Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
245s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
408ed2c229c92b204d715e010c49243a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
408ed2c229c92b204d715e010c49243a.html
Resource
win10v2004-20231215-en
General
-
Target
408ed2c229c92b204d715e010c49243a.html
-
Size
129KB
-
MD5
408ed2c229c92b204d715e010c49243a
-
SHA1
bacc98ff4f40b524d1c567c939041fc1998f04b8
-
SHA256
a3e1ac52d0cf7633c182c3d46242233d7792247c4e1e608a9c3adbabd9976394
-
SHA512
6f70bdab7e9b8fa98b5cd84204c9f73b0d8d2d98323e924bce6379a40a05ee87d60505f6d0525968145bf80a188925025203b8d9444c1bba37210175919913f1
-
SSDEEP
1536:xF6BE9JMxslgvxYSIVUpPeAoxxx9s7Wd3hvsHYgThQpFZfWmMHTHvgPNIyXyaMjj:xFgEMQIiVUpPe73hRgThQpFLlFg3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58077B60-AAE8-11EE-8C00-76B33C18F4CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410524419" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2968 2660 iexplore.exe 30 PID 2660 wrote to memory of 2968 2660 iexplore.exe 30 PID 2660 wrote to memory of 2968 2660 iexplore.exe 30 PID 2660 wrote to memory of 2968 2660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\408ed2c229c92b204d715e010c49243a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD56cbd0d529a079e1d1ebc079bfaf56ece
SHA16ba9a0a207022d3f1546fe5a7828ea213a0f3f74
SHA256bc2ffb49d213a2717a83c6693812fbb2d182823bf6a5db9c1c8d0c684260c501
SHA5120e6c899f8c827ad980ae4dbf4a0c7a2f8952319a9580d5a1401ed5e79621b031fd8e673b3401e00da3eb5d055d6b3117628852ea1e1fd36b67355507080f5740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471a2af8f4a98a64d8e471c98c27ad4f
SHA17f949c1bee2f3a2f4687aa4e023badcb9d75f028
SHA2565a2d8a36e2e24372687fba1be02d6211f95dac281032dd2c45979d6c7885d3b6
SHA51298a57135a89aa6a7cd229e6a80c843ac0610e618f2edefcf236a10c9400e8b67572a085e0ed62f03096ddcd08e10f4a5c5369666c7c32b7138b2e4183ff8647b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda40428a62804caaf476c772f237e54
SHA1b2f535df5ca0c52f3abf12de52e74079d09f59e8
SHA256eed3ce225462db70e46035a2e15429d990e8512e94fcce78d7804b9f65d010e2
SHA512245d8e70edbf40a37f605ce4d2f6ada75852900b05760780a97df6d91a500d76a50b4cf95e908955ca954116c89a6571706e38a937e387b0f021fb00ab899784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5466fb6d67285d43219315b05a1a51407
SHA1e5cc9bb05b67b620a77abe966882120c4f2d5fa0
SHA2560c0759775b6ced534df8713a50b6bdca6ff8a7b588050da746dc943e69ab3f5e
SHA5122be13b2501122e3fec25919eb686c16744dcf1cc30782eb58bdf03274b6b25aa0d966d21d705f7f3213824a93ec09abcf9745b9276fa238d2f9daf0d7c22ed71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2f1b7d4a0e9daef2df53429944e50a6
SHA1457a7856c7763f91affbbfa7f186fb5f49697f21
SHA256b452bf25687a4f3711f53488858a958551ae2c258e2b2c33822173d67b9bebfd
SHA5121782671c395ae372b6e7feaccc22ca89f77e7843c91ac5816d5b21567c0cf3b4d64a130eb755fddf7611003b4a8178c4bc7bc17867fa46e6188ef5c1eb6e1d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58985bd017b60382bdcd6168e7ed12e7b
SHA1c2d4a051f2eb7bd709c9690eb3125f433ad9b3d0
SHA25683ffab6f278c9eece6ab41907c512625157b194a3af13ba3783b3e460bb7acd4
SHA512f2fa91c31958ab4348366808dff7cf560986099e264efdbfcb6c3100be7b32c54627c9125acede96a85630509665a034c1cee531a58c72e9b9385a14f6ddf596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d8442588e72fc28cd39cdb67b90f241
SHA125b64c90510e76895052d60ec54e5cf3c577246e
SHA256c35c357d1be134c499b7326cbac70413c2dc2e94ef894913c98a1ade03993f36
SHA512ae7e24bfc36ef7a232b1965b33323c1c328288d30d52bbbb9375a922bf82365aec206339886bb233a6a0ab879a2c314f52d2df94ac2cca8034679d7ef395ccf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50752fb98260261c11a4994e5820935b3
SHA17d5913411f96807323ae4ee658ef882562d513c9
SHA256554dec14c8521c72911150f0abeb705c962d77674ded7526a69736b5b5deb1cd
SHA51240c4f239798d7af66cb221a2b4cb3fdf09901ee953d76a52ae367bfa5b5b7002132a60cc51f69dd655604adb0d7e554b6ace745105761a443ad32ca04e165792
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06