Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
47f1d8dea46f2fb3584d27830ebbf717.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
47f1d8dea46f2fb3584d27830ebbf717.html
Resource
win10v2004-20231215-en
General
-
Target
47f1d8dea46f2fb3584d27830ebbf717.html
-
Size
25KB
-
MD5
47f1d8dea46f2fb3584d27830ebbf717
-
SHA1
64ad52473b3ae46f3380e2868cf6333b20cfa976
-
SHA256
889c926b6f880ffafa0664bfe806a2dcfc757316ef7a92484de527544a71b4b3
-
SHA512
2d34d4a2c8608ab2d564d27362b61d5e64cbae2a5098b735de3e8a5bf1a5ab4ce12ba42a342ee8d3bbad01739d0ded6875904e620e501465069c892044fcff08
-
SSDEEP
384:811bnS5DKuog/yDd1IwR9OIhLi42MTpbp/sSk:8PbnK2u7yp5R9OIhLirMTpbp/sSk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8179D501-AD0F-11EE-AED6-D669B05BD432} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b6fe6d1c41da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000171acb262a48d678caffbb8e7b6f572a4da7b7d3f9cae02e455a1292f12363b0000000000e800000000200002000000054ccea202760c51a21b2e5dcf19d66092d2ddd99d14768f328d3c64608c5065b20000000a81fa2a1ff8512e4d9acafc6c6e32a78b8642008caabd2d6529b7724529c7ce940000000324e92b072ed13a32d67f036e6a59696d08d4fe8579c201812f274a9b1014bde0ea389cb9481a0a87347694d49ce7cf81ff0741a2549200d550b13ed4f0ec054 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410761139" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2676 1996 iexplore.exe 28 PID 1996 wrote to memory of 2676 1996 iexplore.exe 28 PID 1996 wrote to memory of 2676 1996 iexplore.exe 28 PID 1996 wrote to memory of 2676 1996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47f1d8dea46f2fb3584d27830ebbf717.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55ba37e4cc5efaeb4b808481730587ad9
SHA13bd1e03d95c58409e94c35dc051d05ef70c81e10
SHA25650b52bef8452d0fbcdf16c0aaabbb41c15570f8cb1fe5f159bad924d095f7097
SHA51266e250955eade14af52df7123ca3255808fdad5f2af3aa56da01c5ab457b36c19a38f27a1cea4d4173251ca695d1585c5811316be8e27b17f3ceb84d2340618c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50822b856dfbb701132294017a7281a2b
SHA10d3add33bbdd60b01fcda4620fc9d7865da63bbf
SHA25618801e4bacf3da88aa59140a506c82667079aa0fa9ff83e8ac994d106d33b7e5
SHA512c5fb8322af5ae05afeff22c32a153ea8622786d0fd49a8a167fc09f9f985849ad35567157fb52bb0408d47f7d37ff2f3052f366e747931199b78bbd56a93a26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f382e8224a3ba096daf6fe4e0b1f4e49
SHA1024e8566595fdff020472e37e90fc743a81859d8
SHA2560ec43881cf8f9ee040311bfbeda74596fabffb9d0c5f875193622b27dba8d89e
SHA512ddb7a6fee0239170025a4379319a5d72e3003c4232cd4b74780cc2cbd2e7c7072655aae658b97ad6ceaa5bf5507ee2c3603f933e0c8e8d5fbb99e2190f108317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a23a131fdb601058c3b22a185c76b06
SHA1a0e656782a6177fb41afd1c9166361bff7a578fc
SHA2568b1456aa866f217863a9712d7a6cf5f14aa92b9a322bdb935c586d6d848f5ee1
SHA5120a7316b16bce71b3b0836c32ef0c12bc05014f3778061c81000b1db869ba8b25b9e190a2fc308de14508e906634c2686799249b559b17883c0f31025ca31b8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d776b3c1314f2dc8795f680437fc87d5
SHA1c9fc16b5eb841b913a9693495b0d115b16b3a266
SHA2565caa2c23b397cad86d1db041a5ea172c8d81a4fda678529474664742f0cb23c0
