Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
2802d81370194aa05f6199b50f016bc2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2802d81370194aa05f6199b50f016bc2.html
Resource
win10v2004-20231215-en
General
-
Target
2802d81370194aa05f6199b50f016bc2.html
-
Size
895B
-
MD5
2802d81370194aa05f6199b50f016bc2
-
SHA1
137cd97beb19393dee6bfc27cfed18c4aee2fd60
-
SHA256
711b6daf0f194d5b6eb23ef8de3dea5e94536735c62c9d7361242e6388c8b103
-
SHA512
218c0a69f20b2222c230d62c82f36edbde999d3be8ed08e0a7035e47ee7c4fc78abf625cf736f2c3fa7a1fb3b751ad9df4a99b30ed66ddfd904c42aa95767bee
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000c10e58a59f3efdd80f6105c58e557470caf9975f6221e9980d8d510ad6ec7868000000000e80000000020000200000003700e1ceb47f86f5ca04b6ccf3ffb5e50ef155c14712178526538c4c11615a8620000000a6c2282208f5e0b720376b50a5bdc350bc5ef886db2dc820d0ac8b06775223fb40000000d7bba17c8e21904ae36b2bc82efbecfda0aa1140d475f2023719b1511ed6158b4b79ca32b44686894c45a9ccb6b6708ee9088be11d03059dffb8cdebba9f278a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0df5c3ad53fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410620663" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71D6F5D1-ABC8-11EE-A29D-C2500A176F17} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2324 2352 iexplore.exe 30 PID 2352 wrote to memory of 2324 2352 iexplore.exe 30 PID 2352 wrote to memory of 2324 2352 iexplore.exe 30 PID 2352 wrote to memory of 2324 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2802d81370194aa05f6199b50f016bc2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530359c90d919bf2c16d547c757e1ffa3
SHA11361b2daa6db4ec245fbf39c590e19a2372dedc8
SHA25698740dcb4509d20c95cd701d4bf63e43cf27dbe778bc00b45a95bf4ffae35c88
SHA51244721370af31ce04f63a69471e41538ca11ee8c3d95d8dfcf5b41bac03087471a5492ef927280a26376fd9e9d520c0b15bd5402e7b55180cbb63e073464847a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554e840fb7d4e95938cedea328111205b
SHA11a5f97b895ef02749a57d91c5abf13acbbd0e87a
SHA2561f594616c1e936882067a5b1488138ee4a751bdbb24e37b8e5ff88ed460207c0
SHA512a793d5aef5f61814a9abfdf9c12651df784fa1b4b431f2fd48de6d16798a5b7a2a9810c3b20880e3ed4abe45be4b557fd9cd56c5c50c838a7ca4a8c1f9634289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0a3f10d8d77ced21f41393e4b07c198
SHA1eed47353e4b9eeb02c5a513c510cf77b16d93dce
SHA2561dc8d4af6449985b44828b6f8a40be02c25324d09aeaf79b7756b2873d2b4d3a
SHA5121546b5f310f8da8a0f1d3b4bf323c0f72e988acb79338e482fe3fbe74f8d9b2fc76beb4dc2a99c37be14676e12dc52148c705200ac7e2580cd9aeff1fc13b7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883509f062457ae4d9a60b64c95e5e50
SHA1db54269c1a5b5442e6597867de9dacd53185fb46
SHA25616b12a0e6ee324cc9650ff142fa5f6267b9bb391ad3476811af58ced5e9a4262
SHA5129c0bef06a2929fcc4010b0012171e7d7617fa554c80204fd9fd2bc38864d765136be09b7a4d47534a92080be9c177d235f9e8e818823472f6a54a824afd4d04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b626bed9853d07b25735784fffb4cd
SHA18d48872f144257a6c1dad81e6d12f5f143603b07
SHA25601cfa34c9a4ca93de1d3a13ac97dd219e8d8da1c4b065c95aa48db658e0a89a7
SHA5121f3142994eb0c736860a77318d5c7984e456d62025fa8d441edd9b3722fb18f74d01e1eb14bd6b47988af7db417de1e0b6aab71a76f414d499063774755d3ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c13da573e8a0c8a4bafd89e9b1f288
SHA1e5fb19d9671e8dcd837440104d5f5708b2891f86
SHA2563cf7dc67b63c62e745c7fb2dee884cddcda4f9d22b19e31a728673da4c78282d
SHA5122e5d5741e2395da9fdb423df5d3cfe553fdd259982aede4db16f5bad685fd74966ad72befeaec49afaeabba86eef9037a885b19ee2c3a5f34ae5773278c428ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d62e176f3e5f74d882b083237ee4d46
SHA15ce66857efab52d653d6c447e37a77eb4bfe563d
SHA256dced143015b10b63417dce9aabf9401704148936021ddd62d6d3dac7909c3477
