Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
4606ae14d89adb2cd3979f325d77c675.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4606ae14d89adb2cd3979f325d77c675.exe
Resource
win10v2004-20231222-en
General
-
Target
4606ae14d89adb2cd3979f325d77c675.exe
-
Size
8KB
-
MD5
4606ae14d89adb2cd3979f325d77c675
-
SHA1
d3accf8754c187e9f66595bc81ccc9a612e0c66e
-
SHA256
108e18039beb1a205f8dfa2fd86e742ba9949504192e5b259eb4badbd6996733
-
SHA512
ed8a67d28b8c3d977b81cfee2408829e1e6b58a02aaea373f0ce070b2809964f18c2f2b0eeceac926138a4a116eff2170b2955e355843915d129adb81b80e3ff
-
SSDEEP
192:EGvuGR4XpmOU54AxAwCMrpY728LqPZo5LdCfSZ/5nSO3:G+Ks4AxAr6+29PfS7nd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EE66801-AC80-11EE-9673-F6BE0C79E4FA} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410699738" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2056 2480 4606ae14d89adb2cd3979f325d77c675.exe 20 PID 2480 wrote to memory of 2056 2480 4606ae14d89adb2cd3979f325d77c675.exe 20 PID 2480 wrote to memory of 2056 2480 4606ae14d89adb2cd3979f325d77c675.exe 20 PID 2480 wrote to memory of 2056 2480 4606ae14d89adb2cd3979f325d77c675.exe 20 PID 2056 wrote to memory of 2708 2056 IEXPLORE.EXE 25 PID 2056 wrote to memory of 2708 2056 IEXPLORE.EXE 25 PID 2056 wrote to memory of 2708 2056 IEXPLORE.EXE 25 PID 2056 wrote to memory of 2708 2056 IEXPLORE.EXE 25 PID 2480 wrote to memory of 2056 2480 4606ae14d89adb2cd3979f325d77c675.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\4606ae14d89adb2cd3979f325d77c675.exe"C:\Users\Admin\AppData\Local\Temp\4606ae14d89adb2cd3979f325d77c675.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\program files\Internet Explorer\IEXPLORE.EXE"C:\program files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a11d742c04ffbce3859992901a35712d
SHA1a1da9705d6642128f94c009f556f9501de2bf81a
SHA25604b51a8e62aa7b9d92875b7a252e62e5a36d00157c25c4ca7abc8bb277e07dbd
SHA512619bafd3b83b598988d36ecef423181499caf6c8e3079b186869f5a1c3fe7640edc9b8d622bd200b666867b401e7bc78c869b5451096d6760e56576bc72651ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ed449c57210bdc0bebc8a24ca668494
SHA1dc9dd979543128c2e84b5b1e8ef7cbcea41cd5b3
SHA2564cc43b0053b1f1ada2a9fd08b13eeacb7058498f392df4aa3d112ededa9d8e2f
SHA512a8bd9fc38d0228d156373de22e98447e03c881bf92019eadfb345ca49959b901619d57dc27e790bf66a752e51ae60ccc597730f939a2c86077ba744c5c19090e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518c1fd785c5d99fcfcbc3f1b19c8e908
SHA13f9ac282f44eb8502255544b79f887c8fff04186
SHA25699a9466bcca6edf13398f5652dfafef5cc45517620b016aa64f81a5522ca9942
SHA5124f05eab72bee4c03d3ffa18ce56b95298ad7dc8b20cf6f0eab326a448423e1169b399f7595d1d3d641ffbc4b128fea4f6236defbd85490043b16938944c42901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5658d336ca141a5228dd1e31c0733285b
SHA178426791906a3874a97c4343106b4d7c7850d459
SHA25602b1fff99c1473ee3c2679221360efbd04d285f51d0e9ad231bf5b616e044a26
SHA5125ab5f414b468e4c112a3ebe8867a1b9549d670b15890c7f1ddcf8c7d5d6f0bc55ba178e473a6ab032018e1ce8c6a09516514bb5f3137cdd13e19087d6dcbaa13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b428fc1cb7dcf55a53ec7145768f1c78
SHA1ff7903e11b475f77a10bfbe5d4fed78751fb61d4
SHA256733e2a20564d6011bfef0b4d8877813f2ce459116edcd3ed58d97a14bbb545de
SHA512c8246406330d0f25a6056c336b7df027987eec4eb6d19b9204c555a3dd224153f94530f8e6ec7edb7eb792afa12b8def24d37fea415beb094be91fa4989ed9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5937df95011fdc857fa21c4f9a41567ea
SHA12c0696daae29b7e4f2c924fcdf187e0270bb43fd
SHA256eee70d2a8d576d7539177cce68444e7c952d189cb9f224b3d0310f9504461bac
