Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
680604c2f5218f57bc772555f8f1ebda.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
680604c2f5218f57bc772555f8f1ebda.html
Resource
win10v2004-20231222-en
General
-
Target
680604c2f5218f57bc772555f8f1ebda.html
-
Size
83KB
-
MD5
680604c2f5218f57bc772555f8f1ebda
-
SHA1
059b372a901a5466231812da35d4f17eb896a698
-
SHA256
ec0a1463f199cae60d8c4226a95f8df5d169a69b54c7203ecc768a618390d8b9
-
SHA512
5a6539d39314f3f9c646399bed5d3749e4eeb7a46dc5054392d858877b55a6c5d027a91fbb8ed69d3bd1e82756c0dcfcc73bcbdcb28a601bd42252de299e860b
-
SSDEEP
768:F0ulkAmwLhRrr10gCVQJS41+gzbtJnqmNoUUmm8eiXksm9W73QMZsT4uTalzAUzI:rlTrr1YQs41+gaHx8+t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411841367" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9085f074ef4ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000000b5322a6c11392048469770d51fdfc8444c3fc820c55bedf7ed4f5fab1d2860b000000000e8000000002000020000000bd1323b1530b68f9bfafc9a37d867dc17f4ec3854b4979373b5ab331c9969dd020000000d057f483c2edda1379089964ba6652d18bc25109bbfdc456601eb4df26e0e3ed400000000f0628a38a39180eaf3d8afb165b359ec3681ace6b72ab0a3847cebfca57afaacfa6005fb727aa212282f882ee7d76cbcd6e3f13772a18c2f94abb309a41feea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0435741-B6E2-11EE-A5B7-EE2F313809B4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1032 2336 iexplore.exe 28 PID 2336 wrote to memory of 1032 2336 iexplore.exe 28 PID 2336 wrote to memory of 1032 2336 iexplore.exe 28 PID 2336 wrote to memory of 1032 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\680604c2f5218f57bc772555f8f1ebda.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a3ca4b1532bd486e46a438bcb693da5d
SHA1dec463fa57b7122c0061b0cd1b1beee775a432ee
SHA256867faf055f53ee38ecca73aace886a6cc2aa8594297770c990e7f2d5e573b898
SHA512176ab82e2b7edd52498385a9bde208ab02fc4f2c1b262308bea6c6e27032934d85045f517470f29674c71d7668b007ac06fd6e20e76423a8a0b721d87c888b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152be49907fbf8f48c81bbdd47be0f2e
SHA184d8a84a2941e48b208d6968f434a5ac9447237c
SHA256c0e79e3f9af513c3daf9423af823de7e3c8e08a87bd331c4edc4a663839484eb
SHA512bc0ccb4a5f8918f0cce90c6ee8e35eedcbf5bf72c688b8e58008f36c1fbbd39f9823689da5e07b2d3b8788f94693a84cce2489ee997ab64ebd280c9aa5724645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571abccfa28011801ec808f52c541dd1c
SHA124328792554b6665e9aacc2a52fbd56145da68ad
SHA256d0a1af4dc542921d2d1741d72d7c16abf8ea6bfcf195a5f7cd980292764580b0
SHA512e252b5d1dea271b98cefff219ac39dcf58a1f3c994fc089b3ac0f1ad820a7e5fec812e55c4687ae78cfb272ebe662a6eaeba3a578da4977abc4d92fa9eea12c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcceea62d13bb2258c5659d146eb0382
SHA121f42d6205a87c7c81805c609cf1bd7e73c30cd2
SHA256ef63c8f386f4fb4ff15004327c7930fcd243ca2ce87d8ef0207d515aa8bc45e2
SHA512936113daba3d31c2ca7de2143246f2602d7f5378a62970ce90f08bda4f44287dde3de689ab7088dc31f29cdf0560dd93c3a32a73490c3772007463cf5764ee91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592c0504715322e35e4a4864c5610bd7f
SHA1c31b9db95c4d46265764407a75701fe7d9d3dd66
SHA2567bcb191f1c99ce78288a4eff959d793d4eeb52c7fa94cbdd42ed78e8d3d05332
SHA5127c06143d11859d8124e12f0b81288484b63e09372ba666df094bf802adb41d6ce708b5c716a4afda6c0ad5505f82f370831e373a57ffa9e4282763a911e72bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5971a386bdccc40e9c5d529703d0a8074
