Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
7048cb2bec60dde33917b62d2df74bd6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7048cb2bec60dde33917b62d2df74bd6.html
Resource
win10v2004-20231215-en
General
-
Target
7048cb2bec60dde33917b62d2df74bd6.html
-
Size
896B
-
MD5
7048cb2bec60dde33917b62d2df74bd6
-
SHA1
32382676efa69a3b709f9ebd0c4efbb09440104b
-
SHA256
a30728590e4d11f7ccdf38624481df5cbd59a65af73f6af522ee93bddeb39d7d
-
SHA512
601c33b4d6c9b3d2b76c7ed8df4ff54dcd166444b0cec81f983c04fdfbb960fa41f3d6c9d191ce1b72b74f89a0ec4594c4164672c432e19bf0193fc4f9082263
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C8F9A71-BA1F-11EE-A7E3-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601e5b612c4eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412197383" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000ff9e2dd2a04b1c39f2e3659dc0aeca48686a61475a376db4ba403a8fa450fbb6000000000e800000000200002000000049d304469a374ba1b566f3fa1f8c384bc58469eb9b39d8876e563530cda569b4200000001e046d4b0167d0483352d16ae5363afa279ab7d622e365c7202d26a8bca1c278400000001eb8c618671a186d59c56ac3cf1e0e295172ea0671a1505c4fe8ccff8baf6d893288f9e5fe8ecda2ebbbb55d9e7c10b654ed5aab3e7a8505c30ccabc651c54d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000003d963a3d68876afb5ecccfe93bc1083ecbd141dd6288c3ad63989a673220a6c0000000000e8000000002000020000000895a057e3e2f2eedf16ca4d72cc34c8f12c5b4ccf62fea1e37a3a5e54c44da289000000020a2224429cb9fa255cdaab22226a697d717aa1a48821edb7f32f76f811c558c0dc1f79a2e6d0f457a1008d58a24d89fc014fa29b47e5649c170264311f073ad3aa514aa6fd5e8509e3f699fd5f3e9146501e745261e498f1977024a2d4542a126b472244a8b4f7d3a3279dd54e9d15171baae3700499e9ef36cf2dd16cbd70301f08051392b19b860901cc0da83c88f40000000b3c9a4d3835d7d98adff7140ba82a7da87466db956e8bf9e2d36652a97142c667fcdbc92bfcf8e1aa3d6ee0b763c8a3f9679f4db5e76fe620847f1baccd0266b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2860 2772 iexplore.exe 28 PID 2772 wrote to memory of 2860 2772 iexplore.exe 28 PID 2772 wrote to memory of 2860 2772 iexplore.exe 28 PID 2772 wrote to memory of 2860 2772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7048cb2bec60dde33917b62d2df74bd6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b46587c1c27099194a8ad856553fa51
SHA144ff4f2cfbc65af6a6b93f04b7f182e58d98dc05
SHA25603c99f5e13392f23105852f965a1e2fe4677138f61cac831ef27d635920dfd4c
SHA512f2a16cde480b45186bd55f7f9ca5082c1eef4b3ca5f846a01f14aaf3a07e5dfcf5a2c3f62607129267816a5ada2760c06b9ca72ed3c2cd775300e79c6f5cb284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af8c7b95b2c84dfc41c601111a0b6dd
SHA109846cee0292d17272887c5fbe9c6f328cc98882
SHA25687114c5f2ab72167bdb099ac5c8d81f98c7d0786e0775571fc82d37416b81f0a
SHA51264c1b5999c5c5e04a030fb727c3900c5696cfbfed7eb55007356066734602cf5210efb0970615ece14a2b3b3487f564d6cb8e8a5281215ef9f31a6e5c725074c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fbda89bd159a21d6604e31e5107a5ca