SHA512805731d066943b67aeea5908b9355bbe460a870c7391e632494109e332aa9588fc43cce2be8b75be3087156729bd70736f3b6de0dd4a3a1c63462fc6ddc8790e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538470f8c50e668421161487d493eeccc
SHA16680173b2c31eaa31000f43a895b9d6f4e05f8cf
SHA2569f9b3bdb23ee62a718ae89782c546eed46bba1d7c15509dbc3f81dc44f60019c
SHA512d3bc93432d68b5b0441535a1513aa58010d9e49102e80b187b0ec69427afe8e00ac97e81b1ec647786531ab6828aad0da67585bd8c68461bf2914b0eb882730a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb439e57e777022ec614286c1798aa8
SHA10921bfe9e67758c6c88bd2f161ad68232e12a0be
SHA256f4904b924291a9eee5fc65a2074ed6a7ee37e0c6d780d2007b4cea9dde71d870
SHA512e3c88a860217ff441f68a18acf57154fccb87c58dd2e5e549e5e4603f0b0ae12c53071d857e35f880608f8c7960de34c12db081c92851e82498bbd378efdbc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595f1c48bf059b68ad018b87b3f699bb5
SHA17305c529fc76e31c0264f9c9c7f94cb73f57bcab
SHA256ed4e56a78344dfadb9e6dd2201752dcfc9fcebb083dba28a449b2a1a2109b6b8
SHA512690108a44b54b50d037fdb1501126d22d2d0e0010434a7d017d83ba7a4f60f62922ff1a629566c191973d4f3c3015667f65b4e50d87c6d9333dc809e427a3e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeb5749ad7d45fd12f2bac3e66a8b503
SHA1ec55236f0dc024b055643ae9cc05c2d5cacad115
SHA256303e5e76db16b02483dae4ec079be0cc7d7da5ffb9fca038fa660f7604ede8e9
SHA512e53ffcfa896c1dc0170d01c4c1b8980f9b25cef76f3488353f637e423a2c3d1a25fdbceaf841e1bf9a6c7f3c2241fe22cb87b1f7a5b325496143994313470f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d887f06a18a59281cf4f924a32081ff6
SHA10df89e1c47b53ecc893ff8d017bf808e11893f49
SHA256a22fb94c2ca6e35739c7b96a045bc1d9c56922623adf7348d5ea3ca4f987e032
SHA5126834d38ad699dd760aacc82988e4c10de424a076a6f7d7a683b3cb02559a52cc1007c8c315134cf8aaff2f1a588805bbb2a77a045d39fa2204b3c0529c096c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c844bef709c5f6496aa59354b4d2b257
SHA1d47a734264e28851604bf212ec51f8d963923f09
SHA256a3db1c1b74f8040421f9be9a2c04ca856dafd1bb3ab99c4ea8873a09cc1efc56
SHA512880fa19b8c38f2416efe41ecb21a2524fb8ebd9bcd6f4ec469d44889696cc19c4c1c4cb7a7b91a63dfdc46ee9a1904d6ca64996a2218c60190e8f9c1f49c6c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5767996f9e450365552c4277826fa762c
SHA1d0a7b959b1cb7c7589d3daff5e5ff89b4a743cd4
SHA256e0b8f16c59bd8274411cd63042f636d0d0dcb167164fa78be63d61be1191dc1d
SHA51295c97ddbdc1ccf62876d6d4d2691ce91c138f2165f31fb226a763cc8dda542c644ff666014070ca9313c74aa51e3611b7f09d4be76440d1ad42d24460010991e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f7cbc4d412aaf775aacafadd9d857a
SHA16aac0200cdd8020d9ef2e0b04f920e881576e1f1
SHA2565a9787ec0da2f70772f7cd1bd88ecbc392bcf952f715a4722ee53c953501c96d
SHA512d06baa385c3e95722cc6bf05d892a3f42b9b369ac1d4869a2f494cf6ce24b7790d1ee58aaaa971cd2ab593c59dc09c6a588f0743da02549c22e364d952631f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53e29d096fc1210d5b57662c93722cee6
SHA1501ac1b3251c05dec5f7fa0901df91aaa00b85d9
SHA2569b38942b393d8ae00660a79ce7f0a69c1a8304844b5830c2519583f8b7c0ff4e
SHA5120618b46c0fd68bee3b6aff09517ee755db72807d44ffe7fe8b18138121ff7f7557ff24e6fd833de947c5f94ed3526860dc7ba08f6d70b8148a6ee8a0a35febe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q9SA70IZ\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06