SHA1017080e950db9c5c29c880ced0b2f2b43de51588
SHA256758139c419cc027534f64662cccef9afb6bf7264b95b64863a94733780e1a093
SHA5121efabe8439f4861b4b55e5514fcb491ee52442720c299e75fefac11832fa33d0f40098bea86757f118a46fca21d5d505b55398042e36cef6eb56c41e5ac73c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5020adda3b819439b4b83f66e2e984819
SHA1b8f06bc45103d8feddc7318b817485024dc07b7f
SHA2562eab152fa835b64bddb5f8c92f02eef18b3640d07c6f1bb07933fcf440609451
SHA51216d8c3510792ed6292020339d496409e250625a49a11dac4ff4d6ce1d32799bf7f9a5a8c7017d03425dea23fd2e5c44cbb123dc4d3bb0dc7427429df62f330ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5687ef3fee8d42e0e9d8f1daa3fa68c54
SHA10257f3e94bf20f4d92fbb5d0ad512d215e9e594b
SHA256406cfaef3ba3b68c40d30bea33810f693afd79d8e4aaea8d939a422dcc6511a9
SHA512134d2f09ad953a025bad37227e4faa1d3986b28a123db16e6a85a90f8049511d757f1b59d8bc2133f3c187ac2a5469b93cf1a091c6d5b061c6125137f54fb1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f692a720f4dc57790a8b0c185092d0cb
SHA11e449471e79c51dccc37956a992b6e03d1e836f3
SHA2566077e0f70e1acaa9230417a3e32babd01b46f07dcc07e27edcd385c335216f14
SHA512e52d045f8cc69e3612f8a19a7459e2b882092ba3f83b367d9ceda78f0ebaba177a7f1f0e67690873f29470f5e584053dbe8741b607b1c4861974c577b8ae90e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb39ab1c110eb85805b41862d2aba46
SHA1114883025f7bb009886c99fd14607889de4377ad
SHA2566145260f5ff5f771b77010ef1a09a967d9764387c0fa66dd35bc6176cb8ceb3a
SHA512c8c5675c7399d38e7f28cdb41a3f798e20a0f515c8f094bebeaa6b92b6c821ec0960cd3d1c0ede676d101b560a5c3106b215e38b558a1994b6160bef852e47a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7832f7ac5d940cd429e01fc08055d8e
SHA17232fcffee5a37777c5a5d49095b7a90fad219cd
SHA2560766219198bcd732fae5a567c16483246e57d93176ea179de43f1827904b463c
SHA512e6bbe3dde26a0eb94c9ee9b312b4edf56376dea7c63ab2ce5ad85522cfc0646a12c7d916220d4a925c76a4bf57871366ebad7b581a12111c3633e4dbdd7f766a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4ed8084fba3d76c3595de64a489b671
SHA1ac6e43b50765a749f72dc0304d30d980c2f60edd
SHA2564641c856a2f52d3c103d8239277f09951d1c6b77c35b3dc5d88424fdc1c9fbf3
SHA5126676f71e0ac74b281dfdb2eccbf23c308eb4a91ae9e3a73288cef53e972b917269b9938e61a439ae854e9222af324c84e1abf9fee1c287ee0e885a4717fba223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aed97aeca1cf2ff600f80ee4e93adeff
SHA1cef97b58fac4a0c82defefe9f3cd57deadf3890e
SHA25646de124d64f4924673ac20efeaff0b78e2c869bc7a6389c7a5fcc395161f2ab4
SHA5125b353e16239edc0eeceab0a086cd03bf0649f58c1cb9c4b5ff91c1e6ed0b0667de083b408a212e41a5bd1a0b99a9624f5b8dd74a11b0efbbc707c584c815f8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1de6ba7e99ef8626c0bc78816317fe4
SHA1f6a4f03de1bd6ff70dcf247396bc0321b95c4aa5
SHA25618852ff15a1eb5357cf51950819fd8566dc731e37ff61fad19d78d2b2e08063b
SHA5122fe4a94e6aeb632ff754d176130ffec6d5c74950c58b2db06ca39b8fdae4b02939078d61b76d050306b59626ac5e8641529062915421694bfb5501d73e37e0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51df802fbe25ea054853f5f35222466cf
SHA1ff203b09d1e086055feb79d6774b0d2f71ffbafa
SHA2563cf2894f0971969e2f2486531ee6a78c07aa69dab2ede3fb80f9673075823c93
SHA51225427f8cc1529e538f1f73324a3879c4ae9f0eb018017269b997bd81470feaf7db08cfe78501832017b6d57dddf1ba44788fba0ba04f1ec0a1a9a8d71c7f63fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06