SHA12b0f87a3a8833aed3be14626ae1bac1758c9f523
SHA256dd4e0cd7ee4d3c84d18b108e70a07e41e991456cb8bb924f306660a95b8617c0
SHA51260069acb1aa5e93eed93c29aef1c0e9e1db87af384a1715d9ccb97f1f6be91a2dd65c21ae279b714c6783aaf6526b7e5e232438553173b8d6b1c9224139028ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580cec7261cc577a8bd15315f5a193450
SHA1e3fcb9803d2d0d2dcd0ac70bd341cf91fee7ed5f
SHA2563146411112a803351ce981f80b1ba4378838c5624eb44d89667ad04582a83ec5
SHA51295d0ded48d0dfd93e19b1c42c69617b163f65d61773a74dfca90ef7b3c9bcf1ab35429b96ab001cf2092209dffc5377add9669b88f309f2c87f6ac06a0038f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae08c5fd914a29f89396bc36a56cdbbe
SHA16d059720c6b3dce56afe85f865fea9ad4ce3c629
SHA25695c7bce71c6f781dfb784153ab6742180cbbcc1178be02c2f707f6dae6d6b0d0
SHA5127ef7a25410ea221491e8a93105e7c0855726f05dbf6d661fc2543dda044f411563539b2fd0e885e4c44cc80fbcda838c76e03014b55801670e0356a6d85003df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543462c2cfe8111d4010204b5f406151a
SHA1771928f561cc56c9855b6e5e52307c6dc14e9a99
SHA256196f56679fb6f78c7e1a39c71b0c4b144b79ef09a95aac6be85c9d075c07b8de
SHA51211d3d07daab8643cb0858153baf32e63464abc4b480d8ffa50e6f2dd9cfd3011641247362656ffe2a9c3f34c2f38ff8cbde3b949f16bf03fcb73b73cf2d1517c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea7d9f9d13942ec581f7df18d70c0e95
SHA189a683dd3a86b273e2566a0292c102faa2481e27
SHA256bff94c3a0cf09734d60beb37a525fdf201241422a5c2b5d0ca3dab0525b7680a
SHA512bd2bfd22b75a03c9c266febd7a57e2b3eb48e480798bde353c29c78c183785e9cea5e9fd5d6eeadbc985fa0939fc01eb30e0d8740f1c59a9a0fcde7dc66760aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9fa412149c1fa844681bfbfd3553e26
SHA1bbb4765ab45ffc28977f0b8e519dfc6d47ad1507
SHA256cef2cee2b2f672c696acacb7daeac6ed7bff4cb44d7f280bd8a22688a4668ffd
SHA5121f9e513f7a0ae8f66f5c5b78a7585a2a2adc8cad5cc64d5d396ad5af02c6e97a5ddde523d3b75dd6b2d2944b8322fdb0067d39c2b82952369bea08c103dc7b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5795152a072232fc98cdad289393fdff0
SHA1b030511a7df1b6a0bffb48a88830734a4f9a8cca
SHA256abc5e8a9604acac4adc0bb720d4c9faf28a305e16d143de569f46081e6214c7c
SHA512b2d879e6542722a428c1a4763462398d774ed949303bb9deabfaec328033a5b0ad679b32ab4907b594dc5e43536e8a29e4267336aaa79e49be3de2e72245abf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520ad84429d2c308e00d8d4c5183d5a8a
SHA10d21bd8d09d42328d33fcbbc8fdd5c829567ef65
SHA2565da2923ac7332618da5a06762e91c47e0d29879d7658b5f4767868d848b1fd00
SHA51212ea4895bf0ba1880da507f49bd4fe721e1fbd73cb85cacf3d5a67153cf9527a43d4aeb04577411e798e94f1da462669372d154d0ea1aa85360b50685f8818b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df3891b7a4825e2a0316fcbbeea8e578
SHA15cd597b4156990d9abc3f9f5c52f78b98b220ca8
SHA256a9fb53df2789cccd1b46986b3c00336bab04da54e0fd5c5432fcfb6ce7f35102
