Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
5aa1033a2ea96980bab309bcf15e1dee.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5aa1033a2ea96980bab309bcf15e1dee.html
Resource
win10v2004-20231222-en
General
-
Target
5aa1033a2ea96980bab309bcf15e1dee.html
-
Size
12KB
-
MD5
5aa1033a2ea96980bab309bcf15e1dee
-
SHA1
36960643c1133f1dba3b38c40a215123c881b382
-
SHA256
3060060147319e08bafc1c767b33c2643d3497ae8a2096f85fd10163f0364448
-
SHA512
12325b4d52c7e8f0f59497672389af5335ba9f571203d85342d328bd22fd5fe8fd68e46908846d12a9ba9ce31cca6cbc7beb3ca119b3b7f1f40c493f3fc9fc57
-
SSDEEP
384:QIzdnFchXgld6rTyv6Rb+nQKrlibQmYMH/pMF1E:LzEFggyvCAdhi8yfpe1E
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4084cbb0ba46da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411378885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D08E2941-B2AD-11EE-B84A-D2016227024C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000f2ecff2c860b9e49b1bc08b784689303ac649b5cf6e1445a4718442dddbf283b000000000e800000000200002000000070c0dfd715dac5e002d15758ad9b9ab52cf0336416425ba6736458bf5680e0a1200000009f395086db416321de658b69460831a35f04016a9fa833d400b61fe6c2348bc340000000ae7c1ebc59915b4e8e578c7ebb8eda352e5d43a23578504019110f65a25160011dcb8deeda6ae7e14fd45c97ccef378989673bc406c1b5c85aee4170e0df4922 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2084 1732 iexplore.exe 21 PID 1732 wrote to memory of 2084 1732 iexplore.exe 21 PID 1732 wrote to memory of 2084 1732 iexplore.exe 21 PID 1732 wrote to memory of 2084 1732 iexplore.exe 21
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5aa1033a2ea96980bab309bcf15e1dee.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57689175f793c283dc0e558be4a690dab
SHA141aa02823daa7180f41d847951901e94a6d02052
SHA256b2a2cbf18abaeb6da0c5bf1fdc6d02615d7c5dca3c15e6db049d2f097c5589de
SHA512f7018ca62a9c3806756ceb67271c5818eacfe9914a35faf6903de59bad319643652e37c018e4c5de76eb722a82d3ff65ff94ccc47609883f0f7e6f464b80bb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f17261304c8db704cc239baa51044196
SHA137b0b6ffcfa4685167ea10a4e1c5e623224075e8
SHA2560ef712a07a390090e63f347f353e44367aa423a4adef3b0ff359231856e42a8f
SHA512ce912b6ef9c5a668b3fb5735ba0d34c83fb6fdd6ba0f6d98d125645e4e9e8e92e4d0beedeaf61c877f52dc11ddf894a8b4e49158f2f483b8eb2977b83564f559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0fd9bd0502186ce8ea274e15588f04d
SHA1edf1a44728929d3a85ce0ce8a46a792a51343fe6
SHA256990f978398577306b48a5d8ef878d437034c724ba4a32f5705cb86694be7257d
SHA512068b6a80cf55ffd0f2c3be89c794277c3750ec6814ba64b5d9bbeebf19994df7fd86c546f76b01c631d24a51c381de9e8f0e5ab4dac46d9119ae827d7a9a543a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5549c642d252121c2722b975986328984
SHA1b8490e24c3188d66a905d16906aa6c550afb4db2
SHA25678a5a71827f242cacb809f0596dc8f0ed0b80cb31a52514506c5046bcaa0a96e
SHA5127743017b3d0f1f8d72cd6c88e35f481ee4332c0dde7fd6f3346ed15e868d0e99a41caddcca767d57022a8240a78c52d50ad642254ee000734c083c8d400992ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de7c00fc9bf659105704b33b64c5be9f
SHA16e798f8d1fabcd99d3e4e0a0d5748f326db613ea
SHA256dfca49527901403dbe01c377433fc644c39370fe349479c039b38f72b77176ff
SHA512d82591ef6c463644c3240685c802c9c0dfdbde693ceb211c0ff4ed93b64422e7bc3e28def4f88d4debf9610fefc93821e0b0cfc28f62cd18ce3d8914d1bed8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594890464fd94f54c0a42c9ad4d7f46e1
SHA196e11ea648b7b5db5c271459f98cf551826bbc7c
SHA25639e4a7bb4ae0211feb8c534a43a07e72c8fe7d4edd21fae7a06e9c5244d4c413
SHA5127682a82a05dc6afe604f9e99d84be902741876f96328873168bb295c33bac4f4d8e495a730f38d6a5bb6625a4b50c51b4c623039695bd7dbe34d8a8a129f2343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5669261b8e5cbbd96de7288e6fcda91f5
SHA1ebe02102c174fa2404671bf25d67d08341b1bb53
SHA2563747128448a7ee3babf2ad9de10f8b2d079742b17bdd7c8b9fcfdcf97373c6c0
SHA51296922c87843d57f332d69d334dd50a2b36023150a5f0242a5f91a67d17829888e1ea6f46527553e7e4280c079ab2a301992b689100228f867ad64d9237ea3c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aa1810ef9448ca836b1faa6c20c6cc3
SHA1f4705a92881c815c158aa219b5cfdd858b5cd882
SHA2567ad8b807905ca728964072d31e68a86c4c381931de783bfcbe3b1bb7479e58a9
SHA51255c039123b8637e33a236607f8ec7b07f4ae9dd066569a5027e2c6f3e936b58c99ed1db4a0fe9b22fb6cde4649a767733269fea29a88629c1e781f19dc9caf7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585ba55d5d3e1f49718eeb1d6f95c33e6
SHA1abe0833253440fdc97ce95502e63d77e7a16d1f6
SHA256081d468de95b91f9c1f2f91162230f5678275b8a7e671c070aa8f63bdf997798
SHA512f567f24ac9e08faf70268a736059f0f0e92cb3484895a611741badf0a0af297e303faf1deb6d957e1373e33c336a044d4cc2eb42d1797c5fbf759c9ba51ef0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bb69f102dfaf3f4d7eec02d12972130
SHA1a7f3f3918a72efe285270c8d51fb72e474d87d38
SHA256aa68094d92963c7c52e5ff6a2e8219d17f1564bfa66ff13a024cdd4f0d59cedf
SHA512c6079fb5b29882417d3bdfee27ad74f7cdca0a5d335aa74a33e917970126331a59c53f2b6cc62439126eef27a1bf7d8dbc1ecdf0a6c7ca31520ad34ca1ff0baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510fe7e6cbf3874ba674be06aa3da8062
SHA1f516743745098b7dfb3d44f2761649400c39d36c
SHA25622ff8df614e62626f3dcf3c70d9f78705fa09d3e0ac54deb0f13f4383a3a73d6
SHA512e6290fd8b289a31966d2508921136217bc998db14e60ca71d7a2368b9789cdc6a9149924765c66914a1b5a301feeaa12bb5db72b12e2e718657a789f41ec9ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6fc63b1c11c705734d37a009280742e
SHA1ac98712225c22196cf56b4912442cccb00500394
SHA256d2e0d13b9628539d8318544c7a0759d737cc8e9b6e7bab1b9e00be948375d2bb
SHA51249e2cd7c5a2b4cdbf6372c41f17598b44e1d31b92ae88e7b27ba2f269b17a2b0d17b098bb9fc89129a01538b7189f64ac783031361f1ec723db0738be8cb4b31
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06