Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
37a1c8214105ec27d521be4663777827.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37a1c8214105ec27d521be4663777827.html
Resource
win10v2004-20231215-en
General
-
Target
37a1c8214105ec27d521be4663777827.html
-
Size
36KB
-
MD5
37a1c8214105ec27d521be4663777827
-
SHA1
72abb4100a6bd00a56ceba6349d54b8a0a3023e9
-
SHA256
e644802483421c98da5e0b3d333814afab421b5f9f94ffd3413b21f9ae17b18a
-
SHA512
a5aa3bfce30b41f32367284221bac9f8a12d9333330a6f27c87c0011efded77e2b77c4024bb9bcc707d3f957d6a92382b307281a6edd2407fdf5129a3345492c
-
SSDEEP
768:S9S7TPqGlEqGZ2wQzRwOkmKJZH2JaGRXamidaGnEmehH2csw:S9S/PzlEzZ2wQzRDkFZWJRigGEFhH2cF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000d735c9e12ef7f6ad641d1bf25954e5ca716bba080bacbdf55bf537cb2ae2f323000000000e80000000020000200000001b50c96d2fa95a4293048f34db0681636a7ab8c62f91db459287ad599be7c45120000000ede42b6a93aedc8a5c2edfa9342bf632967efbe7a5fb3b467f0e7d166eca3c85400000002e1bfaef5e5ea94f5f3f0b7e79379c62d67ba14f2b9869c77e6ac0f480010039b0a78dfbe0d7257257c9bef8e85f9c7e12fdedbf71f5a0138429d8284eda2232 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09ef5866d3fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410576138" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFCD9501-AB60-11EE-9B34-6E556AB52A45} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000743c2bd29e9ab155cbfd03cf4eeec2be29c8773c81b12401887568a734e7e65d000000000e80000000020000200000004af53af1709a6bc2ae3286aa5747f2fcfc91dbd59f45793d3628d83ced1f9119900000009206ac8b6e57fdf733c96c25f064c144842f71a3e283de0a535e8d28c7725f2b35f113d3ebddc2ab5a244f101a45c9d296f71fa120669da4368d11a025acfb7c8e4ea3a9857e2751096db095e49628a7903cdb18520c43cff4494c8fcc6bcf56d2678882ddd0e6b09f51639a49efd8dc55a5505d2ef6b293e921720c68f801bf3c912185f08332e1c632f426123c779540000000da0c102c39a0478eb8175744225f5a364acabc8a73856ad02d75301893098d2a350c50b4612bd2639a004f0ce955012eea09fac556541cdbb830a7cbfaa27893 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2680 2712 iexplore.exe 28 PID 2712 wrote to memory of 2680 2712 iexplore.exe 28 PID 2712 wrote to memory of 2680 2712 iexplore.exe 28 PID 2712 wrote to memory of 2680 2712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37a1c8214105ec27d521be4663777827.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540ce4d93c7774cb6cf3b1f1d2d98c456
SHA1b20aa6553bfb2fa836c4071db13e4857be4a5e1d
SHA2563a4d30c2b9fc5c94e76d7f2518ad2628bdcba276d3ac220822cb01db492a84ba
SHA5126ecfa584903ddc86ddd98ba9bb15d72a31909b55eaf06bb64d503f0fe149636b736f59eb52b5ec0c542e05fc0b7cec7ac80ce4ac9a60c2dd6efe91d1018f9f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a07c64f0b0481ae3245c12407ae4f04
SHA1e112d68e92a30a288057ceaac229e48d4bb15548
SHA25612f0a0ede32c90de80993c0359a05c8b0538a64ca4702bf5b11d49291a426530
SHA51250759d9f6508936d1a9b072321d956eba9e5dc11589d92737bc9b28ca219ee25d50d5d9a848f06a0c9c049daeff0028fbfe55ca54d5cfc2e7195a3ab12e9c989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda38b46dd173edd7335a528eca1d237
SHA14939819828d766d188037a2f87694dabd8df23b7
SHA256c18ca55c82bf075e199403fb0cb60d9413e293d66e1a98cc5e5f7b77c713aac5
SHA512b4713bdaa7fc6dada25c7f59a2eda16206be98450fade2dad12e4dde4acf59e9348454d4231415ce4aa6ef2b7f940970d598ecf9fda7c2358660124e92794b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ac6e8e694384360305d7fa71023ad3
SHA1b2f361fafa805d5d1ee97cf600d6a2859dd81567
SHA25605a6db81f0928e9227b76c4ac497c2b204154c062d9a3fff3a725eae9544713e
SHA512196a527262b249dfcb498406139f5c2075b065f2a8b4cc9c6872931dc529bf7ac4ceef75d98aff7cfc453bbd236e40d0e38cfe0f2e4020073c83e300b0f212d3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06