Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
4cbf655ea5bec363895fad898c8ce3ca.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cbf655ea5bec363895fad898c8ce3ca.html
Resource
win10v2004-20231222-en
General
-
Target
4cbf655ea5bec363895fad898c8ce3ca.html
-
Size
52KB
-
MD5
4cbf655ea5bec363895fad898c8ce3ca
-
SHA1
3da56523c81eea7dae02c64a279857e269700ba6
-
SHA256
db9fa0a7e1990274190840139e693c63ecb4f36a29e4c53603e3802fc8deea08
-
SHA512
c57df537a73cace972cfab0a67157ffabf8c9cbe9eebde2d8bdde6765f7aa4b4d9315b04e8ef65fe6aaecc727b85512ad62efbc9672cad57ce3a77f0d299f69b
-
SSDEEP
1536:rsIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZ62:rv6xlXrxcgJ6AP0ms+iv5
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000820134ca15b7b67370837e63323b94d5a0c17c8d962a8fb2d952df186a1ef874000000000e800000000200002000000073edbb1fd46e1654ae6fe55d8db59369d65105cec2785130e0f9a58eff42986f200000007b2e08b7c61e0111137affea4054b370b12d3cf17be08de02372555af3154f0540000000d29a52ea70ffb7b9c5c535d34d5d25da3f5d555f5ba6d50d0f9b711ce4329ce756c6903278f94fd9e48ff8a8b9caed9d5f9d5919974736a5b2915bbf6497f1cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{908E1901-AE7E-11EE-94C2-56B3956C75C7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000f53d398a6e347ac06011bf306cba4c7212fd35878f899fedc1a56d8fc0547fc000000000e8000000002000020000000e6711a0fb4161c442043591c829e98ca40899e50ddfc0f281ab19900762e712f900000008afd7f14468f9b10bf28cdbdb20aef1d206622507a57ef891ad012c3effa0911e96a320ea503844974d4040cd7f0e8acca85b534c124d10a7fb7fbccaa3efbb168cf463a7c5d52a8d4aaf89d18e7704e94aa57e485a83c74ae45e69d47d0fb7eaa9cdc69e510ed0d53fe8ec4082dd4401358f1b2ecbe6528abaf5a0cfa1ae42fb0df40194bc6f9fa3f1f31062ad998d5400000009a70eb3a217693c2a8b62f97b32b1a3569fa124c068832b4b7bc3aad45b2da5bb644823a85e51f30d1a30522f312da2df61a402d3e94f7e366847a5da8603d00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410918784" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dc3d698b42da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2156 3032 iexplore.exe 28 PID 3032 wrote to memory of 2156 3032 iexplore.exe 28 PID 3032 wrote to memory of 2156 3032 iexplore.exe 28 PID 3032 wrote to memory of 2156 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4cbf655ea5bec363895fad898c8ce3ca.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9d48f800539fad0de71a03ade45e0f2
SHA12145f46dfb2300a62270b24c860ce3288fe02748
SHA25603c0df19b285552ebce4a5337f7f0f5bacedc89145e09835ae664542145d511b
SHA512672a0eb34b3fcc0ba4e849f2f2d18291996c2e2c92d659a7f1c410c6e6b355fbbeb0c3a117ef8659ef2b0b24ba38205100211ff15f663838961a2814d34a4912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b779c92ff4abe6d0df1c175620763a1
SHA1e32ff1f540ad33a5e9d9ecfc89cd9f285a600505
SHA25681a6547dd613ea27c7d0c482b72d6a9e877b373643e43b4ac2d2c873d586a68b
SHA512333c447003a0c8e565f0d1026501d60a6a49173a876147df44bc8a6cf84bd944e6340b6baa32ed06eb3166254319583c2e5b4d07698de6cb0f888a33472669cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccaaff2de17c0917af6a2f48862d83df
