Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
7080c3f93e42fa7b8948c2f7a949d4a1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7080c3f93e42fa7b8948c2f7a949d4a1.html
Resource
win10v2004-20231215-en
General
-
Target
7080c3f93e42fa7b8948c2f7a949d4a1.html
-
Size
10KB
-
MD5
7080c3f93e42fa7b8948c2f7a949d4a1
-
SHA1
4445f45a71c8b4d46e0dda66a0612b0951fd85cb
-
SHA256
40649a48fe2784035031f4da8e39cc1202d38b3e98c0ff27bd709653def7749c
-
SHA512
a97d30c27fb5a6e72287e0246dd8e84e75f2ca689bc9e7612080358cf47d53e2a06a3f54aa17ec7af63fcc391702d50a33b306298b47df99b9479c8a00556dc8
-
SSDEEP
192:Cn65sGNlkuavWqszxRX7JbYvUDHZx1AmtkFY7AY7R+0NXEi:Cn65Nlkubqs1RX7pxD5xgE
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000001b1147dea7a31d5c1107ad130a78431af0f5fe49df07259924d39a85998dc9c2000000000e80000000020000200000009faa987445fe758df277c184e8721577e707ed8a9957f3757fa112d1c9a62038200000004238669aa3f06bd67de73be2dfe0ea06fb9d1f695a84d4e29c5b457a19830e6b4000000015fbcb73eb02baec1440cb62c761a1a000e6769027d2c1053418c37dcd180cf22615a421a3dbcdd88c31c5e064aa0b4c062bc425b439c26093956686d43d9b43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0955DE61-BA3A-11EE-8837-E6629DF8543F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412208760" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3022e3e0464eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2100 2228 iexplore.exe 28 PID 2228 wrote to memory of 2100 2228 iexplore.exe 28 PID 2228 wrote to memory of 2100 2228 iexplore.exe 28 PID 2228 wrote to memory of 2100 2228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7080c3f93e42fa7b8948c2f7a949d4a1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a71a5b79d67b43883bf15a8c2aeb61
SHA1fc9012489257b0bcb45a8be2a75d73eaa9605aee
SHA256a799067883ef920ff50c66232c6e4b92f3f4f15c8bc7b23a8ff92fef72fc672d
SHA512d85b50e289316f84a725b782965ec619c1e41274caf97b0ec1c742a6cc5e0ff0a9abd8c257c64bb2f16d9bfa3a041a9ca1b61466aada224988d074aa9e813cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5056a2aa8d2133248fe90ea5798285519
SHA107857b4853e18ea5421951776134bce36f899d07
SHA25641151b37b4f53b7f1a8798c3281559e1d2d728d059dd44d3170174acde556a2d
SHA51262f4753f30291007a4a73e8581bc48a47abbed3f2e8c9d40047028f4087e28b073756df654041af72b2177d8c63ece08ba1ecca268537cda1b9bc80a68f835c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b983c170463ecc8e39fc45eddbf467f
SHA167cb862e848b56c0f7e6c32e09afac8e0820bb23
SHA2563bd6f404d15e2e8eca53d8cd5719fc8263d69b5e6e852dcf4a1e427b9421f720
SHA5127e3a4b3a95f113206a740467391b4b7e4a9117b86920ac4bc1402dc3ade21a5acb7f3be8f81f19b39e6945d662ab3c06d1ecb70d263c8516e250c6298cc5d5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5259e6514e032fc7b3710b0c3bb8363cf
SHA198bbddee6ffff1a5c17d1efddcae45c388a93bca
SHA256e569e7144d649a2eed60f58ba94ddc7117aef8c8ac8807e2e17bb6e4b2afcd40
SHA512ac66631fed7b10e9ba4f029a2791ec602440f9fbf1a45fb67ee8e2bcd519e7e14c78fe4f77bc33d21a52b7ed962749d153b475f7050cfe95c618af0bc4885b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d5967acd1eaf7e773d13f2ab109da8
SHA155e5a84afa07c75836c7b3dcda48e940cc13da64
SHA256a213ecf1b3093519eef89792f073f0e2062e3675bb9ffbfd89edcdcb2a228b40
SHA5125c918a094e964632f7a922ed049037203cf4fa1681d1594335f815059eb95d76ba9bf82ab560c1d0afc8c96eb8eea360a8e76f0bc1f9e255dd44d7d5d680fea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fb1966e8c1ded1b7e456ae629f9cfe3
SHA17acb2c0d40da91ad813606acd3c5c551e3653aa9
SHA256d6c99435b94b1957f1e9cd94042b4edf40894d3a680371afb4e306ac5ff9ea15
SHA512c340bcf1e7c0d8b3722152d02be16cba0c377105f0aa61e03748eba2f40430240cf676c244e82ba120e5d20215c7c2078fb221e4456269991d5805d896c1152c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d6f492c11f95b76b18a4e7cb56d015d
SHA169ee8ae0fe0a89e207d73bdac8560c13462055e0
SHA256279a46eeb1a07ace9a44ead3f6ccfe481abc79ec643df832ed12cfd913ea2681
SHA512f1d8eed8ff7640cdb663b58b9f4b79d58ef335840b46dff00c37a0e2894232d0462fe6f1da3652b0d238a417979034f6bb72cec88cdb5b22acb0c00ae529da64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5bc9f321cbf638b3e31296430b4ea7
