Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
3efd6a9a4451030e8c9f407efc7faa06.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3efd6a9a4451030e8c9f407efc7faa06.html
Resource
win10v2004-20231215-en
General
-
Target
3efd6a9a4451030e8c9f407efc7faa06.html
-
Size
81KB
-
MD5
3efd6a9a4451030e8c9f407efc7faa06
-
SHA1
a544fd5fcd18a5a8a1a9028bef681493b2f1dcac
-
SHA256
ad4773632158a4672da4d080ddaca71a06896c86ac4a26af5d006b5dbff6f37e
-
SHA512
728d4d81dcec3da49f316ff1fc0da8ffda3d5b35b515575d43475dc31e4a6197522eba58eae5f6d3696f0de3ec1670bfbe7336deb16597500bdaaecf1b1105dd
-
SSDEEP
1536:zXpikFfyyL5SXlvzO60ltgHZHemeX0qeD2IiTrXssxiwrEHJhD:rpikFfyPgtgR2IifXsOiwQHJhD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410475193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000f6f688fad16078ec472eff9f79ca7aa60a6cb4ac48080af664ff8a37422d2f0a000000000e8000000002000020000000087425b6f82434be1bb549bf2745eff82a3f122d43f69a3680227910ec65d1a420000000ccdd1a8e1f90d04e3475bde3e5aa903e165672231b7c41a77fe4f48be6c76a46400000005aef3bbe19d8d74325b1dfd0942b81e5255155cd75f559c95fca47cabb1c8367111fcf8158c7e6ac67a6e34e076d72524eb945340cf7c24457d948733105d5dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f4cfb0823eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEDEFB61-AA75-11EE-99C0-56B3956C75C7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2636 2384 iexplore.exe 28 PID 2384 wrote to memory of 2636 2384 iexplore.exe 28 PID 2384 wrote to memory of 2636 2384 iexplore.exe 28 PID 2384 wrote to memory of 2636 2384 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3efd6a9a4451030e8c9f407efc7faa06.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD529fb7cb445505ff8608628d813a55e9f
SHA1c5f040766a3f45481d62e4f9671741d8cabbff68
SHA256ef099dac5243cf14d7fa57b682087aea29c3c67b1c4f685959745d6c264bc08c
SHA512ec5ca0ceade8bdd40ed435d1f40c7abe18e46dd06de56b25e4f2eb3b7c2a922e96799a390ccf51539727b22f8919f7e5432079fa193b2f11efbc2ffbc4908238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\646C991C2A28825F3CC56E0A1D1E3FA9
Filesize184B
MD5ff292a05ea76477419061feb6ce64de5
SHA1f893437fdf115494aa24bd4da5e54b9711e1a31b
SHA25669af916e4ed0d073c69f27960aefcf6063c88e794834896ccffd7c1153b98226
SHA51222b6946c773ea13e7a36ef17efd8e559d60af72c13ae423d42e92787616227d5f89ba3132c17bbb6a7d84c566e8c861c8315a52bd8e8ac039680c0f4ec44cb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515769eeadf575ca921c74a1f8855796a
SHA1c2c320b644c53e7d73c76e19d4e2d19b73072385
SHA256d638232f7117385922b987caa0c167b6f30cf98e80c57e14e131c08e889d8bdd
SHA512430f41b56940055e9b72b5bc2c558bcffd474fe7d8ccf72b7a801a28954d44079816ff63f052891a97c43262d26fd2b1774738220d549dade7e51f09cb1f2603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f6cff3bbfa74ca13f0edcf982bd6d0d
SHA12608c67b0c10d1bf65306386037ec649ae2cf81e
SHA2567a39438bb877587f9028d178f5abb013071a5827385f5abe8380b6e29756673d
SHA512b2dd70d738289e71191b0177f9e48f18f5f919d55460685cf506878be2ec38c7ca8f99e142570a4fc6fa47290aafd3ef5f5a31724fa6ffe322bb34ec143f6d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5493717a0802b3ff69a35575f3c1db8d0
SHA1636fd885c033bdda9be8e3e9f62464d9bc5de884
SHA256a73f6778606d4a77831e77d21872d2c755c9437e38a4d9509d0124f911670259
SHA5122db73a00663c2bdb867c577daa65001e68f2f855199c7b5039f97bbc4c5eb1426a23f84bd5c46197a49e5db6038b68ea34606674663418f4bc1245615ccdd7ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fc77528cc5861fa443052b8718c1a45
SHA155a0d928aed66d82f4d3e108ba0c61ef50576ff0
SHA256542fd19cb125e0591713b57d1ef73eeaf67af12da44842cee8cafb5f35f9b8b5
SHA512327676fb72b0993e1a2216d437b66589c0b06c91eddf0450750097daf373c7e3d6d5b6bd3d400b49b43343514e9cda70c0379c5ae90e9b910142a75ec14f5bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e69468019ddb835874beb9bc282b2e
SHA1fe0d36162e17630735acac7f63e707045a15c226
SHA2567b93c26685d1cad8fdadabc6890c216e7e10f489cd51dc5e36bce39d2f30c0d1