SHA1d0091e7544b5513cb40b09339bf9b4ae1706cfad
SHA256af9c917f189215b7c759f97c01a91e1fa3b8016f34ca691d2249aaaff3314e1c
SHA5123087706bc44e4031b6b60b368caf2f5eb37c140738433c0e88bdc5e573d52f96682b2b2d5347f5f50a9ef25dee5c509d0a5ed605245c3f579a45c47912f6f265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c32b627dd597539b7aa4f9e4ae539790
SHA1fdd2be9288bacaca938634efdba8f5fc8cea73ce
SHA256626d98e7943d025597fd481cb0f672557b378537d437adf93943bfe0751f60c5
SHA51235de8b9bf18adbb84cfebbdd5a4b9e32524450f3add49a1ae67a94312d5f4c0b433021a9894d8220fb14499323dcf3f67140d4a05b764ae08f64ffeb7397990b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3e8a3a1875387f335a0cbc6ee1634f5
SHA16076859d9f9d451d105ba52ec3db3ff7288c7449
SHA2560794ad7867e216883479724659b3288b76c92f03023f20314f6a51d77a76b09a
SHA5120ead853f0b190f7adf98f58ea1a4acd07c309c3b2f3f2b8c518d80fa2df357edca371d6249972a8408b97f20a3a013e7e5f3f2838f714ed56a15b57b512aa285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac07661f810c06837323fde6eaf83cf8
SHA116ef74048bae71b5f061d3ad2884f441d46db1c2
SHA2567c54dacb765e70de85cad5cecd29ebe42a5634f391f5c13ca8d044bb5cdba6ec
SHA512fcaaa240da34c370186b03684973a7363ed48ae745f80e0b59c32f9dc3e7976942a8ab4e7ddc48892dec86d13e6d4fee03f507ffb0fee2ed87b7c0737c901ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596a429d1a2d87aaf8350071086681937
SHA11fec0f5907afc74c8de58ab9f5e03710205a401a
SHA2562d285005af0ead3d757ebd7a61154cdbd5f1e63e228a97309554596f61463b7b
SHA512f10b87ae3b8b12a1241330223660e777ae76671daf16d70ee1eab55554c3310be0aaf7b030b684b32dc0131cec421e73135f74f39ab0b608cff2fdc01103ebcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8b85d3dd0d65af6ba21bdbe58de464c
SHA1dcf722ac47080754ae02eedf13c1fba85aeb00c6
SHA2567ec5e58ddf52bf18bca173705938293198f2a1b78a49fcc8cc98e8f6874a2bf8
SHA512b4f853d93afd4911f37bb13f095e0010936d64e33321c04688eabb134a46ec81c84f44939848c4bb7ee1f5052051baeec4822f1bc409d2d2076bbd291c327fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b77662a581a380a714e56afac3f36a6c
SHA1c596cfdfbc5f558104911501516e9f1bd27d0874
SHA256cbddd47be4ddf96903cf47e1f4f8b1ef92b51b87dbb37cf539ba13cb439ff740
SHA5129b8a28fe3cec791c03f8e52cc3e8b9ef6e4eea8025aabe70410954b980d240da5df9abfe58e1b25341eec46c246e0394aa8f49d85e6ceece688d10a9dedac047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e897ad3e00e1ab515b83ffa0f0ec19fc
SHA12fc4aaf79ddfb121e5e6614e26d6cbaaefdbecfa
SHA2562e83e2989746d16c598f62ed366916341978abc0f9ba98eb9f42881789d2c972
SHA512512548c09fe2c52f62bb4a9580b04e25e4f9c187a21e10a57ab4ecae19ed2607a6db7d1e7430d0bf0733ad982cdc3a5e42f6c485853ca466445ec42c6f23d961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac03b41ae2b73567126d3e8e69f9a611
SHA1709915f4c81edb7d33eb6e87bd0ff5b74b443f7e
SHA25693431b233c9a2fdefeddcee38aa4c339151be3fe19465722ebd6e40dda77242c
SHA512501ef774959ba7a2dfa17cfc28dd3218339cca7cc4c354dfa08d8ec07f81d238b4b47f4364d451377434269e057b7d5be7087137eb77ac60201d477fdc0c3c2b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06