SHA5128b2aa0408bd9924a1182579823faf264622e0f95e4b1c58f8731f164ec99d8cfc1ca63869844300f04825f316468975d14373e2e78d18053535d2c6a63439a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162fc1ea5ff17b243ac5d781d2712988
SHA10148de9ac981cd500f5b25d8f67934fbb84411e2
SHA256c93d7a76f62d2d2e05ee0cff5e9249d48f4340abd50c3a7363040184fd26073e
SHA512c4eff49826dc7ae9dee4d212b165db8bf298e42cf635ff2f9cf09a03d96a85ad835a2b8885f1499627c1bae7cd1b0981069d4bc3c1916c964f9e4f9f9378da80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5920ada2150bcc041adb617f0fe435586
SHA115befe8ed6b0b7d29e6dd65e9d0df54feb2d7749
SHA256ac237327c63ffe93a268a8559b9c049086e69400eae9a07006b46afdad4d1189
SHA5125d566502c55ef99e084368a8321eada2b5ea18173af23a04f61e979226cbd3e1ef6c14be57c0bb201e30343799aecfaebd61e0da005abf1ea1e322f6b61c123e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51620bc73662d4ea4ce6adc9465413ce5
SHA1c43cabb065a8965ffab63917c9d5a9e1f501c022
SHA256b01d800c1bce13977e88fdc90e7409bb849c9fc19a9dccd099dee2aa603539e7
SHA5128d3d1827625b21d8457690e74f173f42d904d45da67bd17baddd0777b4e5a15091177f1f72198f1357aec68d2cb4f1fc758b2f1b54b312c03cec93bf08e0fde7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ca564e563b45fa8ca1041445b4aaaba
SHA125dfefb160fdea2a3d184e2cdb8841751bb073be
SHA2567f0d5b190f22b4fba107ad65e186b225e83be5d60fc685487d5c156b5c55c678
SHA512b3be969467487627fd7528235afdfe52040269bd6b0ee9a810c52eccaaf5ec13d1f7049a46bd1250091103f172d4995bb3bc12b22c4677ca62a35e4f0751d261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf22236ba613c8d75a1bc95bbd36beb
SHA1ab5fd340a2e207f45f1f348485408e1b08a8c5fa
SHA2564e8b7998262956be44bb3b86b9c15e143627411cc10e5e8ee44c1c83e33da440
SHA51210cf7c10d7fea6ab32f9dff96189e60281cf472a7db2ae5cfd6280d19650537070a5e2a329e3952b65d6ec413ff1a68a44535d1c182970ffffb918489830a42c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2534db563b5407ec6816c45267471e6
SHA187ad2c893e1b4b1a99126febb1c263558350e72a
SHA2566bbbc74569a241e30dd3a2f6c433b409f4309ce596370f77309d68eb04db1de2
SHA5125e7edf50615dbe2b5125a095a8c038f2ee73ad887cb844a4597ce79ac92515e69fe723c0718b3d6be53462c560204d782e1d4dd5670fa8fefe71acef9aebc7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532f569f4dff3a51bea6fe1c19e95a09b
SHA12f3b626b8b6845f736dd3ac9688392bce79bf3de
SHA256b867ae5989798bfaa4c60680cd0114f946c73362aff21574eea147b09d267a7c
SHA5127fcb7c2155caf3a7ae1dab4b28e8f0da7e8c3e3cbeafdd32b11f0b3874ad1312f81c4da78060b07c98d5c704cec211113115f184ea8377a13309d0a18ce771c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df6978fdd2cb291b8c397b27da521abc
SHA1f00f765a239c3896fbc1a177f80d3882fdf232b4
SHA256e07edb9c83ca0a07d9556d0a46295fd2e26a09cb2491b8a29f3ea551fa8a6e7b
SHA51275a595464b73b173c2817d34756cabc681f8e4b9495f5a1fb696f7aeb71350ca88a7825ded772ef3197b222d125ad2d1fb0cbb0c41dbcbc7e3cfe58c58a9a983
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06