Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
4588a1636d064d75e6051a19225c9810.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4588a1636d064d75e6051a19225c9810.html
Resource
win10v2004-20231215-en
General
-
Target
4588a1636d064d75e6051a19225c9810.html
-
Size
14KB
-
MD5
4588a1636d064d75e6051a19225c9810
-
SHA1
4a0dfeb581de8804e2ba52a30e8ed6e57a22c860
-
SHA256
3d066daa0561fe64c575206510614cd2442b811e2ab11289cd84962a8ddec710
-
SHA512
b93376b8dab11ad0d6dde257c4faeb7218378bd3472d77351df79225a76ac328b466c21176660af02411fbcf44990fd70efeb955fe49ab11a80e484eaf8f3427
-
SSDEEP
384:ln8uqnGDnW0qvUBDuFW6TzBPQTw40EzVYSEVqJ1GnPWlagVJVkcmx/Kic2ZtjZhO:ln8vGDntZrtFxFb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410684807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000008a7ba35fa84d0364d17f27b5c22ab1d405a53c5821c134c6dbbb3d935b545057000000000e80000000020000200000005348d783d7dbf7fd06f1a47677b4868f26fb1ad0dac61358a788aa548067f1c220000000265676d4322e77367a7ef6ff9e1bd9c594643849d838ea039b40d064718d3ce140000000173a6b64a3fc0095635408586e91f8c6a07cf1b275852326b3ed3f81eebc43b17395da4f98e9c6dd9987dbf6cb6b1977c126ef3e982f4dd31fc80062e2e88cd8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA482DC1-AC5D-11EE-AD90-6A1079A24C90} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900866ac6a40da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 1428 IEXPLORE.EXE 1428 IEXPLORE.EXE 1428 IEXPLORE.EXE 1428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1428 2288 iexplore.exe 28 PID 2288 wrote to memory of 1428 2288 iexplore.exe 28 PID 2288 wrote to memory of 1428 2288 iexplore.exe 28 PID 2288 wrote to memory of 1428 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4588a1636d064d75e6051a19225c9810.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b512c822da0ce4ab3e8244d0d6c588e
SHA13fe6ed25dfd0a0eb98f46590c6e2e37f7c954215
SHA256efbf2768a364da9e9d6c3b8a2564612a72200f870c9d42c02ace08ccf89eed85
SHA512daaf931dfb9dba8fa74d5c7c20699d9e7cedca7d105710105db006f529319a8d0ce43796b954f6b2b80b5ee89dc7016fb2bd068c8e2d5792c9bc2bd841c230d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0b714dcdc3e0211674d3c1390c6ea26
SHA1e7631d0f6c13853a328423cbf5f91b743481b37b
SHA2567c8c2d2bb27d9af6f3e9e1a90b6ca68e49af9d985dc64aa8115f19f5fbae86b9
SHA51243360d72ac392959dccea71322480ef551586986fd62c7ccfab6d21fe398be0230fa2567729b04cd09b19ad7ca4bcbe2841e2cf605430e53f34bb1d6e72460a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfa7cffa8958c65ac13d7f8c17f6a1e2
SHA14883bc14fdc884c797b141cff7ed43f076a5f78a
SHA2564c42d0f3eb6d8aa8ea8aae6d294929f1eefceef30f34fc6c9cc3cfce39e2513e
SHA512c96648d2774ed289e2b91d6d59d432c012f447f679516dff464b8ff464e6974bc8769253fef977d7b87b9d3946b16e3c605ebc27935a00319ac474e9d7b7a2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d383c736b134142a6240b92acf310db2
SHA1469184884505d12af823e7826350e7033291d8e8
SHA25606d290f3ee6226febdd35b3afd1ffbc627ed2bad94c7de55278a068a3c0575f3
SHA512029f95ff768b488671fc97548f918617dcefb1d653cca593ba6fde63d5a8805ebeef5fed40a8878465fbb69980b49f7031e0230f91780968829481375fd2a6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe76eb63aa7be056a4f127e5430ed2d0
SHA15c35c7fc569a6edfba8540770366c037a453c516
SHA256f408d81e8cdfeb5acfb64e2580a84c59a28ed834d4ea04d85e18c4469be33414
SHA512b555933a07a849a61407e183e7c5573d2ffccb3f622f3ae15d14fdfc91969c5ebcc1ed896090b0a72cc3782396c0fe6e5e49125d174201b770c41e6037c998cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a025ed76130eb1e31a489398f7dd8d64
SHA1726d9ee827901d38251ef0e5480fb10e17c4d99a
SHA2563e42b15d99a9db391cfd94fd4eb470d1940981a2a492ad9c2bc6c9b363b22326
SHA51272298bb5a8533a0e1d07e9ba43beb44500ea5ed2e5199113f2b86251e8c63ce29f2047e19122c9fc72ccbf531634e7bd60dded75c0146cfa2224c98c44e23c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f55f7e192180f8cf26db232e1dee5092
SHA1619c264f9353dd08025ddd8f1906f5aa91356585
SHA256c7ef2edaf0acfca55a372784a208bd97234316dbcc3689bf4c4a0badb21eb0a6
SHA51235ec23d2bee94fad9278ba01b71b7f9bd68a3b5102ee7d97dd344b3610b6707b6a4406bdacf958eac0f769ee021389168c93cfea48b11f9df32cd033e3680eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52adf2417fbb8bed61729aa74ac7a3a26
