Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
29b353f459ba955cb0c067d168d7a4d2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29b353f459ba955cb0c067d168d7a4d2.html
Resource
win10v2004-20231215-en
General
-
Target
29b353f459ba955cb0c067d168d7a4d2.html
-
Size
2KB
-
MD5
29b353f459ba955cb0c067d168d7a4d2
-
SHA1
543e9eae04a215cb1bd5645e2032d47f29b840bd
-
SHA256
51f76a1a96d8603a1c3ccaf0b9a11e3eb90ae79a82ccd855c4e70876da4843d8
-
SHA512
b8ade2b39f8a6b7b6b63d265ac3987ced7df36a725f25fd9e6446f2a62033d23e2e94d2131113d77ab63b3b62b08035248589f270828fb70fdd22e29c399a325
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410342827" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ae8e6a4e3dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd769173341890000000002000000000010660000000100002000000003af0d93ec56e918992ebc5a7d461a6176962d2d977f3ad32a61ee22d4f1a9a3000000000e8000000002000020000000055b06304c24a577711e7a3b3464e3e5454f6d8b7bf35f5a9b186d2ef712462420000000ac6ba062a6efcdf1494a7319ebbc6433fd7987d6ccb05a2db76e8ceb285c8500400000000179f37d8c72bf3f9c5a17528b33b92beca488e701712e771e362fa91e77de3ba0c9563ca0856cbc3f6dff34740048bb92222fbc3999fd417c74bf0650dd8b05 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92271FB1-A941-11EE-966D-76D8C56D161B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2312 1984 iexplore.exe 28 PID 1984 wrote to memory of 2312 1984 iexplore.exe 28 PID 1984 wrote to memory of 2312 1984 iexplore.exe 28 PID 1984 wrote to memory of 2312 1984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29b353f459ba955cb0c067d168d7a4d2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ede5caee0150ac9f0908b3e196fe3aa
SHA1e30962a791386cf7d091596e5f7888828390d52b
SHA2566cbb38edbf55a17517852acb849e510ae84be7a6ab78654838b6034b0bffec25
SHA512f76472f7599cc26f059ebe06686bc3ccf87ae2cfd7963be80c797bd6f84ee531c3e7b4b5f5bf3d5dcc2ccd478cd343c867bb682db9c8cbc1a7c0610b892c2d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfab7deca5bdc7a2b99c829dafd09b90
SHA170f5f456f48a5f2be14e09e387c3d037467fb109
SHA2564cf67a7f5f9cbd9e77663f09427d091786dabd1bcbee16b135b205843217238f
SHA5129caeb47b581b30e96d65835e8dc15ecf1be687055d6686f9f71c81c2bcb1c859b1deb3cf695e1de7f5a45c2e720392202b327939bea58a7964f72a5cbef64ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0a92faa210c67ab7d6e28115e4406d1
SHA15d56252c28d46801b9abf19c785e755952363ade
SHA256eeee8da97707b3397720c818850aa9199deb0f1830585439e452651145e69af7
SHA512f3294abbc2e463c8e8d8ae170b7e98f6c242d7b002d09eb10ab83b447df72458d8d9b8f848f9fe665e1070447c6df26cbfb6a94612b864d97adc8c5b94305b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40078ebe6bb880a247b0af1933557bc
SHA1967403bddfd6058ba1c6725fe3e58c2b054546a3
SHA256e2fb67f559da6cce4af8ee0bf78371756ccdb641c1998df00a3a177e644df97e
SHA512995fdbed6074fc0adfc2e28c0fd5828c4300b10739e7ba193658c3e5333cb84e014d66ff19d198f5bef05cd728934a49ed02cdc6ba161f699756ae02a3434e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7b372489ed5baab043a68d3cd9f0f6d
SHA144995ffde359514c7b1ca3b6b4987044665686a0
SHA256a206d4a7368cb77e4b086e500dc0cc20f05ddb3add7dbdda88a7f6d945b40aee
SHA51248d18c11113313262390bb4c123013f435facf1c96513e49f2e64eaad18ad005d20dc94794cb388dd9919f73230c46651de16f36eea222cbf76c7b96e1ba67b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b919d47b264f185a32698cf94cd796af
SHA18a80b9c20676ee8d376b3c2fc815dca44182f004
SHA256f86f91a395a6c4c1b4cb8b9af935391ab9cf3d4257748bccfc59785962f6df00
SHA512ffd506e899fd37d2340f0af044339b77e1b6bb2dd61de83d7bfa28fd9f26cfc2315deaa3051dc367156f3fd4637aaa7565d6dd2ec5370edbbcf2792b930aa325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a74e2cf213508d6380798a417eac4add
SHA12fd83e5bbaa1fd6287c7d7745057838727b62625
SHA256fd974ece366d394eb515dadbe1e8b39f571d99d00a4f584e6ae1ac09b50a07c4
SHA5128f0c560242a2a9e84004e5e2e760ea27e9a44bd021bd9089ba32d4ccdf49a1680882fc1c6f57f7fc805886ceda64361b8de0fa89222ad9d19dd49047d94165e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50df043bc7d6717a810482ab5bb5f9de5
SHA149fde888569fbd88eaf0a68497246fd186b233f9
SHA256d2732afb53cc4dce30ac6da34d43c876a4e1f5c15d0fe3d2c226bc154973f99c
SHA5120e42cf454481d8457f81bb979213322dbdf6d4400f2a1cafe09df59985457423f43371a093ce3e24700b2f9b82b5cdf93c48e947d3a90a98043f35d27bcd2f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503f87dc75764c790da6dbcd4cb8c9153
SHA1a8cd7ef3dd0e271124a2ced3ba2302a1efd27fec
SHA256bdefa830711447cceba7c81b5de09e388f5fb32d64c15fbc05b67baa695c0208
SHA51234cabaeb564550c172af192b5a3f8c7aba4566ab186556954d2eb1a8e00b891bcb3330f123561447bc53c4d5b6c7fafe94e3f208e2b2c384e43886a79a137ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bc9e8541c223ba6d31a937f9669ef86
SHA157e0ea468cca4247e6aed0646466c8680a3d60eb
SHA2567669406523ec0de15eacc5b0075efb06cb0fa471f88c5087f05cd486f065607f
SHA512e261b8e029340b36ac11ba3484c15425b90dff1c9b5f0d8af6eda086bfed069ac82ed8dd14efe7b976e0be28d578f3895c09da4c8c71f3ae4beaca5f29129492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5809a11699d007bdf55de5fb72f213688
SHA1a1718ecb9266bc3dd60b9d2f9db936ab0ba78c4a
SHA2567b7e6f378c41fd643f636bb9b653df96a37d42fe6e2b6e0461b1c52abb0845a3
SHA512de19815d7fa0fa05ae2bf10bfaa3785bfa824eedcd336c902c8f3df31acea987b79100c12bae7a46f15e03ab8438516e6c9a68ce908606cf093a42e03307d39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5695b256b70411aa8f0a0515501046023
SHA147a75e63011ef5e4dfe1ad6d66718ddf49213068
SHA256e6c8fb1376f4d1457a6cf056d3598773154cca874dfff5832e20b9b5d4f9645c
SHA512ff2e8210b7745bf1af75dbfe9d28b4cd418484672b4cc095329ca7405ea687b92e8e629939e7a5a29a4fc040f0ff12d9ff5047ffb0c26db7fa34e699f6948149
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06