SHA512fc9e8319374026a523087d95281ca38d2ff25dc67292be94668c2ce16037eeb2015c759a3cea2f073c5e697819531ae9576846f5ba21b0c5661aee843c853086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df540e0fffec1493283113d32728856
SHA1e902aed6f171f730f2a7c73a604c6d9af9f54b92
SHA256a8cd1fe9514988eea2fd190207507b330123d2cb5196e998ba47a8677b2b21d5
SHA51262c5dc2e7e0aa31399cdb4859ceb36267137c6eb211bf5dd2edd0a56872b70f9bed3554ffd11ede70cb227ca268f90bb373b411cab7a27740ba4380709e7568a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561c2f4ccf8dcda57d6019e501e9c23f6
SHA1e69dbdb1c36ccbf215aedcc57293593e253e890d
SHA2567f5cdb76d15a7643556905415a79b8038d193fde48ac5598870bc299c6e25586
SHA512119ab2810574ed0cd9df7d55eef6581b821ab04a035ecf41e53d1ccdb9778dcf073409d8d2d7e39579ab5dc2e0a2f51873e484f38a964162b8ed394a3489b6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550c1ea84ba8c949e2c1852ec05976164
SHA13b4e656a511704be83401f0359ed0e9d862b456a
SHA2563f8b3b2d0839dbfcdc1b8551bbc212ef4a45a9d35b97e64c9daacf8944647391
SHA512734fe70c8230f2cc32aee12876c10a4f420ee8ad1cd0d56790c8cad912d1a3613d7cfbbc45e4aad8313082a6ec1a0745bd5b23e51e53ede501f7ca97c3886740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8fb1713cd1b5b899e4ae1a33bdaea5b
SHA1cc3cdf18510ce5d3a2bc1c3b9ee32c75e43eec02
SHA256b6fc11bb38c0a4a77a0e9db2395101cb201baef3bdee5dcad58f7aa5b7abdd8d
SHA512e50fd49f333d9ead34a0048ef14226c93c889a429bb2493572cdce3827bd26dc17c7a3970d8ec6222f280857bf93a48b209cd059e5449f7f56edf53f4056f46f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8563c0497a07310b919dec3c927acf
SHA14577befa020f5ff679a2510971fb63cfa2531488
SHA256752a14ecf864010d4e98bfea3f2fb114bf4c40998f9c9fcd46789bbc5dc5220f
SHA5121e03306a6ee7d480cc641fe13fbc37e2bf1221763f71c503734d52d21ffd1fabf3604cf8d7477b7814078d38ee736f9517b14b6514e2a5ecd64df4853ca4510c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff95e8295db0b7364642a10da762d585
SHA194d27e1cf89ba22087969d44375b3a58dc5f6ea0
SHA25689750d612979354d02633fae953dbc5674152734d4a2e513d0d1db8e7f6c0953
SHA5127e441543281ad672d9175187a23a29b415b3c8afb039aec10062f4e84cac69867335ce6ad05cb4b64b3a50e6f66a59684c32d78a11df21eefb6bdbb36258fb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e0607ce44f217ecc335cf2c4582fb97
SHA1dc37e07ff654596d6706d8aa8d45a3c392cbef16
SHA256a4c913e2644bad7a07ae17a6c1d65d04f0f2dbef5f47b3f2298a3f36a5ed068b
SHA512b5a185bf2652c4f6fbe9727c6de18108256512bb6896a428a8dafd229fd495ba2baa24a82fcaab8c7f4ebb6e254e0cad5b4237b85d1b7dc84c070b272a4ca63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dee346945deb933496cabcb6746ac27
SHA127c20e2ba1c192e3b5178cac804386e1d105be93
SHA2565bfc5389c79e14877e8948eb242ab14297a3f9763db5f8cf944f164826d89bf4
SHA5126bdbe15c72e7ae5f9b4ea98bcc431bd148358f4a52dd15fea2022c89453ea52c73a674998aec8f2cca41f072baacec7d97323b4e5218bb026e200a059f9ad508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eee05eaee4a0d76860a6480025b8c02
SHA14dada9d1f473687c1583c4c376d970f66f79dd32
SHA25633987e00592297b77d61255d3b21d396de5bfa226285f40c9682b2cdc1949630
SHA5128ebba0905d4e647a59f2fe368611875c8c493cc203d0d4f9b8aed50a60feb8608dfb8cc43f1c280a70962020aae8e877d9e39e166f6ca7f6649d9a0521bf62d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc0b122ea3d95c07f43889840f242569
SHA1413463125e2d5886ee9b9cf01d790cf58f7877d8
SHA256d18eca6bf48c89076e1f31ad1e96706af590c1570af5e6f36936097061502b0c
SHA512e3de66bf19af9642dee5dc3140fad640128cd23b43afe3293bba3dd7518271daac8eca2064127e19577ab78a9b71a5d85afe10d49067eec8d03c110843665471
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RU3RPYUN\cb=gapi[1].js
Filesize55KB
MD51726619f4c5a82278ea891f6c7768b3b
SHA17bf590d365b5dac9cf0dba7eb2b10b7ec2748b17
SHA256d9a6259ea78fa62633ca5da48502eb5b75ee3b0a2c41daf07658979a3ac5a3a1
SHA5129397d1a3c60e80baa519706e3357d1a621d492ba4e5ea677bf589a01d3c6bb6622e43582eba5af74e7fc1a9b15046e364600e5958f6e0aeecf6ca77c4b3ffc3c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RU3RPYUN\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06