4f788ff5b213fbf3001b78
SHA5123499fca501c13ecdd48bef1f83239c474114b4e5f1fff637cc7ed4bd8e1665f6b5f89112d17191c1c96cfc83c259698b957f2b3d263f0eb2d4007c717d36ddc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0d45c66f9e9d4662ab54ccb15db8a71
SHA1e2a37d5688f4c1ba6b9ecc7021c7523977e10cc1
SHA256984021c6547365e49a41b9f9755bae82ed730abd90a5db6219cdadf131c506da
SHA51225819bcc26d2e71bc5fb73c2aba457752cb7a6c92ca195d5556f2ff6c3658c2fa3a257c6d804b673e33e51018bf2370bdf8f84368f3e40194a74f16704be01a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599fb435ff9710a0cd0a8c8b24cc56323
SHA1641ff90a81be41d15deaf17e7593e3c48894009f
SHA2566b103765d2d512331fe92b074989a0c86b271bf07013050cbc47018741235763
SHA5128c01dab30f4741e00e63a747bd0f0b4050d074d5b068e19f99bfdb153e7420cdbcc481b521fd74c7414535389fdb4dad14e2c547206ef8bd8d6f16cb6f869345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df422b17286df6fde1d1211ad79242c1
SHA1b11a1859b79889b3f22bab9d8c2698f7d4eff068
SHA256c507e02501b7486925ee17288abecb3696bafc40541f80776a8b6f01d6ea190f
SHA512b5248f7693ce7a7ae5940e25ffa36485cf454f6b76bcb13003929eddb860e735431769f1dff54822e4b6b442a5d7fd4cf3a49cd2da412bc52701904af69b9f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53939ff889006f59030ec19839c303d11
SHA1ad2d52e29c25f0829b55caf20deda8c3e7c35bd4
SHA25607fd328f42d3cb845938a810b8b50e472ee9b064201a697047d818486b08e02a
SHA512f88e2299ad95fb186627ccb8c1890aa92b321ac92e7e458d86c702ab4b1be957d660b7fb6473c362b4d341f6fbce6d777b642aa14854c0140f5a63ed649c20f0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06