Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
466af626d42ed3b52ffef14d06986ef9.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
466af626d42ed3b52ffef14d06986ef9.html
Resource
win10v2004-20231222-en
General
-
Target
466af626d42ed3b52ffef14d06986ef9.html
-
Size
430B
-
MD5
466af626d42ed3b52ffef14d06986ef9
-
SHA1
7924c8d317c9aed877b2e1d2312266a651a6be78
-
SHA256
05bdc3fd0e53582f045f892a3c3f9a4e1707fc4a8649cd6db0a5831ffc7854c6
-
SHA512
5d35a83d0091aeca055c3d58f16ce0c2c1d05514e1a4dfcccd18afd4cb1b99ecc25ef875d1ac737ae77e5f96fcf7ebbd4e061e5fbe5b0564043cbc2ca5c8ce82
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000001c71fdc570a43e775ef2845dd46ac3071c9f81f90414677a63636039a6b55879000000000e8000000002000020000000190773a35d268da7f9b8b6e2342c769c42f55f60f8f6c6a40a1569beacc03a712000000015c2971b9e17a6bfd3b0a6b5c420e6a0cde601ef7ff1dd5b4b7e1c7cca4bd7b040000000a84f69ec471b21392a44228e32f24b1868174047423668b71a69c662f14f357e2035c1db63d2ea0c979d4ff704b17da3116bcc637e0fc974f658de56d32a36b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410711838" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC6A8061-AC9C-11EE-B665-FA7D6BB1EAA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d062c686a940da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 3056 2696 iexplore.exe 30 PID 2696 wrote to memory of 3056 2696 iexplore.exe 30 PID 2696 wrote to memory of 3056 2696 iexplore.exe 30 PID 2696 wrote to memory of 3056 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\466af626d42ed3b52ffef14d06986ef9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0f9e6518e370fb27e7682c7b247efd0
SHA1463a88090ae9a585fe582abb055263b6cfcb608a
SHA256535635aa4df44852397f6a06531bf2eb8036650f9f3856df8bff3c7c6fff91d8
SHA512ddd4a02434a4faf08cd6cae4c793d6c05a4c4384bc11d539ca128313ad35cd96e77b2afc045f7f4d4dbd3dd37bc52218be402c98b60a47fbd7ac19335925d4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee93dd8498ec3a85f5f482ef71ec814a
SHA1c19fa487ad8d7d846d54eacde20cf33b42b57624
SHA25633f12c408eb5740b4c5dbbd0e176c8c744f2d0061804d2570228f098dd5aa6fe
SHA512aa4434ab9cb9e73ab000c26018bab027e4a702103b061bcb03aa05046e856b0e75be1ad093ec743f7c62386956de5fbef3a6cf101f15a73e283155b0650c3f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099307693120c1e63bceb70eb36d6e4f
SHA170d7a275569dda7d1abde0e811c5dee7b4464573
SHA256a25bf9ac2d76048a1c6b641801a84d527237172f71860b05243071fa05d060cf
SHA5124806abc7b86e561f113e511db9feb0d06af476757ee513f296cc06cfbf5c1463cdb0b001addf1b7a20a1b5129340f03f5162f2d8cc46ac264c16d49b6092f6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b29dcdfe164f66c8ec319a31fb13c95a
SHA14b37605635fca2a444620598671d244c4abf6b60
SHA256b252bf9581c3c9a166be4ee19303572cd8ad7dc121dc79102afdf3b200002391
SHA51264e8812dd5dc53e02b4c57b9a0708d46b974e7432b266c190f3f785222340355cb56ef94f0d393d50a84592fa91e67e87510bf8eb478e31e91a24b2345421783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56db1be4a13381c6e657c715e16cce0b4
SHA1762eba65d244c66b11658a294589e90e1399c95a
SHA256e8690a800456d8b679c1929f5191b9e1cff28f7dc60c1007764b9bd9b1828e5b
