Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
47e36f077d34c02dc70c893c7219dcf2.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
47e36f077d34c02dc70c893c7219dcf2.html
Resource
win10v2004-20231222-en
General
-
Target
47e36f077d34c02dc70c893c7219dcf2.html
-
Size
36KB
-
MD5
47e36f077d34c02dc70c893c7219dcf2
-
SHA1
79ddfbe9b89d6df6e82c9e66c2ef64d5d21bff66
-
SHA256
e5379683dbf2c587ab7f8a80ecf17f320ab1dbcea8ddbca94110ed777633c61e
-
SHA512
d4e2034160d0c610370bb704ddbe925e1594af97c67fce999482d193d6227f63f7908df273f86cae01596618fee58dfef1595722dc3fca91f7de80e514c48512
-
SSDEEP
384:vQ/mvM+Iuy89ZNnauV6SB7gqgEs17tPwvB6OF:4Y5F5s17t4p64
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410759540" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA282491-AD0B-11EE-BB35-72D103486AAB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2520 2940 iexplore.exe 28 PID 2940 wrote to memory of 2520 2940 iexplore.exe 28 PID 2940 wrote to memory of 2520 2940 iexplore.exe 28 PID 2940 wrote to memory of 2520 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47e36f077d34c02dc70c893c7219dcf2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5807495592c719cf4a1cc2bb28de54ed2
SHA1a9b79e0ebea3a97cb5aaa6ea23e0d459a94a8f64
SHA256eded72a7dd3ffcf7fcf3c78daad4b1c8ecc34ef93823554ec127b9646d9f23e9
SHA512cd6522dcf5c4adbc9f9407515355e49569b1d970a429ec96e140f9efe90e8645bcff8e8cb01dd28f17bd58d0a3f9b9c61e71d79d899d7189dda5683cf448cefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c224d807776d3e78c2c177853294b8
SHA1e244c08516502d76659b738de87a4f880ef71b96
SHA2566c504bcfbd61fed4a9276b211ca1f26e2c6ca08702df408e81e074b6498c8cce
SHA5129b2acae77561c59330341264c1b2f0d47082eab29c5d5ee894245c36b16e063ec1cbad7b27668b312d50e252fe21008df75e5bcf906ebb471b600c0b7a8a0ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce8b39fe52181f04ed5efa0cf0f4eadc
SHA105fc5e4261340cbc291d5605d587818011e78238
SHA2564d5218ff359612d7f7b371d2bee65e51050af8022c01a6278dbea96ad79e8e41
SHA5124cee4859c34630bd368c078ba2b4fe496e0ff048ef0b350a0688f8455d6ee33e1ff1184c506a838b5d1a1e7677e958ec7eed2452889f76aaceff7a734c826885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f90fd413719e098ecfe08ee6a42ab7e
SHA163cdb6c16b15984a6dd4e820f8a7d34f9ca91fd1
SHA2567023232c76253a7bb67545f58e36c651ae3d6c17728ba8d7104eb093f3c059aa
SHA5123cb7c335e04dbbe0768caff666cdac38bd3b991a8b708b2761beaaea9c3ae5dce654e48242d15774ce0dc274059ad668e632c9a00374d49f695a8922099d6577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52167555bf87615573966ed72dd430372
SHA12d32214bc6a4718ae5cea21bc5b9aa2f9d374d10
SHA25667427fe04cd0a14ec1db319d8bed2aa0a9b30615c31161de5f4be65662efb838
SHA5121de21050ccf443c7b8978413ab7eac8e793b121090f86ed8571794e1e08a3e8597f15769e423a707da952ce3e459bb588a5407707758e04cbda3b00aaedee3c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7873bc9ca4e8f57e6911c4d68bc367f
SHA1c2bdcd23c5e57b2ee271f8f8a0862fda5703026d
SHA2565d5fe80fb36815ec08ba5e0c96718ee1403a6bc45bde019e9fad96993befae25
SHA512fad2669344d1a04d1e61e79cbb4af0a1fbacb1e61052987cc011acae23d371df1d5be1deccd12a38abff8b88f438cc5fe21faaa4930c6d612878adaa8689540b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59931330cd51a839593f3edf7d387e0d2
SHA1bcd52c0458dc98e343984bb50c58d6a81e0f2296
SHA2560d36a676423cf4f1e30208f63511ecb701acb1cf9833218fc9f373acd82e5991
SHA5125b931d05642516153a5a9257df447df506013fbc3cd125b07b212e78644d928dea85c9e2e5611cbef2a0fe76393a0fcf65a002695d8ff6239afcc0f8088cf5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fc99a390017888197b52721a8421c5d
SHA1d0c403420d542ca4d8c5f098da8bc6324e5d4b6d
SHA256c1f94a3715d1dfd4fabec0ad1b3d393d7daf86764479bae6b187b6ddec53f2f2
SHA512bf8c0c6c007a3ec263051b594ac9e01f7f8935b69b368847ebb19c9eb541479368b18775cbf45cb73f8ecae85d7c40f71f75353519b53a9b0e8b1edc79cf89ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c4c68ce0f0338794af6bfcdfe0e48982
SHA1d6422b57647266bcdd8133391176eb56f43982be
SHA256a67135ddd7c52c11ef22b3c112104caca1ff08074cd325822de344e1bfaed4ac
SHA512897bfc492fcfd8a5912e08e5d7aaf1cc741345c7f0f9809751e22cd3f732aaf74f539b36c06449d924de6b47ed6480be834cba391b7bb3abe2aaa883db83792e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06