Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
4add681b30cbadcbeb4a07a7a4df0d63.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4add681b30cbadcbeb4a07a7a4df0d63.html
Resource
win10v2004-20231222-en
General
-
Target
4add681b30cbadcbeb4a07a7a4df0d63.html
-
Size
124KB
-
MD5
4add681b30cbadcbeb4a07a7a4df0d63
-
SHA1
976d7aed932a2603224d4b9a6d939341df49bf17
-
SHA256
f715bd5cc2a9c83f0b70e5549b3d47c4be5b5e9e985532c20eda3a6577c3a3a8
-
SHA512
726f23e69db157399b9be00c655a95419e4970cf3b668f98e4983940136675de2684998787f23452b79373001b997936447e19ccff194b0f7f393c4eb914acae
-
SSDEEP
3072:JFUYFFPoBub1QBGRXRgIyxH4VcZcgclcLo+cXVPaf9YP1SkkKwEp8:s0Pl1U4XVq9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000536a58cb0f83789aa21b54d6222f2ebc95cbd152076a21773814ed31f53224cc000000000e8000000002000020000000deaa87e3a7da3e15dd601a905ad7b5c0dd3849ea7c42bc016d66fd367d78188e20000000ca58b0311ee251a1c6e82d841b92c615068565ccadc27bc60bb5fbf87171f5d940000000854aefb19d4164badfcb450a95dfe113ef8bdeb2f7667ff03b0c577e210fbed7d56f72b0e3494b124438bd65806ddcca57d192440dadcb530cafec63a096f839 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16DA3DB1-ADFB-11EE-9BDC-FA7D6BB1EAA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705015f50742da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410862317" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2672 3064 iexplore.exe 28 PID 3064 wrote to memory of 2672 3064 iexplore.exe 28 PID 3064 wrote to memory of 2672 3064 iexplore.exe 28 PID 3064 wrote to memory of 2672 3064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4add681b30cbadcbeb4a07a7a4df0d63.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD59ca625a30d5ec8d24ef2dcca3ea9b113
SHA130e5ee255e4abe2d1e6a9fdc11c60515c0336ba0
SHA256bd43154e8ca7cc43b57b55a1166e98838ecfd6d43f8453b5eab91786d6d2b232
SHA51261b1a7ab6a4d14890e93ebd5e597d0d6cd19f222c4efe9d267567aec5ba2c3f4754526782da7f957750c8f6b405872d0acdd04e4143e87847804961949ba0854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb6c93b3b9195185333c5c6789058048
SHA109db350bc314dfe90d35b711cc235aa8a5716690
SHA256ad6817461b93990ca492c31f80d7f32e65fc6369ed8e418503838dffb1049188
SHA512f1a313ef889ccb7149194ad6c433824d587292fc33674d18314efc071474c227c89772c50ff1ddb4c7bed67fa1488f1722e5533bee670d7a89bf74495c4b972f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cad57ef001cf63100413201a3ac2f89
SHA139ef4abfaeb5e05b07d9945057adb10b6ddf3c7b
SHA2561ffedc18e81118a5fe1e0de1e2923abee3d61eb787cf3324810919063ecc0f2e
SHA512ae0ddc4c26f7fa46a6a552f4b1277a3c55033b800b2b1be628bd65eb7bf445579d0899a70749c35a2bdb3de144e3c58ed21b8ab81bcf5a0b29639818973462bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521fc93505cc9c71797c5b8743b9c1359
SHA188062f0b0b9f117930b106445ec067e500749e78
SHA256ab74ba21c0474ef06bdcc89427d70a233a75b6d73eb7b67807f8d452c7d5530d
SHA512c3cf8ed5748827d60928a5fd5c2aaa37ebcc6b5987c390ed581f636d92e584fdbe9c430c6ea313646dc4bd1b7aeeed05dbab3cdcb593b743e7d908533e50ccc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e374b2fad24f1ac15079fdb0de4db55
SHA11e650692ed2a6d89cad1cf341448b64a89662714
SHA2563cb7cfd21da12f2d3e21e408f6aafa78ef31cc33eb27256d4536c4332e7b8e6a
SHA5127d2d7a847bb2cba01735b02589e159949f193847ffa9efc543ddcddf449f656a26180081499643e7eabcebf98de25a394194de4755ba3ed4b748a275d14a96be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d4d7e7c8ba5811e94809860f141b982
