Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
4ef3b5482e9c02f172c9637feb8cadcd.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ef3b5482e9c02f172c9637feb8cadcd.html
Resource
win10v2004-20231222-en
General
-
Target
4ef3b5482e9c02f172c9637feb8cadcd.html
-
Size
893B
-
MD5
4ef3b5482e9c02f172c9637feb8cadcd
-
SHA1
0486e10a12e636c957e64c5a4fa3791e0ad61982
-
SHA256
d4a1765a27c9f456ec4a3b3962040dc3e102839f7b8cc6d0777444e4bea3b8de
-
SHA512
b4349ea626b06c89591f11991563d0e93e1f3d59a6087edafb5bf2ea9aebd2c9b38487a6666cb61c8bf3cb65bddbc587c0fc0d4b10538d001df42641e05c4300
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410988565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A10C9B1-AF21-11EE-BA23-F2B23B8A8DD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e530d22d43da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000f22dbafc1111d80d972bb4373ef0160a562a888e562bd25d93ca7de7b9c732c000000000e8000000002000020000000e7218d452c044a9ba926417511efac2985e0079705704e831db214b81968d2b620000000f85e1629eac822c603a7240c108cae9dc2fd6c0516d86677ae320c14eb410cd94000000019c3b627f30117c82d498430525a590e98f97dac9cc84ae17b129c3f3b714a1610ed8fea3ad7076334a6277dc6df07686579b08a25e62e6ab350b6dab41df7fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1872 2960 iexplore.exe 28 PID 2960 wrote to memory of 1872 2960 iexplore.exe 28 PID 2960 wrote to memory of 1872 2960 iexplore.exe 28 PID 2960 wrote to memory of 1872 2960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4ef3b5482e9c02f172c9637feb8cadcd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f18806a91001a44d3791dab8bbfc42d
SHA11a82d4c3287f0f8047113d5113c6584e9c5be686
SHA2565037e6f2326fbfa3afa1b4235c83129af3fc9e1958b3863368daf26f679178f2
SHA512a11813a5f3619fd89892f7abaf8cdcedbb7f17b26a3c24be3bba119c3f4010579711ad38ce695c11708bb6a3c737cd8069952d32e296c1f757bd2df0ca929e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5322c369141c436614600990f22636935
SHA1cbf4726d6fcfe88d07290eb5d0010a392f424ee6
SHA2562b51e69c913ca609fdfca981cff4328efb2e5cfa433aa734515f93fffc044b43
SHA51290d7b605058d58966753125646921fb0358f1c9ea27adf0a82f096021d14572fc330595de8075e8962d59807dbd9732e1304916a17da9fc64cce349ddf84b766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d128d5c06e873f5654155c98570626f3
SHA19223508bf73400afe15c4de2f5debab799360ea7
SHA256416b79417e1bc1dca9e4c4aaf800c803a34eaedd13eda49d6d8ed9d593c049db
SHA512fc978a9c56b04932e20f012fd1d4c184cabb058d228c73984b1d33e1cfcee0e8dd4dc98ca88e0cdcfae1ee648263a3122da021c9daaeea9917f5a4a472ec4c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d071bab7f0f710fc33a720ba4300c54e
SHA120c1ace9673f4981776bae86ffafc3c75a2a3aa8
SHA256abb783da58dcaabb816d0f03efe9a8c59659f3e2dba8ed875fdd280691d9b54c
SHA512345c7922280befc00b0e89cf5d26987ef7d25df31220c1cf54eb3c140a0394a040307f8fe7302393857e01f693f0978a9d39b9edd1deb7bf75927eed1b36a7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4cad0292ba6a232483be1d451147371
SHA15585e9d7d9a785c15f460b355a2e53b110d066c9
SHA256ac45e73547fcbc9790e159534732f1fdb66dbb9a2b640940e445c7dceebed13c
SHA512c7ca7ecd511a51c592a9f3655d4773adf79c7d86c7e3bda9b7c1dec068d6659d652cecf120e46edeeb43f9acbc77b263bc9132dbbc579f249bbd77f421bdaa3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5982cde7df7d7c43a1939581210cdb848
SHA1fcbfe8835500a870bda4e511752eeda9e1d5f13d
SHA2565401abf62a40ca85b2139d46566beb25a3512494ae405a9775886606b87a5e7e
SHA51238891dacde3bfa0e11988479d558249328ac67fb5d7c17082f1e4b40368686f34f8242cb4a52da60eef280446a6b4119d2d55618477189101e351d8522bd8be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ad3c21438e5a7c9286b101ef3c2fe08
SHA116981daaf840a6d937024bbd39fb16f33c54259c
SHA256e3352c04a535389258fcbd7109caf92f797cbc72aaceea0db60801aea4dec3f5
SHA512ed7fac7c8adc0d6fac50acf6a1094f4f72434957056288d3b1e40a327239d0754e0e57386db3e7314de38579b5eb42632a65329cbfc4bd90cf78bfde741ee712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5072cfb2e9dbeb68d0390c8a7a5d69990