SHA512e0f5664021c5270e87d7c7500da8a634729cb4df7b0a20b5fe315e11f5de6be5179159f570986da3eb6898e53de7e4362aa392b78375b1ecee09b2d07b45d473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575d2ee1f400100ebbb4926037fe9f0b
SHA168001f850f64e7e148ff1c4e5acbb3c2de092cef
SHA2564b74077814290a66f722de8c1a50885abecac36ceee0ac13060dfea51bf49e77
SHA512c4b1e6902915cfb12a561072ccd22dc9c7231c393c36c16809bf513ba0984fe7f441a652e728076413c71eeb9869c0e21b1511956c576b72421bddf505e4aa29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5064e3607ace1a5af7df8a9e979ddf96e
SHA102ecd2fb55ce87f6984c5c89cd271c8ed16cf777
SHA256ecc7023f987a0b0441ff487b24b867472136c1ac3847972592a3d4882f591e96
SHA5129bd784d630c7f8406d8acda07d2d049716ab3698b615afddd822a38d923251c7f9f1a57149c413e2870fad34530a18676db9bca045afa6277e4a234b4d19dbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a6fa9ec8c8367e8bc4dc8a4c59fa13
SHA147dbcc6bb77879c94ba22f658b712121dcff89df
SHA256d81aa196bfeb8ab7f83f821aa64724b8e1a3080dda93d9bf88c19d4c1150a78e
SHA512ec145a6e50e2d193c7f9b49ea85b50866d57b1109fc12f481c0459fb9a43ce0130e9f42e7c1c18a84d909331937664ec21ac25e5cfff15395d73d13ec2e895e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d41962ed90f17b46a223177d2e33d5c6
SHA125aad64c25bcf9ae12ef0714e27eb758e54e79d8
SHA256c561d7c850d87fbd5fb17ea5f1296564382ca97c50b714dab7783a229b1caa88
SHA5129920afaf1e7284d7a9b8cb5c5cec9b173e02051949590082d2bc4f3b512674040757606c068db4a56f30acacedc4352c499a9210a9739fc8aa09a116edaaf27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579316a2fc217eee0e5679110d8a499b7
SHA102a6c350dc3d8b6003c3fdfee70225339bddd751
SHA256d0a4fb3a0ec34fa42caf5b8fd89bccb01d087e34fbfc5506085ca74d94ad49aa
SHA512be24e720c3cabd5465bcafc243317d0696c145d48658b77a5c6e03e2ebde9b09561c8a37b3c6528c8157d86c763dde7b19e37b641fd69662238f129bb8adf697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddf59d6312252668b5a30e2b0cfdf6d2
SHA178d9737b3b7b2316a9d0d74ceb0c7b5aefd3df7b
SHA256cf6a14836ea3efd9e4db95ab63c2ec48d8237b25673128f3c9d9a8969eff1204
SHA512ebd7f13330b27870fa4f61a1b3cac45e27db58118aebceab7feae64e4415ac4a918def50ebf5f9c527fbcaef22d8f917065b6cdd6f5c1f6c3d552c832deeb2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581b21686c8932ccde08ba794f4262525
SHA1217103ea277c4234cb3372f1bad272dd6b3b7d5d
SHA256fc639eb2a5f3c6119bcd5437ad04d06d8c193b153998721eb32a2b7c9c5384f9
SHA5126959561084807afe9d47317c449d883bffcdd133c61d9ff92bbd751d2fd4bf4c66e58286799cb696e0a5a59a137c3b34fae94d015a40e8052829a5ce711fe319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb9cb60048b7ae2c45f46d90c8228186
SHA13374021cac5782df504883be63a07db546f2640c
SHA2560407926888d3048a67afcd72324f40f663f220684a747ac946a113b6e5e31cfe
SHA5122187b9dd6a716a107ea9184627ddef1ad7e6c55992bdcf6db79f7482acc6a0001799c6430bf7a8ab673b8603803766c2bbfe34096d6ef8eb6f2513d0a20abf90
-
Filesize
1KB
MD557082ef42983c25e193f920f973f014f
SHA1369fb6123002c4cc50811fd4f066479f7e39eb02
SHA256f66ef2946986ab6917574aa2da8c416fe35fbee0783f883a4d0546991a823e5d
SHA512af50021c7708eca4e156ebf891bb2ff979b9c2e4058d89f08438558886a5964c4395fbd7bd172e1ec3bf5773aaae2aacf9f58b71189c4b035fd68ee9c28b1cb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06