Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 20:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chriseric1.github.io/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://chriseric1.github.io/
Resource
win10v2004-20231222-en
General
-
Target
https://chriseric1.github.io/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47663591-AE66-11EE-B218-C2500A176F17} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2308 2168 iexplore.exe 16 PID 2168 wrote to memory of 2308 2168 iexplore.exe 16 PID 2168 wrote to memory of 2308 2168 iexplore.exe 16 PID 2168 wrote to memory of 2308 2168 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://chriseric1.github.io/1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b64034280414f82a6abe53b873fb1b9
SHA1f1e17b879d931ea47bcbee40cf5b5b70660a5adb
SHA25647ba56f3c2ec98e3d9df5930ecd9a19f611413f650ed1a435d361bd845f1678b
SHA512d4ab31a841b81bcdd17012176b17406586490f7fc3ab0ea716b300e447e32bf5250df108c7d11ec23d1b6a42fb4bc3ae60977176790e70e8c2254943b4393843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5e63dec70bf0ffddff51ec42f029dab
SHA144eabae3916009d9f89bbb87d110e96c54054965
SHA256e73746eb66a04ee3b41e4e6a195a5f597cb5bab5d5e32eb72d816a1a103d515c
SHA51268f1422ce4a5c411055d0c48cabfc55653c2d92990ebdca130307d05c9bde931d0d3bce4eda66a3d2759ea1a4df35c793d39e3ff10faad8a7564ad6ccf5e6f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6b08d73ce3aeda289f82d0af44bd967
SHA127c2d2036ee57aa77d23a70099a517f59e24f784
SHA2565fd1615546dc390e3d1388da744bb40db5559bc26c7c9f60279dfea2eb7e4926
SHA5127912f4067cb4446fb34fa6e2effa842cfb93b13f5f474bdc3df0611c4e64c08e4b0a62c8a62d1e03e2bc88e735e63209dcd1582c58de58e7194e3bc5104a03af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa22a604dc1cdf9307ee8ff8059bc05f
SHA163cd19661154bf309307345ded049f3cd0b653a7
SHA256c1364284b67563685d86725b2fc891811e94421f833631b3e99ce68bc525d492
SHA5126383cdf698756227bff84ab857aad6a27f982d12b5a2923ba19be6ccefbc0e9383c97a3ed895dd1152c57a6c566de1e885864764439664e239e745f12b701682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e5179198cd1b5f4c622e0a33408d880
SHA1be92eba3db6bd8d54bd3a00f600b40030506d5aa
SHA256c508c9b3622dd69f6f8ce390133455abd71c69b7d06081630b871d08023d5541
SHA512b1eac2f93f37b881db086a7e48a893062f2bd90f7357c0c1314b280485a061612275678ac56b438006f06ae4a503a079c6c6ba21c616301612c0997fc9ecc4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c758c4f29c66c3374dad67233ac1a3a
SHA17911c7b39ce24c41e2f315df626176a2d6004fed
SHA256c9d8bf211c0e4bf5555358502bf0c6cd11a15315a948b55a1a3123942538e55e
SHA5122cfb13218bdda79fb6b404dab6bc1792c76c1d70e0f0a83757fcafddb8981390bef033801c550c2af4894eb0e45726bf40995fb16237962708361940e8460fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48b2488fed50d45451f43afad697720
SHA18054eb2e4eb80d69d912ff2a8e3c6a69b6c3e066
SHA256b4d05592721d9f0afa00df26cf438d327ef5bb5fbaacdcee2e2a7363d13ea5e3
SHA5120fd9eb321e93ad365cd9de9523b96a9da8c2b158e7c3ced7b61145c69e7d30d19c822902aeb01d8f9055447167e314ee31af373f2ae5151f69ce7badd7431c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdedb8b79dcd365cf4067b5f505b7fb3
SHA1bfc553afa93f2b9a7e5690c385027c20a9e6099c
SHA2568730d0bedb30af4b771760bc0e6290ecb8ee5eaf2315f599519d5cf6d40ca031
SHA5124155c25ccd9bdb8cb434bae63c22857ef61a3309b450c6a6a61193e0dbbea5287f5973b9a3439044b5a4214dbd4476a3971cb1b66aba76e13fe03587403fd42f
-
Filesize
13KB
MD55583e1b629005b696aeb82beab24df8a
SHA187fd36acdc437f0387b7c12f9b39ee58afd95467
SHA2562935bcc20060f4d77ab9328c794e18dcddd11294e9b4ac563cf4f0b1f7985909
SHA512408b7d1add114d02510fb30515766df13ac4a67285e3db35504126195b98ab8bd8a887d2a028ad93968402bc361fd0ecc10427a86497401758408138d78e855a
-
Filesize
13KB
MD577fda46c495fc31be2fc16bdc3416804
SHA16482e3b420f1585fde214fdbf330045c8d06fdb2
SHA256c0e12ce0d0adab1b43c0294a8e1a09287462ef6b2c86d654aa3c9ce19637b35d
SHA512ffb59a17eccb4a8a9875398433362d2b9fb7c8755e7802132568a88e2c3c4ceb67c050c035ecff905bc359c5bee154d106f10e5b23f777dc95d48bc5409ae6d7