Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
29bf41217f9937d0e8bd77e22d6d0765.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29bf41217f9937d0e8bd77e22d6d0765.html
Resource
win10v2004-20231215-en
General
-
Target
29bf41217f9937d0e8bd77e22d6d0765.html
-
Size
23KB
-
MD5
29bf41217f9937d0e8bd77e22d6d0765
-
SHA1
c2e25ed780c34237ca8e4d32a8efd44bdcdc25ea
-
SHA256
8d97b594bea05c5eab038400e0e46150548270739a9353fd72f66c3c58746bda
-
SHA512
27ee828d2d947d6277f20269671ee461fbcede0937f9ebc41fb1913f37083adcb54b5d5714d2bf346ea39b5021caba4966d380459e64687fa6caf648f87494fb
-
SSDEEP
384:inA4ywV0zHp2K1TztvukeKXXTuuwG0Ft7grKL24UTpNyOcn8tvG5nTDuU5esT8a:q1n0zbtWkek9JkkKc7wV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410632350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2358371-ABE3-11EE-9735-D2016227024C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000045f0f661dceb17d38ddb5f05b57705bf860e4e77477d0735dea6e4c82e49d854000000000e8000000002000020000000d534555009d8f6aea7ad20c0a3bdb007a322ec1bb00801e59aa04107403900b9200000009a23c00be14e06210a0bd2832edf1dab87d032f518bee292a508d00998d7fa9e40000000c6a09e6d4cfe56509fa89b074a2e68a897863e00ff73c551a783872b35a326feae98d5a99b2171de439c7eb00fa501058b55b520c5494f008e89bb9bc5dccb24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b00979f03fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1772 iexplore.exe 1772 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2740 1772 iexplore.exe 28 PID 1772 wrote to memory of 2740 1772 iexplore.exe 28 PID 1772 wrote to memory of 2740 1772 iexplore.exe 28 PID 1772 wrote to memory of 2740 1772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29bf41217f9937d0e8bd77e22d6d0765.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521dceabd984a70d904ab672de6b4fcc2
SHA114d8c78bd6f6f959c8e312c153fc2e4957ddae48
SHA25623fec427319f156f6b60b308f5f3385811137869346e6ef70a33b565f6488212
SHA512ada1d93cdbfebe747b79891d4d7d06677aa6b05ee61e54c1773fac6df7dd669da77117264069c3da8eaad0842d50f35f2dd441fb83c5e8fca7515caf882a5ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e675ae12cb9427c6ce81d522a451d8f0
SHA1d4d984940b5518fbc889651091aeb06864da3078
SHA2568cd115610a487ae7ac0fdc1ccb59e6c7ee4747298ee8659862cf3f2c116227c4
SHA51253306f9fe49950b8c9683af8575fddf55fed7a1512ea5cd4157c6f15e9c168819f36dddb7677a76547f6c13e4e7744f5ac2608f2dcad34b9a898b3825d32ced7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c699a5f504d7d89fa2651f47ecb533ff
SHA1953539335763ae17a605c9fa78f77875598a3aea
SHA2567d9bc12dab8241bfca51965472c4e42b9391045b2b5a28b4c8647e1841442125
SHA512e79ce2045bdc4fbd3a3c397dc1d4da459078491513826e4420a7f459a889498e9a369af90ceeb17e49f1e99c1f218142ecbfdf0a9eb820b9f49703e8094a39f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014c5bd08c592584119624b836c51cc5
SHA1b595e2a31951b40378f45001f2fadc1417df115a
SHA256e20237df67442ede100ece5a80983c623dd543d80ae6acc1a3481c973d2610b8
SHA512554e2b8e38751d5254f780d5b0f52a51f65bf65aa62c7b467c65b3ef3fd76ac67e5f7cf60b482bd57b062bafe515090dd7ef1699d161bb7532f07dcbdb6a1597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ed28297c02a4911442f876e0f41f6b7
SHA148f441c1b6fba1bafa9d7b8a18e4e571dafcbdbc
SHA25653a8e3bbbc6bcfccebdc254c9be4a00f30525972f968ee4ed0220c9b6face4fc
SHA5125db3bfad42d34616472ef07e5b10083aec7d5d6a12357d395de2c8b11f6ebcf80ee58ba9f02f7a490fce0dc85370da444bd96b3b2235d6fcef9892c5fd99324f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551bdb072db3cd343c509edb44e4431e3
SHA1f54c962c6adfe8cb2d04b29706a8d522885fecfb
SHA2562922592260246773e0c23ccdb6de2b89fab1ba5d8fc6ddc41358f84c8409c012
SHA5128e453eb360d2f9ed99ccd19d2b0f24f4b8fae4e38f5b27803aebbcf413fec5a21a12ae64d83beb16801193718c05dd2f402dec0d3c19943967aa27e468e095fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5161e30e50602e10ea92b8d0fd1f95ccd
SHA10adeb278eb0cb8636e17a3665a14fd5813e8c5ba
SHA2567d5127213bcfc80265189a073a0dce348d399b2c583c0d28e2a9c6b316c3456f