SHA13dcde4e08dc460623a58cc9ca5f35ec2ddb7f4df
SHA2561a38aa2ce295b6b22031886df7cefe542500c5b818959076faa460c779976578
SHA5129a6fe3e83db62bcefd8fb99e6681dcc37f64f6c45d6011ed7cb961904c188fa1ca2d231b8b891181ac8acc91dc6089851b583f92f9cba55e2201c68fd3a2dd4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599fa572b0e153de5961f43bb3ca6556f
SHA1151bfbc23980bbb54cfb81931f77b9ebbc4c837c
SHA25618b1d45fb3b95b1c3ee1ab3a6670511a0aa65ae86f7e8dea0e75b71fd34aa5e2
SHA5124365a21de143435b6ed06759c575f5bcb226594494ffb0eb3517c230b263d1b7557f718c39f2b8bcd3bc15aeb14353ddde4bcf7cba8586cc6ffe538c495dd96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598936545e895c99d9536070ba27cf091
SHA1fce31bf3b4fac11745d276e0f7e1de3a9da2088e
SHA256c64741c62744298a8a4da07c75c8b8de699e0f6744ba97d9e36485e75572e429
SHA512f184024115021ad960859dd582126aa37a7b1ee6a8477eea9dcd2d3eb90bb1a957628bfeeb138c01ad7241c689aaa089e07d25982133e6329019424563bc2751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577e40883e8f8157e80941c71744f290d
SHA12399185c9c1c5fd202db1423f075220a4d4b7656
SHA2563a165d749810267cf90d1e60028ae728a7df9d2c40b828b406a300ab9c52dd08
SHA512e3816045e587c502e2b38c515a2f6b57471179f1ade0fffb1cb8bf37387388dbcbf42ab78fe97b7d89bc86fee0bb90538fbd017125d6cb3a27efbd5a6e12e5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e22059c6580c8a6d332fba55831a946b
SHA182cba94b87764f3b3aa7d6ca454cbbaad5cd725a
SHA256ff67dc78af0f681386eef5481f05f05eb75781431a431a7d93989f5fc9a0dee8
SHA51268944bcf0bc0d12caff69fd8203f0058ef544cbd66f757bd43d9eedabf7a53bd6509ecde21a391df6dd40ea84d40d09a9d6f98ae74e0536b6a836da5ad23e8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d7875bb34581e93631ad25e35c307df
SHA14095d6aa6af449af5e9f90821edb2791004cf982
SHA2564ed956f24b58c0c9b59b8eb59e022ca0fff8628e0332647c09a289b27fa10e6b
SHA512cc388e3910c805fd8a4be8ce33df14f8b7ec2325a3a607163fe1891e52350c9215c629bccd2ff7b279996a9432cb4d43f925c27122098cd4645dacf6af9b7903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb73b5e320b23de66c22eb5d5b1bd62f
SHA1397368deb489a1545491fff9dc69d21247887e83
SHA256b31ec4dab692500441f0055a1c43624f4fdcb585140305c6c1910d140ffc4a00
SHA5129baa41c1e41c3c7c5b450a41a48b8033062522f699e3ac9bfcc02fb83e5c710c534cbdc23cfb6ed4e2209a203b3b316894d5cd0c07228e37195907085039d604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4aae0e3c6cdb49672721a0b2c64146d
SHA1adc9d0892326024531c0309494ab69dab2a47837
SHA256739fda169b6c750c464f7015fa0104f68e38c51492256e37a96c1f59a93f374e
SHA512cf6824648543065ec023d8933b936e59d59a097012dbfdd8e5a8c12998c194de74db24a4e010ab1fe9ffe77f52ddb209c7873a31f76d73cb685de0a39085ee90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd21657c74ef0d9431c4f64a263512b8
SHA171e9e345b80f5d79a5811dd293e1d022c66ade2a
SHA256d5be43f7e48d2851671e9653666d5ed1c984c2011cc118ad6d3177be594639e1
SHA5125f18a9a253ca8c279eabb1e39f39be93557b660c7ef5cc452fc657d78764249eec559b23fdf107e2633f9349a8320e694270d16c7c5e9f5477c34582a0d2a730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94cf228f0abe6eb381dcec8b025db6d
SHA1a6c132c458ce457b009f67965714e57046949bc7
SHA25665da70a5f1a631db1481369850b93ecad868ed3741d36aea7114b0d3dc62810e
SHA5123d269c55c5b0e5f02d7252e6943388811dea1135910a49c8bb5c9af46b59c67fdaedac991df8744038c7f5458cf5ff9017a535e8e21e0d37a5a7d08c2ee72fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5139631e5ab5b04cf1d5e1f94294ef142
SHA1614200808944eaf686768ec9bde0e2898ab83533
SHA256296912b3f23dcb0a12389bacca8bb6ecf5ab5687dcf8f461659fb45178ae1013
SHA512c75efeed023439165b3a84b025c346c1c0012ad43c88778d7d72b99782422f138aef0949b0a7beadae8f5a068e61fd699c64ac2d753455c878a4076f3d1692c1
-
Filesize
1KB
MD551f42492b5db2e547488d94455312d36
SHA14eb274dfcd8f87c7b445dc917a73f9bc3520bcb9
SHA2568ad2b43007dd33d296cf1605041efe84422da819f994ac8afdafe7e6410c4880
SHA512707f8a03ef1b3d4041188fb73f043972fab5684fece621d0e1c0ada4afd1d2fad904e489b09eb26eb4bf5c7eb870b8a45138a523bd0af07f6c4f50e3b5761901
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06