SHA14469b4eeecec46dc3a904fcb34d93afe58b7c382
SHA256b34944ff478e9031cee05caa8df26a53623f1192e60997951a541f0f2a4734fb
SHA5124e332bd39acb74c1739ed978cedac669009122817c472298d8753cd5fdd581d95b6f27e7c3450d60cff437b879ca6edff1bce5eab7d7ddc931f35016228e122a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579123098e3b500a6230498d8cdf2ab6d
SHA15dc4a466b45f0c5611d82aa20ad9b27469b4b650
SHA256d4536f43f2cf576f79174ca6ca4c334d28c87eaf206668c7693f5c5bb70bbb2d
SHA51283ea86f840f91f4acb67193891949b969b5e805e29d65d60eee4960f29fd60d1e332398f27b68080fcaf9d5b964bb0b62043eef7d7a56ce55956f6990fed259b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b178b0e586a05603e6aca7f7ab1afc9f
SHA1eeaca5abfb798e48a07e7c4acfb4de7eb1bd2782
SHA2566de6a48cb5eaba3bcfa0e6ff8892090cedc3e4aeda0aa2092ec12edb820971e8
SHA5121034ccc26ba5f31729ee200919d9d1e48532126a84a5dab98f5ae9c06cd00d2af4b3125bd540ce1bcb0ebf2118ba16efe2fd3811a9e2536c701f079d2babb49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acee1b5569cd428250ace92603f471d9
SHA1f4e3cce9e14b728b45b698d3b0ec269cfb3b5fd0
SHA256005cd9b7ee485b249b3444b457b2006c128e1131c64064c08c57911291bcc291
SHA512abe903ec3bd2e56a03d1b2424a2f502657cd84a3d780934a1056935b38bd2d2f6f64c4415134e92417b6e40685a06f5c2250ab1f8e50560c4db888004a682bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951df91ba3b4ff9eead7a8f7286752fb
SHA1616e73357619dca9cd69df8eaff190ac91fbd6e1
SHA256457d5c58d9ad902a8e666410b977abacd53dd59a9f5578d909362447176315ac
SHA512059b77c5ad789fda38de8cbba9163da32868e213371883a1d8880a160431337ce51eb86a8f5a7dcebabc4913666aa0c832c445e86e47605210d7235b31875f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ba62cf933cf9743b9138014aef2db86
SHA1f65ffb98beaacfe9576f385107fe3030840e6265
SHA25617dc4ad5c381a7ea057423f5a908f87d89cfd56392b283450f8090039d990643
SHA5123ed0948d04692f8a84332b5bd033c8b83eccc5fae1208cbbf9d60aa75013b447ec887a0b32ec81c8a89a8c1233e33aa5a52519406c231dea5ce808abf910d2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e295f35d5c3ec9ad4f63b2f6e2505440
SHA174d2d4905d6b87f224ed210391baf9bc0ad10f24
SHA2562660e06aa00f8c96f4145ba77b38691ef7ab2aa9af683261103df6c543e6e250
SHA512782ea02045531b2d113832d9c0df649e5b50dcaeb79f366650ef82d27ba3b9109d586c02650694b498bb0c0ea04be1464da7d6c4abb9896877babd172f225011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592fdc5700b8abd84ae4262040af56acb
SHA1c7c7e0117b40e960225908bdca9ac05964ce62f5
SHA256b8d1a14df3a5fbd0c8d5d4129a9b43862c852f7168f7fab96726703813d9b196
SHA512b8b4797919f0160ec83503665391f4849867c5a22f9bf818d1fb94bf3841f3424b4a7890d334b1fdffcb6b82c66de633a355a2af3c64b713b1945688f2f1f4ff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4R90HQQX\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4R90HQQX\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E25VF8N4\cb=gapi[2].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E25VF8N4\download-album-3[1].jpg
Filesize68KB
MD52048924a61b2131973f62040dc0c2613
SHA10466853204e382fe6221cd41e8d4e0fc29467bd2
SHA2568b114c0fa953c462c1afac958f9526549181a466a15f5d911d1ceb31cff7e356
SHA5123d4999a5c2934f3cb9c28cf0f06b06c2af7e8d7b04c494ef9dc6ea030a622b98fcdeb7aad17191a7565a641be1f426bb5780ec59cd13069c67ee18c1808e84b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E25VF8N4\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06