SHA512f99dcd70cc4b1e83ac7233ea6823f9fd93d2e63db49fc88f2ce80c35c13d59d5994910841ea0284fa1b7fc4d3db3e9f34df10942eeb8fa0721997c517e825da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd7d02ad6ece061ec405dabdcddbd906
SHA13fffb21e8e82c9a93b9007cd4c95fb3e5d138b5f
SHA256afd89b64e605ae7e1a18dac29deb65f2ea34c65af509d64198340de44eb1de83
SHA512ab5f185efc0375ebafbe72bd5dbc49695108ab11d5712e3e1f7e612de6444731016fa87ca3c64d81223b89527ca9f520678e46abcc7b56385951d73d6ee4df8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4637c9be641b205e6a0e7799e2997c8
SHA125b54b77883cc63ca318e7be78b2e4efb3399782
SHA2560a8a3c6fd88533772d0dc4a6b72f0d9458dd10485a9408a686d454884e5e786f
SHA51206dbf43dde9fa557510d00740c7fd4b26926356c9c76123c624033b1cdc27115683db68c94688ef22ac5cdf8ea06cb47b7d58920c5c1a5631071b45f8bc05fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4c5ae43a48b9d59b7b6fbc592d3f7d4
SHA1fd3a9246b5ba5718ebe8222b3d9aae6367710b1a
SHA25600d3b2ca3a42a4cb153059370dfd2410d857884b8e4c4a9d54d1317bc6aeb236
SHA512d48a47c2707191193e716f26a8f8b5eb341e4f6d06237c6b9ff4bac757273a20232d6e1e4d41f1ee44b57be6266428793900165d01c03e218d0075167b35f073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55203d30af222b0f46edffb0daee8b634
SHA1e368e77ffbad1aca40bf55dfcc32fc9205320514
SHA2565038b7784b1efd1e48aa9c384a4a3d07147790a288c3b2cb177b168be4edff69
SHA5126758e459a207cf19694a5c035fd0bcf9d65eb9442d0c22853612d12715ed93404e50f0157a0b9908e58702967c6c8e3a7784c0bd0435f6d292d76b300328dbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5413d846e7d982c8d2fdce7a1510a9dc4
SHA1bbab47e3bd440f3a7fb1c8c3207a445bf66f2d1e
SHA25660e7aa88cafd51e0cef9affec6598321b75c2dfd133d528a91263c8055b549d4
SHA512e5d2620b30c7acd8e95152431c1cac469e79ce9c036e8ea65ec0b4a6e3eaeee68662cccfa77191a50f4a5a48655a9f315615d5ed790d55502a29687163b5657d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520a17646b698637220e93bff739b9623
SHA1077cd4b205e5300beeed3ef175bfd8ad423631ba
SHA256fa2a53f1e9a910b6ec97fa42cdaa54d22c8e5f937e52903fac55de08e7f4477d
SHA51289e7804b32494c695ef4716936f040668b00caad93744e32e4f0efffc32fdd71ef044ddfdebb2724012d75409394736cd80ffa1ffc06317955e5b7a79e12035f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cea3813265ad57173929a9f492d7478
SHA124abc5c467aee797fca8f9ffafc2b1a522b2b620
SHA256cdd25dd137e069cabe8ceaa435e5dabd1970c3cf1f570f9089adae8db6ce3299
SHA51248e9748009614d01c639e0530ebdc713b5b7d14c7015bd6359a70ab07baae025919c1a1f51345a1a248eca4bde3919791b016485db26d149be94b17edb65133d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a587e5a8e897fb168defed579eaa3fe6
SHA189be776945d34931069d1b5013a65bd2cdc490a9
SHA256d09c4a66dc5d3dbc77c745c017e4389999473a159734a484853c39f4de40c195
SHA51249495a5108874395de74a51320d8fcd9bd93e70883311969f25d67528b3cd2b2bab5825dfbb0bcf5187c0e2cc7cb51b04fc20c0c8608a591c9bc7477482ee45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58afb3f5450a3a9713ed31728a3485e1d
SHA14e9a5bb5abced335b424d7653c181d1c2333e90f
SHA256451acee32a4b2a72bd5b69bf5d74fc547d0a076b3f5492a552e2106ddd18346f
SHA512877c79cd7091d9ffd4e8c916167e0556ea99e9ade501231bc8d871fc253b3f8efc1ed7de85913696f9c762686d583938e4bf17b89fc4c3cab3db1152beb81c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce8732d47e3e5f8f5f30a571a7276aa3
SHA1a61bcd437ba817dfd2bf47e7cea094cc6e9bd405
SHA256d500c81574946dff92da0b8e3ac0af6048d75c8bd9d5055766e8a2b3073663eb
SHA512f0be4156004e5462d17e02f4febc86a0971e10db67ab5b37199436d6beee89171045476048cb6edc4acd28de486cdcb897449b6ad60701b804a55e3c6a15fb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b55fbe7cec0f02969994384f074d592b
SHA1828c1b3385eb832041b7f92085dcabb3518e63b6
SHA2567389f053fd565b40c5e316d5d0695629f19dc1cacf59a8d3f2103035b1086783
SHA51299a3f5f270aa56b7ea98f2caf4da9eb37361455a142573bb3ec0988ddbda5003a519cae2c20592b875ab464872b4e723aa621939928b68359b5336103b149e30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06