Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
3c4c007c0a114685c0660255b8e32287.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3c4c007c0a114685c0660255b8e32287.html
Resource
win10v2004-20231215-en
General
-
Target
3c4c007c0a114685c0660255b8e32287.html
-
Size
178KB
-
MD5
3c4c007c0a114685c0660255b8e32287
-
SHA1
29e3252b3d4655725aac583c1c520679dda85c13
-
SHA256
e7c6be7f499b1f77657fbcbe759a49e3a5ce6c8032a3fa5c0c4ff6867daf0d7e
-
SHA512
a821e61b0a7f9d97a2f3f46b4c841a72f4c6dacbb6584693b1352209f15b04eac3cbc4510ecbbda8236c87c415ad7f68956b534c2770edac9e3b1c3b73e49d7f
-
SSDEEP
3072:T0y9jwQSxZv/uRYqnuYwKWvJfzLBS+GZ6wts/HrI0CM0uKcNrK:T0y96OeYyWrsu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFE25F11-B01F-11EE-9021-5E4183A8FC47} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000075acc36535fa13be060b1a1807f7793513ae576b4a3d382a8ccb6efe68116968000000000e8000000002000020000000f7dd67d2d22643b49809179e4382715bc9709bcf0e0964f65aa39ca3d18eca5020000000904cb8d44c12ce5d8010e9813ad76ac46311619286adb7249193b74aca211bdb4000000086150b521e94a98db1ce862254f6e987b8ade7394cb22e3ee7c623eec98e74c241ca5fa6f1007037d3a63807db992693556565fa6a5df471e1e78d367b3ce6c2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40df09a82c44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411097987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2200 2948 iexplore.exe 18 PID 2948 wrote to memory of 2200 2948 iexplore.exe 18 PID 2948 wrote to memory of 2200 2948 iexplore.exe 18 PID 2948 wrote to memory of 2200 2948 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c4c007c0a114685c0660255b8e32287.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e86904d5a9329b28985754d9f8511931
SHA1ada7b858a893431e744a9bae789f033c5ce5b9e0
SHA256a4238f92a6f0fa9d0781126f4cd2a15929d806e9592e7ad8ad0fc4e58a6d0efb
SHA51224c599b71b8216ea93af3f4a6bf1fe67e02906e1a5739afa9b63af346944ff365a3c827246270e5458c9de02e72950f863983ff7d93e6d8fc38ae18d7ecf5348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54798c9b6f4b8eb8a6a8a9fa4bdd2cda4
SHA190056ddb64e7210e96b3a023a3b55f13c8d105e7
SHA256a28a4942784de5653ab6a8ade110cebce69ee0d60f3ff11afe4752ddda2fcc65
SHA5128694c69a13eac5b6a5bd6fbb5c10a0d86ed1be8ab2526ddb74e66c7582f684682d3893708df8202b4b625e2fa3e87f9d988d102052d12b5c1d304643189f81e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b6b5465b4a307b2b5fac8ba1cf327b0
SHA14d5b50623eba1fd9d93fa70c56090ea60d24c247
SHA256654617d74c9d6a91c4f5842d46756c21ff98fdd8ac95f5feac0509f3ce4ee6e1
SHA5124b92c41540c4d3d461a81a2482a4f86db3437a82d7930a89c583e056fddf9d462366461f9741837a3639335a309de52950f7c19757a3e74bf9b8fc88297d8b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d4ec3d6f68ee47f0d992e53e0db0e0
SHA1d07f15a8cad6a8167fd7422e8fdef14fbd54406f
SHA2567f63b02a5c65991507a6ab128cd069962d7c3d8adf0d98fab3f034e63f464ad5
SHA512166c5de52d986625aab3818fad8e6064b31614c307e9d2483beb8c00fc993e3c225a04dd65bb6e6774458548b84a9d884283e945bdfb868334a3b55bcadc28f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dc4c84fb655d8d546bb313ae70464fc
SHA1851726ed8a54570c63677af89f04e20939bb140c
SHA256b6d4db0affa8d7c7443791bb5fecf8d120ce2793e82c0f7207418042e3fa1c0c
SHA51219667e843c0db1d11e4d81656f6d058cd3036d76dff821eae624155b19e4ddb25f395f65d68d4658fd7c5ad7db88a83ef9d4c5850654c88e97deb5e4ca5dea4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58656ed09c5e3c34a5d28a60b75b5efa3
SHA13d8bf00a5a638a9158bb2ed3098b469809b1a107
SHA2569d61b648dbeab8738f296aa12fad0a46bbdd2f96aff7f76544d1d97fda321564
