Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
51426d328dc2986a863b8c434310e782.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51426d328dc2986a863b8c434310e782.html
Resource
win10v2004-20231222-en
General
-
Target
51426d328dc2986a863b8c434310e782.html
-
Size
40KB
-
MD5
51426d328dc2986a863b8c434310e782
-
SHA1
86a66c02251d95da4359442525ca6bdd0a372b1a
-
SHA256
8790d88a8b45c6c608128fbddb83eb90c6cc63e6e85ea9f7788a6c354e9c4a51
-
SHA512
801c4ea636662357ecbb90471f2ff754a4b036d25a2ff9bb1ea4dbf3b764d540df7c67952bf6aa32755b522c2edddd58a1c1aca531450a59b98f78f70ab5b187
-
SSDEEP
768:bIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZl6u:bIRIOITIwIgIiKZgNDfIwIGI5IVJ7Sqa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000003de608f7644b8f50791d08d5c7bfe7bf86d79fb5f9702430d32cac79aedf19fd000000000e8000000002000020000000b1ab153b6a3a7953974becbf9c16cb31ed24507918d8884291d9429bbea5c3b420000000ad7ca7ddcc7ca2e47720e0be5d7bd23ff6140c4833891b0b17a162937b37616640000000a5f69f2bdcdf709053034e483b7fae70416a946bdbe024983082897106e4b3f2cde66c243d1180a3f9ff8a485760bd5738f58389c4938eb603981f196b0fa4cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3AE693D1-AFE4-11EE-9AF4-C2500A176F17} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f90a19f143da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411072404" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2244 2204 iexplore.exe 28 PID 2204 wrote to memory of 2244 2204 iexplore.exe 28 PID 2204 wrote to memory of 2244 2204 iexplore.exe 28 PID 2204 wrote to memory of 2244 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\51426d328dc2986a863b8c434310e782.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c811213d8203954c37a5d0a0b0d0cec7
SHA1e8f50ad295566f16ea1b94994d60ddb3af22feaf
SHA2566e811dca193c118ac765ce2b154cb4f329fcbaafe27c6412e48cd6ed29651afa
SHA51249c9bed8e33a5542ebfbc73870904f3227ba9edf1d55b4bcc02246c6ef7a6f84e830132fe3ecfb249b2e0246975ea51c3ebdd8d0e86322bc9eb7469d28f858bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f49579be57e558f86fad799e7955295a
SHA10da45f569a0ca1c882788de3af1882474ff8bc83
SHA256f15377a86933bf8a8d0f4f04b537dff75f82ad557a73f5ee8ea38ad4913b969c
SHA51272d76cc34ec273d9e0ead5d15a8d4e93e7c24355a908a54654742c02fdb25c521cf28998205a4557e9f59e6838058317915926afd693bf176a5f4d3b3c52b879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0db48f7f31ff6885a66566938fe5790
SHA1b4ad46c2649382433feea439db2dd31bd197dfab
SHA256f5595f150b83fbf025a8e6205e7488f9e51abca73123c58411c95d875c60d264
SHA512fde9af0492603be3f42213795dd39f613910b28a6c5459f238be5b6ccfede9c51f9721f4f15d5cf497d073c16ee3cea4427e7a9374994740104e3d5b4d410af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5702f6ae7794193d5093687dc7f995e32
SHA1090db3c36945943e06580de72edd497cdb627886
SHA2562e10b86b7bdfb25862a22e63dcb68969009742a55331473cc8d2f8c40285117d
SHA512c52e290ceda10f84db04acf6c6e1c2736a1ba59c6a9fcbd705e27d604e72903e82ecb956d9b2f31c64f9b98f9f4332aea84eb0ef4265d1c2998e62fa7bb392e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e3f457879383089ef91436095e0ff3c
SHA1480af3b230f9d2615cfb4703648cdadc125f66d2
SHA25636661083d951ae6f38413897ba1d350e8c7809b99f88a4d007eda1ef94456354