SHA1ec23713b90b9582fa704972ffd9ab1e2bb87fd4a
SHA256d09856b28d4260295ca03802145e1a95121a31052d0cf9fec948d4458cfc3e3d
SHA512a7e815e550ff3f699b3cf7a4f4f0e4277a779d3fce16903655fa397aa7a83834ae11295d20b22b48047c3f1dddbaf43ee3c70824f87ca15b958588134f6eb9a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5299401f82329ac0dcdea2b19f9892eba
SHA15f740574fb3936270c876562a147cfb04355994a
SHA25628da917b099d418125d68bb78abdc31c62e7974971a3595b4c3e2b2b22cbb6f4
SHA51200a9237c7012588d04cb737ec80d9b571cb10a3e42fa87cad966e934e5c7a7f81b8ea4dced05907afd5dc22bef0bae60a213e4dc861a851e39fef1d37759e283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54016ac67485df28683d998becbfd943d
SHA12b9de885f026fb714e64348c9a0199ba0deccdc8
SHA256e2e765c75c3a211f0970938c9a727faff87c06add02a0659d64e3105b0183234
SHA512e53bd88d13e2c8efcda5362fb3d0e44607ef21a63b4d179fa2b8f4a371e84cb0da6cd3a423d96a94d2fe9740011737e9b016bdcfe3ed898c8cfb8d343fd55758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546727e6efe1553714a29bfe12a84e5cb
SHA18ae7351bb9ddec9c3e6ab87d1d05575f679e16d2
SHA256e6e2cf86906e6084971db14efe97ab406217f10118ade4b821dc0249d66458f7
SHA512eef10876a4aedcd4419e8f80cc7c1e23d30b7d1d79b658ae01552b6cc2d3d82f950a972b85adc2e4ee1b87669392cc26abeb881ff469d63103c81a56ac000e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d00280c263687920745288520e66d614
SHA1adab4491025ab1baa716aeb5aa55aef4d7ab18ac
SHA2568e470b5c6de1201152da7f2ffd466315bf514108696c25f2648b17a304e8a49e
SHA512f18eb0fd80d6c70438dda484dbfa2df35879ea5cddf8cca914072a3611c8cd6567711075c21901949ce202783079cedea47b8f6d1acfd603ed1977c919f86d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a420ebfe0c1aafc7d12e9bb70d42bb3f
SHA1cb1eb934d51567106a96c3412b551bfce6b3e571
SHA256c17df0d346a3de3db3cf4fc2d844feae1926d99f2b17759be3108002fd1f9b9a
SHA512505b230f83d35be092d27ce769eddf974e04c76d1b6751b2860a14b4fc5cc721faa7b44cecc7ecf96bac0e4f876df2b809e97b4353e7eacc8807f4a6a7b5e22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f7b3e49dd35cd00dcf4a80159b58bd4
SHA1059a7d1704b33e1805d789b724e9f0f0641aea1f
SHA25604144cf233c9aa180cee5282b4a5c2bfdbb821549e187e513cbf4f8c4a31e2cb
SHA51294f6e6113bb0406b4a4173fb755d50313f2b35737fa0390bca0e35472a2e96120a7d91e01e26f58d57c82f89f3336422a487e4c014bc6dba05728aaecbc6a4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5025bf8f4b3dde964b645b9dee085efa3
SHA12ca70675329e5bbdc7f5a9e883268d2ad751f7a4
SHA2566426b685dd054007f2b794808b50f3b9daa797f2a1614e645f1384b26f0b221e
SHA512e6b45531cfe24f8251e5c6c2883b85553327334ce401d752be1f58b1b75e066ce8e9fb2e9776531464d5d6c93471d7e1d7ac0e421033d24a0e6bec8a53440c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0acf0892835dcfd1db6dc20533c3400
SHA19fdd317eabd88669157ec0946eec70eaf7729632
SHA25651002affeb887786ba667aa4ea1bea96014a9fc6acc16ae93d4649a9ce5c693a
SHA5122ace2e0e67cf11d220ba4591845dd83ef57dd358a7daf296e9b2282bbddc93517cce383d0228e0b111ccc56a13c5b16e0955871473abc86d8c9560980d491184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0438a53cadf6217b32454034d6dedb9
SHA1811df404ed4522aac3515446ace6f5521f6b81c7
SHA256b958db323b0cae0f3f7c880946048267a37b94450686a4babdbeb253e2fa03e9
SHA51229804f3ed3a39539a651bb2102494d739bc3551a3794e6cd42c6354b17d53ed83b583c75c04dc8f5bb4f6fe1cd43d981541a1efe01895879a7b178783ba67041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a0d2e16be81f680f254c3d8fee79818
SHA1a5f6a46b936b3712740283c86a86293df2294538
SHA25620580990f53a57751e509bb873ece1f4973da17d66bc3f7da504aebb66299a7c
SHA512c14c8a47c7ce52117cd8402a1405daea812819a0829ac2cd9ac1e6095a9e17e24d0c396e74b0bac973f4f53375c714fff2fa3a9a464be19a235331aeda880587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c0e83bb4e71c4609e6188845ade3cf
SHA16d308146ab16061b1b5a74b46a998bd5d4db73b8
SHA256ae1ed3fc99f40b1426269a1e082fac7b1dbefbf8f371c48b11d682da011e66b4
SHA51230a9cef3f60c438b5ad20204fc2ef4137ddf95501e3e789f321d459c2a790f673a7578072749f107cd2e8d572a7b76e1c318131b6d6257a0c04f841168658419
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06