SHA5121f863355984c6e7f1cd4fabba65235d781a9da067c081506e121d8c806b4cc961004d5a1fde68933a71ee76fa0520b60adde15c374ae599ac0ea6002fbd94131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5724b41d67dc3cd0a9f443e5a3874e434
SHA1be4e90a4ecb45ad689d48673fa66b5b3e59d1121
SHA2568ee7fd38b42fb0f7b78070e818f13b5e216fcefa37c50166ec14a136016efd12
SHA512106a8fcb0ff90f3535c3c931466e3ba62ac2bc7aef2bb1abfd101a0fc4685d0c0975b5ee3cd281d8583298273c5005f4c1d75d01f3d922c525178de19b765d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aa7a6dd1fbd27707dca9fa658d9e7a3
SHA11004d7db82af4ac9596d89be3e82c65146e373b2
SHA2563436fdc177a2bbb08b00b17845fcf57b9b9287c5e2084321426ea86fd1d36ff8
SHA512d6deaa4d8b646a1dabab33a90fee39b7af9c93a379e55c46458d051acbc702dc04a41d3599111ed88405626c715da48c97777e96c45c73e0a3d933b2ff20fc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a485e452dbc0ef14c2628001d990fe
SHA11ae2972763f8fde26c25f363796bf52280de861a
SHA2567dbb4fa2466a682eb7f78fd6ee7394d05aaf2b7bc70decd7b3b2095767f5313d
SHA512c6a770a4b009091cace3be0a190e65fb770bbe5be784f535ae0c130fe9394a050d6c94d873c9ad80b769d65558d831d946a413beb6940e4851f9a7213831b6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b9523041a94a70de7d08ed3771e89eb
SHA1b46db1cd9d1ed635d42a2571ecfb8ad616c4dc2a
SHA256c1523f10c24179ef607ce7cfb1412c0c93b5b3feea3ef07684433cd4bf81bdac
SHA512e327ff823a52f932c1e94b3d4002c84f4beab4abf29a0329d4ec919b0c5713562965d0b511b007b3ac6ab0a1d7bef82cbddbf2c0983038c630cbbc5de6b069f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579846dec3e23ef874bf86ebc4ea7d9f2
SHA1608dff2bb47ead7eec587f9aa269b00b04ee6bf7
SHA25678446a9231f8df880eeba4ad535ae7ca6d4dd17cd18bbee13f55a11e7bd50523
SHA512044a8d2da7015eb7b6f92caacf2e20a247d6a9c186e6fd2c05721aad7ec9d0ca9d29ad914eb6dc92ec9368d99be92168a16784cec3eea8c80264c8abcb7bc858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543cf4786336c94a1c62ac0dd60818c69
SHA1ba097733203cf92506b0d9aa091677d3153da94c
SHA2565a4ae0c9619f66ee108c224eabdf08d47fc9497b04b5241f8892ae8ed7c81c81
SHA512a75e39bc3e6acd2e390a9fcbe0816721929072b63f6b0cbfaa30bcd2e2d3401740863dc8d33dacaaca7d1b43e715cbbc2bf147db7d02d381cc8d4f4c72043e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5526d5b3662dd1a823bb5c2570a38655e
SHA15d99cfad73e2f8f4bd51c591de442082dce50b6f
SHA25628a3fa7c10cba9c301e889598fd19a4af45113d0e3b67b26f43f1e4f830f0c95
SHA5122892ee4181406fa8f3a64c6a8d53ec6f2a26ddd2f60d03e08908010282e04947eb8ea9ce4ede1a9475195312f92343b9c408ebdc308318d0808a50e19c02a574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57df6d67d677717649c33ade3ef0ea076
SHA12ddcfd003b769f83f816dc9f2a5ba8892c3a4d01
SHA25649fec73a593f1ed15e614cce72027bb213e0cf315c8247cc92565231f1f72afe
SHA5120b4b803cd46c1fed5005a9835b7d9a38df168e596f59e88d737ec350bde7c27e3d52b758ba69eafc18485891086a5af91ccd7e39df4d73b33dcb7c8dcc63cb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcd188547349ea261c72d0ca75aaf329
SHA1c6e2ce77e2f42e69e3a97b329b7446bf2eb99ebf
SHA2564747a99c9432ef11ba3c9757bc76ace597a79fe6ed424414b1c4abe5bd10fe1b
SHA5120c85a9a65e29a069533f03465b3223f81f4d0bd6ec363b2d8c06a4443be101ebad9b188ce366eb5c68e80f9fb2d1045e2810b54c64d28013df372603814317e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5424a0934b51e1ff552e604a4677379a2
SHA179eb91883d07e267b7c174bc1882b730ed336424
SHA256c298b810bb884a0678927d3d791a451db3efa2899612531c7a90040710e6ceb0
SHA512488aa4d2a2ba89d7b6862d0f99040b3470538eb000a63fdc3f5541f6a14e4dd7805b0d43a3b111fa908a6a2bae85c8ca306c3a239983d202bd8baa6e22fef15a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06