SHA512f9f20c59aab3d4a2b8ec5d1accdb82edf40fa78f5cc6b9c37c9efbfe435e43ff41978a21bea01900f3af7111d400222749a4a974493f9361f65b374758f240bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeafb78d8d504bd6332c10bc0a6e2b37
SHA15cc9063e1173188a11fbf28ed7f6d0cb5ba2e623
SHA256a15f3e8debb7076e8343e6bc260af2294dbe8dd698aff7064561db322c376ff6
SHA51223598ee3a639682db64b66d51dd5d9d91a42097fcc7f5e0d9f74e0bbb3276a5c556487c768b7b4aba97bc075609711bd132819bd15f20db527eae2cb0bbf34e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568605244cd137114a6e7e7e988b218e4
SHA1a409cda5fbf319c6905716a078f07423c4b7fa0f
SHA25669e69c11beab8ba17792886e98e478655e0867beb9f0287f20f48d45d394f4f8
SHA512636f78bbcc577bddbe067d4e07ecbd518ef71fa9f3583406890f76d32c98286f626e08d9c347848f7d365122ef62a86789cfdbf8de30b7c0abf309f7d13e8917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebb1c3a9889989f274a020c4b97fbc9d
SHA10c8729ca7a37a4860f02b26f9d578ebeb873c288
SHA256f2d2c9cf12181f66cddd63f9d952bb15f18cb8c387603eb09150e011b271f8da
SHA512f76662470008b018ff73671692c0c63444aa45bf4f758361bc2e72de91d6e13d3b11cdb4d317a08ac78798b1f7a6a2855008ea74b9df1e7a3bb0267d46e56347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723b2e8d42c6aac061c6036865fa6054
SHA1cdcc9441cf07cdb35000f4caf2dc5e7eb273bc6f
SHA25652a02e4cdd17070380becec9099691090e09bc547a31ce62ae7660455559e6d3
SHA5129709472f957b323018130ff5c7de4f269a2f70bef189fc811fd3c5837f26a0e79981b1adb7fa1e1b34863cfb826fe9f3f7f88ba241ff04fae6f93a97ba02b99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9995ed699cbde160237cf9faea7d32e
SHA1252b677658aa4414ac745fdd9d28b0a92b6a3a7a
SHA256f1ce062fe44005ebb60f2bdbdf67d6403ac16cb7aa8d2eb0e8f81e81843decf6
SHA512bc9508624e9cd4e9fa497b68ab01e39e83b958d09c2fa24f66bb6e65332c9d426beac426dd7a78fb6cf7dfc208da3a21cd9a2e04956f79e323c34019523e6b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563c825dae8d54ee33f9e92dd12e78eb6
SHA10fe3d70ce17f81fe20013f86700da0b22546ba36
SHA256783c609e9afa7a334564848ba141e6c42adcfb52ac1922a26d31f9ccfd5dd7e0
SHA5127a46a03a5d6fa17f7142565739d0012ec3b3fc741a3f515824497765f40359f4fc6e296264e444fa157d14694fd49ea1f59fc92ce91387daf8741349a989438c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c67549b0097040917e4d59e6c557f38
SHA19b7a2626fd354f316bbead54077885a0df2accd8
SHA2566096778d04f8e52cb4bffab853e96bba8c30320b8b037d3beaf719e2bd573796
SHA51251500002a82ead6ede72ad52526a8e54f4dcae06014dcf2424a3780b840817c1c303075f99543c9af870c80ac23d86959794cadfc440b3797d13fba9a2a62251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50792345a1d013d9c0df8d293e308edd9
SHA127b0f963ad24fe49f023348cc8c35090b35bf6f0
SHA2565de5ee8595004789833f13cdd8eaf9f9904acec2903c01a71588f556917b0a80
SHA512073c58858f07c1a6add5ffcbfe6db85d1449dc11082e0dbf6590f117ee3833d308b1249783edc16bd8f33e7f0a73f58d65848ffa7a7cc64587a2e7219460ce6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5602c40a7c8a9fc354600dcd9c8339f46
SHA1002e3e56fe1d2d46a321284869a763715c665eea
SHA25657a44185e27d621786479dfd862d9ded5c9a6f7175766e2aeda9f8cde09e3d00
SHA512bc99e4f453a6101d4bf5b7696e236f9a6a51bbc90e22b7043b137edc95c52050931777c6afdfd4c3f8eae4ca8b8a1b347f028717af5bda2e5a1a5d458cb3d5de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06