Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
2aed03167715e3d404cb4263cd0f2516.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2aed03167715e3d404cb4263cd0f2516.html
Resource
win10v2004-20231215-en
General
-
Target
2aed03167715e3d404cb4263cd0f2516.html
-
Size
15KB
-
MD5
2aed03167715e3d404cb4263cd0f2516
-
SHA1
b37e28a25ad869d13d7f5b55d6496ffd3fac9fad
-
SHA256
d8ecbd81c7306a95a18fbf6a656903ba39acf36687c417fb205a0a4f1c7dd7ae
-
SHA512
bac649e5a8f50303d4654bdfce2640590e222379210dca931cfab7ea81aac721939a76cd67de50326ed678465e2e1cdd7daecf72221d971d75108b8563c835c3
-
SSDEEP
384:vtRCiAYl8L0fLEeLu6OP3tB2rOYfky55UeEzye2yVymq:lXZfIS5QeE2exUmq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410349663" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507937555e3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C029061-A951-11EE-BF0E-72CCAFC2F3F6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000b9d4e36ee5a95b1e2da150610618d3ed9acb4bf722df35c5e5a05cb2f136e572000000000e80000000020000200000003d732a1380e86f940c9c5eea74b4dcefab7f278e4f9db5a9c2cf502d1d1d7ed3200000005a442dc71a0756d4e07b65ba2d3210254ab12b2d579e953c66cb808104b46ff84000000035e35f0242d8531913644b7155c5935931e8d42ba5cd0015da7f2199d7d1c6e563c1f07d35c95bea5203a631390218b7b2e96a68619d0b178e9f1e8fade6f7fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000c75a534b80630735f1eb30b42e8b75c1d4fd2df3d7bfe0e935f1df7beda5373e000000000e8000000002000020000000c284a59be7aecf0dcae6c1dc0f1d51c3fa01acaa789beed75f22f916f5dd7bbc9000000049a8afb6f0cdd9ed31791de182365dbe6b890586bf36fe789f01146389b7348874000b7e993cb492daaccc68a8de81ac3248083a7d7966be8df00e9dc89eb3ec1fb8a8047f69467e051effe225d5b4ad75b95d32468dab6aa1d0f01ce6f949c42fc18c5d7122be6c682ee1d31aba4020787e00abc91e270dd0c29fee03038c992ac86be3cc2b062a884130e86fc4eadd40000000063eb9955abc7786daaa09c52c4f993e34f7b11d9cf5f3a9c7f31081baf52234d5ea9331d6d4e3587c9f76c620ee57ce356f5886f079725c665136f4d9066941 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1712 2924 iexplore.exe 17 PID 2924 wrote to memory of 1712 2924 iexplore.exe 17 PID 2924 wrote to memory of 1712 2924 iexplore.exe 17 PID 2924 wrote to memory of 1712 2924 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2aed03167715e3d404cb4263cd0f2516.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD549133fd9493a9153debde5ebec6333d9
SHA124ca6da72a32d6bc1c21fd70028652cd709aeed3
SHA25618d5d66cbafd1fe499cee8c53e0710639ef3d77cea8fb24b7c91345954c3a951
SHA512b5c9617c1c800d8c6f09f261cc962fbf404a3efcbc3cf35c7adfcaa7bf8093b2cda5b05ff19bfbe122f79a82f98d38bdc9825a948373a81313d13869605fb25d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dad5ee4423c36dcb304bd09ee866d8a
SHA15432ef74736ccc1dd7ad2025fd2d6bd4b61eecb0
SHA25607f9fbdf4d3e4eba7144b278faf7ab33c00ae7bf29087be8da0ba43d5861142a
SHA512eb9945fa928a1c5de0626640c8c7194264add4a38c4de42f8def86a78cec63693f1bf0195b2811fbd162cec4c413179589ac94712104a134f6b619cefb686784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507d3d577629b122fc4f53152319db4d0
