Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
5102bc248fe18b7d1e4f3209aee0472d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5102bc248fe18b7d1e4f3209aee0472d.html
Resource
win10v2004-20231215-en
General
-
Target
5102bc248fe18b7d1e4f3209aee0472d.html
-
Size
37KB
-
MD5
5102bc248fe18b7d1e4f3209aee0472d
-
SHA1
df3f3ac209591b0c603481be5a8f3e13cb162ec8
-
SHA256
7861ab67602669e0ba81c2d2488e454902371fb7f77fbebaedd8f05a41f0d746
-
SHA512
ce47a5d304d2fd73e04971903ffcece54edbf0554c4abb00622e00eabe929966501c434047c496815add1432317547475c1b5317642a8bd68d17193c140f40e3
-
SSDEEP
768:Xsdes+Vivxs61XITF9iDiniRotQj/7hQtvjvNDQGr2hnXhQpFoMnydWwnw2x6qrw:jEs61XITfio8/ChvNDQGr2hnXhQp6AyQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000c64df16b24d2cd00d45e76750bcde5d0fcba8786e4fdfe4e7a71602947fd25a3000000000e8000000002000020000000d31f475f74c21fac47f09ae911bd63b0a532e5d1589ebcfe2aa995c9a6fd1fe3200000006bba89a45cbf53c7d2e999d269c6478da68cfda0b06097b1cbfb5375bd65eced400000006659557090293a07d92b8a9daffada559aedc02e260aae72ea42cf5d967d884a94aff6c9e46787db802eaed9bd64a15b0d7654694a1ac4b112f310e88cafae53 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411064652" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d5c71bdf43da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33FD4F81-AFD2-11EE-B58D-6A1079A24C90} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2380 2184 iexplore.exe 28 PID 2184 wrote to memory of 2380 2184 iexplore.exe 28 PID 2184 wrote to memory of 2380 2184 iexplore.exe 28 PID 2184 wrote to memory of 2380 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5102bc248fe18b7d1e4f3209aee0472d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d417a7c31a4117c2e47dfc32321d2970
SHA1de60b6caa51927a1a03657b99e39ed7014986702
SHA256bed904f8f1c874e1e1dfd3a007732ce04a204af4fc90b8bddae96aacd5e6283c
SHA51290ecb91a70d2546acc5847b8b1cf994a80ddb862dd2ae3e9f0f98860bf7c520ad071d3cb85df514eda7f7015651d109f197a36142c6a1566f49d025ea6c3e05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a63e1db8f15622914f399ab78ece0a8d
SHA1163d4082ddddc7a8338a586771123e4bf6a024d4
SHA256a4a9226bb5c2e5e9fd85e47b0e3971d200b575027b5ce42069468cfe0d36d501
SHA512bfdf738f45688a525b7f740c3f2d97df0402f6ffe094a8e8f9d98e66624975fb30ec2820c623647668713e710c39e4a4a6f1df0db9b1d20cdee56871859dd34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1b98c0a5dacbd13555b404ed98c52e
SHA1d8980ac50ba518f40c6ec487604dc4c9d29cb487
SHA25662f5abad2b5c9b242c7809e7eb3289fa1f4bf34551b314f5f4f75806ad2c522b
SHA512f0cea0c604b41c2ae4a09c1b8f2bde6a94e64c1eb8ea150680e9040c5ffdd3db554bb2ed5118e5daeb76a4b889f52fa2230d1aac5eef3208ed54b971c4cab08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f4409ba2e5b25adaf78e2ca8293b83f
SHA1a3cd590e95efab609cb4b0583ba3665064e50751
SHA25662a8879cc86c1a19bc4eb8cc36f168c30fc8e6d51e7ac8143c2db13dbb9abeec
SHA5122b53687f6701bc7a891e0c07e650436dc7c4e5713d04145528e119318cbb0e1946cc34cf8ba522ccd46009131207198d374d6d22c520d7decdf8b9e1483d90e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb2fadfbbbb6507bb07e60038b148ccc
SHA1ff13a21bd2efed8b1294d5d5c3064ae45f8a6449
SHA256fd3d0590cdd609a32d0a862518d7fbbdda73bba4c73c30d81039dbb2fb0eebef
SHA512c924c163a7605411735089c752960ba2ece9e42b66be378f3629ee93efc8fa3579c469b5fb41099bb53d5a078345cd92acb0206326a5c5ad9dd28300ab10023c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff752509f4cda733e6e93e78d9a22400
SHA1d97996d3e3c83f4c428d27f15ea57c40771d8205
SHA256640cd013bd18e7a1d2296295f282d364f8a37082141dde9337a7d287f6d5a2e7
SHA512502f28f10ce5babc62577f752ae1421d7101a8166f95a8bfea411b988b5fe738b2b7a4bb94af6d6ccab25af4adc1acf0316bc579367288460e3fa39c89db55a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5510193c636723407b588b52fc6ead67b
SHA1a7a13c67c1a4839fcb5dac52a66f4d6433d85bac
SHA2569113f270790e3d1a1437bcda27ccd0ed3c3d6841d67c568b0d8f1e3d51b30e25
SHA5121ac81af6c60fb58a5719596e985d53256f75f85ee5132539d4f3f4fc64821f026fde3ffb73f8b3211bfadfcdad98c9cbfc7620f6b4ec957d33431a392ad47fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b29de7392219a07bc24a9ae5404f485
SHA1d4d864f4666f823764fedcd06ca25335525c384d
SHA256044324de406a85e38ceb38b6ec6b4fbe02a5d4354da5c63e08ec55aef72b5544
SHA5120a442b61b4eac60a56d0c8271896ffef2a005cdc7eb1aec71a94592ab7f6cc100313a71d77ea4ebc32d19eaabce0e2d448afb72916889220f645cec0159a897b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ae6134806852d6beb4bfcb116f318d
SHA1a90cb1ca4c488e30ad0bc38f01497f3bc91baf34
SHA256e99b3e228987735a7f13585e969772472cf5d0e7951c3a5c16f211185bd19f4c
SHA512931034adf61a442b6b268741937069033db0fd97ca10ec3d6e596ada5f8cb562cc8fa60bfdaa8bbd05ca92a7111094a59836a2ce6c58f49f74f784732b0759e5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06