Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
53011ece5e33b160f7f26110445464cc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53011ece5e33b160f7f26110445464cc.html
Resource
win10v2004-20231222-en
General
-
Target
53011ece5e33b160f7f26110445464cc.html
-
Size
15KB
-
MD5
53011ece5e33b160f7f26110445464cc
-
SHA1
ea7ce7907870dea4fccdd22c5bad15632e1b3aaa
-
SHA256
e855f3acd2a6b905e1b73b37f21c4437f9f71a59d1a5b541ea4dbfd127c847d0
-
SHA512
8869348ba46a5d06ce3c674d63bdb53305928c65e36ee120b57c2d0d9794abe8c8951e6cdddf0bd70ed164e7d7857b35454ff19c8c25c65d5998674db6514cd6
-
SSDEEP
384:5KTj3p7ECMOlxVH6hzM0NOfcrafOhnWBCghd+wRzdApU4KkDo:5KTjHqbDo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500432706644da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411122795" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{932FBFB1-B059-11EE-BE5F-46FAA8558A22} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000000ad772c189aa2136658afc731692c439b7d52791cb152c38998f06b9b5255617000000000e80000000020000200000009f2aebb682610366edfa1780643839e8c8a23ae0355e760938dda2016a454017200000000dbc14afd3eaff40cd4307dbfaae8a93bd085331fd53b59249376197755fe11d400000004cc0956d50ce137a4dd838f7177ace53cd92805a323290a71653da4b7d50292e29b3c15c7fdd8478d39b2b91f43bcbaddeceb3ec5207e3b5d316b4666ea85898 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1308 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1308 1904 iexplore.exe 28 PID 1904 wrote to memory of 1308 1904 iexplore.exe 28 PID 1904 wrote to memory of 1308 1904 iexplore.exe 28 PID 1904 wrote to memory of 1308 1904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\53011ece5e33b160f7f26110445464cc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c22b207a3afb41c1dde574871411e9d
SHA1c85ee62f1671952881fa0ae170cc81571569d9fb
SHA25628fc9449703aed5ef3d29259b85290d5b7ee2ef63303fd288eb55d7a8cde5fd8
SHA5129fa7579d16cb3b3c09fdf524ed53c454dcea12532f0150e1579cdd5649c6fd9b05669b76c7f3fae5836878d673be54ea20067ef0b1813c68384e4ed05f2ba0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c99ed5bd8f78865c2b84c49b7e074d8
SHA1b573f81f36d8ce27c411bcf9c54fe2a1f4b66d2a
SHA25669c23761d815c790750772088bcc0abc9edc0f04e337b9301e240315aa2ea83b
SHA512018fbebcbd418f64e22286de009f9bfe2d2502d498a253d01644acdd35770b19acf934404c2a09cd3f34caf0bb51962926681639302649f773f3e604fb4d3c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f1c1419b9931800c49101b92036ce39
SHA151a59cce0e41ab3cbd5e3b349d1ea9efa735a1fc
SHA256c05466670625c633b439dec76ba271c55f57c585d44805174dcd9319c0960bf7
SHA5127cb5b6c080de486d25c88c786456714e25e09e20b80fc59db1257c1a9f02f73958369c13269c68561af17aede1372ae91c32ba38360605afb06fa8fca92a3134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c845c8e09bf3e74deffe15e5e0aae28f
SHA17c46c3cd44aad5db760feb469684a8d3e5ec4da8
SHA2567d7ec4cc048ac96f0f63417dfae56e3199249d7ef5b1ad11c5935d3e32192b6b
SHA5123872deeed88e29f0d444980e2c52ddb1a4f2dc9adca5a331c5f4e1666ca1b17151fbb88dc1816f4f6b8e25f34c254049059f98f784e2b167f237f7ad0aa3d1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bc0029c1a559192e634b6bda39e2725
SHA10631ba2e48c362b0eb42abdb4b650044bf5cd4df
SHA256fefa02fc5d190a03be26788a3ae76a2c4c5e93edb2a049dab5ddc820720a1584
SHA51214a4554736fe24a707b5caaf6598ef6055cd711ab5b5236c16e57fbded190c15cd5ee601314bf8cef1ae673f995122d0303b2aa8172ae31b01ce1e5328d58daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aec626e73d43e46ff48e9cf34c6702bc
SHA196978b6f7c6bc400daf9dd38785df98b0bc898b8
SHA256b10c1bfa1fcb30b376a5074491f13816a18fa874e3a1a8bbd0d5c6e93f1bd208
SHA512646ed96041136fa41249470f7c5224c8b6f0a8f767a7d8959301ae79b5376e741f881edd330c128eac0975a68f8c5df24b572f829970b701fe68514b9f481323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c142280f0845f5929b2faadc47d9bb6
SHA13d64016e903385238f6ccd004686383642179c0b
SHA256054c02d6983591bd2f414d7999c08bf59d19560e7c87c2f0c6f75d4ed7f6d02b
SHA51201aa33bd60ea70ce2689296c24aa3a7978f6537df4c17fd41313eaf0cb353aa346e2901f8160c8e001f998a5a91c5a54f3e246925133249660e89f64b00d988d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57185b48a4b035d4d4faa9acacf697270
SHA136d49395f4c2898ae3524f911e953ef41b2122ca
SHA256e9253e3b4b7edf94c0390cc6759bb9be132e16b9deb52cfbd408cc19625ea034
SHA512f1d8a190752a62749ca0560750d3f502e4176989aa7f598fb2debe94b6f40341179deb5e23f8d172142a32bb4efdb064edcc66185f5641f72d8cc8c108397910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da3da73f3abcaf2996ded006797e3057
SHA14e5b35641413f3aa57e8ae404104f9efa41ee798
SHA256fd787db34a7b9a311b24e76aa7f406b267ef2bdfdbaddc6d89b0e623014f7dcc
SHA5128efc322b99a2ecd93ec51d5d9035f02fcfb41c46f6ba2d4e10db66d92bc8621f15b17a7f83d72727a52a0b11f322defaa14db831c200b684561bee1c442a7e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5578b856e813be02b703a1cd50d9561f6
SHA15b3d8aef0673ab8dd275c0776b9dbdb5a9203e18
SHA256084e44c74356c6e10f23df5d376e167a78525419e0b542e62d8753de98323f27
SHA512f28030fac1e04009f3e0fb20a9124a0868e28b16ce50e2494eac2fffcb89720d6435b1f0c8ecac418e497d0e6d903f29a43c98d595f90134607affd34c1c09a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57955e1647722675a3df7409553b91ac2
SHA1ce2a7304e9aaa092ffb8abc033650f2fca4444b6
SHA2567d3bc2b2ef7f644132262d4e8a33c300ddc587769cc840265856cc57ae2c874f
SHA512d81ec157aa9ee7b97fc57a15b1eb5509641f6fd2947aeb038719d13829f7cf47e4546592ea1fc071fab0b8235b2f8c6f9f25badcf454c55d396dfb4ba3aa9158
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06