SHA13cf8637a75d5ec7235a21372422230020ab267f6
SHA2568c65d961899905e1c76b3a11b1d4be40b25671b1cec1e221dbff50be16ba0820
SHA512011a2e8a72171e26fe5dff53aea415d3c839a96a29a187e9d5cf75058fc8c37225f723f86fced12f3bc671d116eff7a3d5a8167473104661b9857670ea6d91c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5037be2d1907c3ac6344ac7ba8e3f140c
SHA192e37d40c38216b39523295e387c411d4d3f7493
SHA25660b7502fe31921d113ff7b14888133a202e679e5874dde7281300c6ee96b198d
SHA5128ee4c82e10865f11fbdef2c46628719f8727cc3f585ede2e3a3c3d10f7f3157582a2a6261e5396a165cdbddefbcc7c54cec5f3e10bde66f1d920f34f717489bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530dc09a4ffa55f85ab88e01958ce5956
SHA1ed8b83a8bb030105aaeb5e7c4cffdd3fc1cddfe8
SHA2567699325e56c3f942e50cda7ca1e27e755ecd40a97ac17f03f8570621c1a3affd
SHA5120f2f872878745789b0d9f10a828cb8e0a09fac8005f5909023138986e3235a8ad70dd0108edd42e8e86d4ffb8fb8a33c58261bceef190012de1a3e9f7dc21d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcfc073a3772d1a57ac8ef62842b6b9e
SHA12aa099333eacac1e0d2188e2d711a8278943b8ca
SHA25632c818bf7543d317749704095d194896ef00dd4d3d32382c439a5168200fb77e
SHA51210d6f142c0a27bcc62a26c073c59601cb9eb0be53a9f39c3123e9e67f6c2bc118753e028dfd3c455725f94dfdb37e20bcc70aaeb42135ebabda0d6831ad11421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52da262856acd66666b1d5d31d395aba4
SHA1d57f78c25896daaf269038fec41a12c21985aa69
SHA2561860528d9b524245548af4791e2d719889b7872c82bc54a05bfe101ff657f065
SHA512b49a144f2ebde3a965cd8c188513985461a656e0fd533925a9d6e71da99bd0f42f827d6d5abf1c31200931dc8e716aa2274b28e2f89800ae90716612168a41c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb84c8435e65092651cbefca2c1770f6
SHA149d7f9df5661a09e856b37beb0ccf487d1ca4072
SHA256b9df0c2fb450f868ddcd4c6e15fd46ee1bec2a7a9de0125fd49b3f79bdc76057
SHA5123c35cda71afecaf3e784016f72847bc2481fadcd6c85901340592966592f893c7659e6887df25ba5a1bdcb8ba9917ba6cf0cec497d615de92bc45c544ad43230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587518cd88089a976f67872d86dc6b38e
SHA1a419bed44c931649de67ac20bfb45f4c83ace8c5
SHA2560b0abe11f57facc6ad4fafb4c3e5a31be3bc40791eeff01c56bd94b830062dc1
SHA5128d488ad6aae4dc17c8206ea77be5f56f05176c54339b931d4452c1914b6d7c688cc0f90e5194c8a26428d7f08f8ee4ba0b2d8b2e2b964d8d4c48d080355f2b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2a4cfb70d801c204a3e08eb73978130
SHA1edd202e482ee46a1f43dc1761cb638996c69986f
SHA2564e71cf987bcc0c85f69bd2fec94209e31db101b21a43113ba3c1ba31759e5822
SHA512c94c5ad5eeac10579b079e0ce8b3ae82c055cc6531e1c6293323eae67ad4ba1f5768dec64e3ffcb0446512c550234709278016a12a941a0a961ea28f176ee7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD576824da747e39fee8dad8d0d29ab08e1
SHA145a570da0d22710be5f2c88ffbdeed657cf205f6
SHA256f2aa6a2e7692d8e8f99e5812edae34610e122ad708fc3690d4bc0eecd8e80ae4
SHA512a417583db44c69f92111baca604c0a4a3eba5c9c759c8c67ca258ed386401bdc950d59167650955112fc67154f36901a7e807d9ff74ac20ddcab6fbc2980b4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06