SHA512a26fc8db2cebfcd28d97ac56b496961d770acfdfe642f9e93bf00576da0995e572a7fd42082c48116069566f9e1331e631e89bd299c731e61413801372c6143c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486a5190c590696f24ae8447dab29604
SHA11fb56554eeb12168776193c261723762fdfe5e4c
SHA25699ec3ccbd86108ae580ea3864122c17596bef43136f14d89b6861101df0c71bb
SHA5120a5350d64e873c0191bc53c5fd036f7de54ea5621a02210e8a4a3e61c6b413f4d104f72bd77c8e20b5674559f094b9af9deb4b2e9c016e67ba181644f6206021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f682ced583caff9bd4dd5fe7e59257ca
SHA12c1c1e679303b9353997b74aea93684b05690472
SHA256f313b0cbfa52a2419b5b024f20d638dd5a41fa7482bddddc000378fac9270ec9
SHA512b4f44638d39d59877b6b6a7ceac153590718503fe38b18c800f19031d2a8ae4418ccd57d000032bbde7f94ea59a15e0249f0d0d8961abc89e253efe81f0f94a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5811c4c47d1b51ca4e6c1ecfca8509980
SHA11d8c1acb199c61dc717c7edb64f92f6acd17ca1a
SHA256dff788e2be6b054e0437c09c81f4e444fa1b7cc2c588014db38e1f1bfd546c28
SHA5121127786cf4594094fa05261d97419ff35cb99e17478a0ba55f18e55d258738c903133c5f955a290753e9f377e2df27716993c756ce922cb02ce25465305a2405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd56870d3d8fae2486f56f80b51f78ba
SHA1b23a4912f17184710111d8ff14ad692a57986128
SHA2560cf1af65bc1b5748b9d3884f470c79cdaa2d6be5fba75c4de05dce835b6cf800
SHA5124e6cd78da968c9d817a5f76cada79355c54c9c375406302186fd60c401129129cf9392102d1e812aa20fe856a74c3ae0a343af87a78015a4bec1b0b5b3fe9238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2d2962547f19d3a93c8ae5af942f31e
SHA127a3e84fb6117158758922e49e6eb4bf6975f3a2
SHA256aacfbef13cc5aba70942c6826ec412110b0758d0738433baa36452f212e1cf8b
SHA512b66f3d3de4a413ac97933324dd42c27280205c3ca229c5b691f7d6bc448d971a07da766ea02dac26f8025f5a87f02c46bf2c5a798de75a5ef2de8cab04037e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e27e130f54b40bb00f9b3eacf37035d
SHA1b32f351eaf649b85fc1b55446f3943e57fcee6ac
SHA25677088091fec52fa06e7bac2ce4d67365472ccc93ca6ebf4465cba63be51450ea
SHA512764426f1e0c78c5abd5f6720f685817dc432039ced0ec1213574b616da330315ebd72b4cac4054f7df6dd1a5791c71d627a99588e66a2292f1b4fa1099cda9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58be1c05a4bb4f6247eec64d8baa66fa7
SHA11582bb989152b4f934cc954ba6298e4311af892e
SHA2563f5afe277c7ec6c7563088ea4debd9fbd016c94dbab88c8df7da51363ac55f76
SHA512b9cd5394c6f552154a28b81bbf18982696aaf831990a2ffdd6bf9b5010b92297dc62bc1159763a1e7decfd382330d5eed1c0f48b05ca7124205b6eb341bcfd7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b66bf52651a48711fa3b4d9a1aa83431
SHA14eba7913c5f411b4c5cb6a0ba8ddba5769a986b6
SHA256bf88983f66ec019e88bc113a5a04eaa75ff6263853fcb46136d83832fe7f0204
SHA5124f21b70349867e9769e96fa6400e003441c9c8209e14ceb8c5b03bff528e58dfe49edc933b9697897f3f7bf1efa098711e1a2e0ae91e852b2968d409ad7c3ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566946c4597183f2f5b279aa6f4e0ff3c
SHA17f4d3e2afcd85fd5ef15d5e92211c597c8e3328f
SHA2569524663f7c16bff7d9dbdafcd155c3bc0e9aa37efbd3350b8616de2fbda993d8
SHA51241b29815912affd5629361d691a6d4538935750adc4912aede336a23c74a7c839c6733beeca6a6cf2f6bf587d1300985833d3039ab513e89f65128e065ca9fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5836a252633b88d3cdb38b97b2758f623
SHA18ad72885529eea052b2d9ff40f2178da10be1aaf
SHA256d1c2d578c09f4c91b88ec58e8ab63ee23ef5a761f33482a9cf45219aa7a00422
SHA512ed27cef87b888cd0108e2cba4bb4b2f69612df9d34975467d1b3d1c9ad4b87c54eccbbfe23ff0f89b1fc6374572413c151b18fc123df2f3165d3a7006c1c81d8
-
Filesize
1KB
MD5f060bc8aa8462d808de67d60b2d9a75d
SHA1f825a433bd3f7ef8938336b1d3c6b32adc1b1699
SHA25630daddce7047c2744eeb7a87c14ed049556909c83d5b88dc7ef286ce3ae74047
SHA512ba10d1d61a57659a05de1d4d7bb4fe30f70d77e8df6164829adbb2e63ebc47ca78fe4e5390ad2c0f903a7b496c4c0406c9dece01d870dedeee192d29508735b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4R90HQQX\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06