SHA5129534cd1f952f480496fdade96d3c0eb2c6704b48374c4aadb6f45f1055e1b61086c13edf2c5e8fce8a4ac3c01c209011162ede581d1f5ab4fab71182a435227e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596615d39dfd1837bf4f3210babc8224c
SHA13752c2e39ecfb69129d29547ec2d7beb52dae64b
SHA256f018ab439f5e7910266abb190660f914e2894178aa14862c83de1838eea62f5c
SHA51207a857d3e2c6a0bbe37bf50b4b99dff2d7a829e4f5614bb8fbd6564d8a8dcbd40c8811cbf8c9f941d83f91b3442bf19bc4008c2bca4175d31db9d61303459224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e82be6abdb2151e80bdf17b59daa00a
SHA1f74861b1fe63d4036f9e3ef89779884c6447fae7
SHA25677be1a244330a5ac3c8bbe72a6175b079c71fc147c8c417b930855028a49e3e6
SHA512e6410d37260ad4e6c30ba44b8f2fd804e54d34aee7446b2ff2cf3c320c76e33f1c92cfe93b173ab7fdd15823e9895ceaf86647aab0320444d884d5bacd3c2ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7483d492286a40efffb2f326bc7e53f
SHA1ba181e06bf65656f77a77a1002742107c77c769a
SHA2565773fa0dda674f7c2e4ab066c06814ef1e1c8d893e106bd6e8845ed626909960
SHA5121ad6cc278f9024adca58e7251034f0afda69a82ec6cca1e82470cd81a92082dd9a952516a0d2515d5dd00c7ff53c60b607a18362757ed20e1cf0a7aa95609475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b07e15166a39f621da10bc40ee2bc58d
SHA1835462c039668639d118a8813a8050463ae9d744
SHA25602757a33c98b10af6fe9d0fff4b79bc4308935283396aa22d80d99d9f8b00c32
SHA5123788a37070ab99bb243e943522a6de091984a5062925da831549f88886b67cc703d63e58f8f8927cca340bfa69d40a6012a3b352e59096f4cd92df3c64bfce18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7027816ba872acee15dabe6e496b883
SHA1ec66590f9ae16185512f9f36a0625cd38284023a
SHA256ac92010ecd1367107527cecd13d0a68d093dd448f1e13593a0e0074f8b13f69a
SHA51296985afe9e6ceb33154e10659778cdb013272fcbb81402c7c1f0d5724767c441c08706dc1e4534a43e19476bfb62ae5112f3713f620d9960127b8cf39bcfd66f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5740f9986dac1727dd8023234c62f0b98
SHA1e05ca675f3b55653c015e4e2ff7ed38c7a4ecf5e
SHA2562e6e46cb01a5d47f03f374a6f78eabff894264aafcda193ac926a1cc51dc8792
SHA512e715681250801d328cf199c8f73518beff31d236a8d9f0485fa5f509d03aa082a98f575ad9b62979a07ff2d2f6234d702cf7aec540b37b526f5239b580e8a7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cacd3c17041466cb3adcf06859e108a
SHA176094190493201276efe4034159725b082c813e8
SHA256fd3c148a32f94ca36649a3c8e94aae3fe0cd395565370082ae2f41336a2637c8
SHA512dd11e116b9839570afe96b48ad385396c541551f80cd6d89e44e7a59a3f76dfd7bb1b7b887fffc01f250655baf0fde94400db3e30b7e83640141e9f7ec6a787e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51299fe9d5f15142bfe617c6686a540bb
SHA1e472a55e3a19f704a190d5edbf98beedbe5c54bd
SHA2560f919649dc8955b278d61e63c540562d5f1f7697d4e50f038a24374f892489c9
SHA5126e1911ff34f5c3a7abccf71668d152ce27b85cd7066bd9afa222a9fdb8a596a1757b9957deb66728c3d1cfd6b80a8a3f38179d08d6bcfe94c9c8e7025fa14ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6b82c07d57a2e3b91aee3a85e676eea
SHA1831b64aa42fde739ab9ce7702e61b3964b3045fe
SHA2568c4d92dcab57c4205cac47ff14ba8573b6c723adc7ccfa4ac794457f2464fb54
SHA512fbfb0bfaf86139afdef9779554612cbc4c7954a88605fc7e1d18d4ad69be7a427c97d655b7bab0de89f583c039a7db5e624e75e6ea189416c5ff5138220b65aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e8db7daa962be3911491ef9077825e12
SHA17706fe11811eec1e9b504fa7f673db9f7a3a7b40
SHA2569c80ab857032fa96ee3526ffa5734f5ccddd895132bd8e4056de442ff1e84801
SHA512f8ceaae619cb6952c0cc369c62c03697397e4da65505c8fd07dafcfecb7f0f21062c1cfb58f3845f343f73490fc6ea89f255502ff714a69fa28b5cfb24e5644f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d