SHA118b682c218bf8c6f11e1c5dea65777c19fe0c882
SHA256319242ed677034a7f64e4e7f9dbff0b09ef2d488048b402ef1308295f9a485cc
SHA512c8c04e247012d369191a655b724b0ac3b13e5c49823cfe2ef6afde1b628b9ccd3c8931dd9ea82c52701196ccee1e66e6955ad27567051c33d2c6d694cfa46c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5319da59c29033304e2aa80e084b2c0da
SHA14a0d9cec55d7236f12af0f19bfd1edee811462a3
SHA2565d7d4712eee128a769ab6e7d37b554dd629a04f90e86c472729cdeb7049fbc4a
SHA512e459722b5fa28de1f7e531109fda3884fc2fe2e64ed332d56a15c2bf2ae9ed48997d17e88f9bae5dd8092901a1ce2a4d4747e6413a5055df85076011810b01f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c4d461c0a93bfa766dee07b73d54b2
SHA11ff736386f53ef2951f828763ea380586e1a915c
SHA2566803267c48f8fbd86f87b859c4e244740f6428b39fd0a239a6dea019afa91463
SHA5127c3cc7ad30d1d85c2245344923887e684d8e15a01bf0aa508150305440f1b783b6e4d1b7ffaa86264e9dc0db9f64c7d3f313c1f789b02c60c42848ae5511e3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5401405a55592f528a6332843511041f0
SHA1d805afccf1de67e651a3d756ef0134512af7f9ac
SHA256f1285258d86cc8b56fa7fb2140479ac3cf26dd5f1d87cbfe17cf1bcc2c1d82fd
SHA512f80fafc133cfbc93cfbc47f8cc48e6c4e2f2b762f01adee393410095cd2cc64895c7b6fe23ec067d25731534db39cb6d434d8f5149b40ba27779734780ddd906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a92818f584b9f08597406482fb37bdd
SHA1c4961cc95d6cc18bda35ad5c25dafad363789160
SHA2569dcc0a800746bfb4783dbc116d7b32cf66d91d15bc40658a7d6136b3705be833
SHA512d4b6fc1d9c9055fd9348649893b826d1b4599df22e7854b2e5914c1a8531769171a4962d115e1d68cdd7c5b8b3a24fb72aaa2b2e1c79e3c97831de72c7f717f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f24cc948e3980b103775e5e009ee4592
SHA1c230c60923f20c3534d4745a8ab54512ab980a85
SHA256e44aa8a4b3534aec397119518849e3f95b1a724783803390544660e353a6bf0a
SHA512447ce4a8187509501291336d8e4fa3a89b9c040f3dbcf1dfbe0aca0d595641da5e26095c2cf79f132c582d32381b0ceeee0cbaabcdbcb4781349e99a45815d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d45c23ab180bd0135f39c93a60652b4
SHA10e6bcb0f1d3a4fab117c1aead8d81be2d71e7987
SHA2561f23267b520142a91a956adfd67b0397f3e6fde3dd50960723fcd3b8362702b8
SHA512cf5e04c42f208d48fd54dfe9d33e36a26ae34f8698e12943882b10d2284f4e9cc39a5d49d8c3f43294e1ed22a2480cf55b328adc9041e0d626426a7ecf3a7c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bddd65fb80790b955a79aec6ca1957b8
SHA1a5408ce1637539d7f32312e99c8d29eb147f528c
SHA2561cce02b287e500a10d799c9e753660acd9e40f0d8310e21db18da707c8dc741e
SHA51224e2efdb27ce00b851466690131f6c70ca9c4ec2ca32cc355004c322c3b698195de7496000a37f70260eca13735af79860260ce98f0ce5709cbf2bcb00c1091b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58062a0f0c5b725aa128ff470414f337e
SHA1f73cd4f773ab1e7f151596921660268e05c56762
SHA256a4ba48686e8dbf62b6ac0648f0a0e987d7e84aa411048d7a200c1f2663bbfdc3
SHA512c2e3bd4b5a95987d6890fc96f2eeb11096b25e86936abd521e5bd166c303d5171fb80255d3ea632181f6ebab6fbeeebda569a1fdf6f7869dd92262922c61c18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a41e94d9ac664aae88cb6b862f3a6973
SHA1d66f0156f704d5fbe7e73fd697697a32021ee949
SHA256264715f85295076bc88be44c93878bcd7fe6abfda0490958c02a2d50ed6bc372
SHA512ecd17dc3e0650feef747f0f815f37754a1574486497736a0efaae8d2c85e72d8b0ff95bc04f7cd9a31f0f3f9fba0259ccfef8fbe154f9efe878a4bb5e3510a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ca373a31d8ec2ac58d51329b67681f
SHA11e73c8740617332cc19c0d1702e1817ce92c4c46
SHA256f0a82bc718465d78d7767f44e7980412172fb717ae07463766df758bd292b049
SHA512223ba161c951c8776d9f9a1cfa6ef49e75485f23fdc9a3f5f9b027d854b8c074992a802e846fab6ad8f5d5f8d894be59c4420ed17eb714cd1850be92f76d71d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7afd4554e51111cb8dc566deab3102
SHA12cddf083fd160b31c7222e5c716a29f8f5c6de0e
SHA256e8ac43eefcafc6df48471572245733f40d1b65874c2cb1c125cf64cd196b7554
SHA5124926b12742dbdec8099c15f11054aea6f71f12d3ae230bb663de63a836fe627deac0e60210b46c66db5c51d22e14975d1ca9088c37dd49d6754892fa0c131344
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06