Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
70f290086a5ce997bbf348736d1b9145.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70f290086a5ce997bbf348736d1b9145.html
Resource
win10v2004-20231222-en
General
-
Target
70f290086a5ce997bbf348736d1b9145.html
-
Size
6KB
-
MD5
70f290086a5ce997bbf348736d1b9145
-
SHA1
e7d9bb4f4e705ae8d6b8802c32a3774d9bed0d99
-
SHA256
bfb811daf4d9c64179ee109ec37f1c3914d37f4568f18e814b628d355584c73d
-
SHA512
ed3eed9af961e2d3289672d58d32db2c7dfed9cb160321c09cad8b36b0b78a83183464f476f2268bc538b037c8d4f527b48481f9e6eb3a939e9e686ee0859456
-
SSDEEP
192:kDivgOyUK+imec3p2tdNl5UBNYssN6CIy2u:5l3EUHYWu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412217636" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3DC49F1-BA4E-11EE-9905-C2500A176F17} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000b24304efb9f87e55acdd574d15e1e16873d6d32d05e358c913499bb434e23028000000000e80000000020000200000003b91ffc23efa8dd0aa03d9a61d0584b58030d66a264458406e7a8420869b45772000000025b189a253cc719e6aa2c00662ab1a81d1ea2f1ec132862d0c54bceef999174640000000d032ab32a1aebe12f1a0c46e5d6d2a1b8ce5f3e012af853e6d19e7855bcf21e2d5569f5a7cb06b7a6217f633cea6fb0d4c8d0ffdf50cd8f3ccb38431244d7424 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bb468b5b4eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2092 3020 iexplore.exe 28 PID 3020 wrote to memory of 2092 3020 iexplore.exe 28 PID 3020 wrote to memory of 2092 3020 iexplore.exe 28 PID 3020 wrote to memory of 2092 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70f290086a5ce997bbf348736d1b9145.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5117fb64668c984adbc887f6f63e57adf
SHA1fd37a9a633192da0810cefbf9eb4b6da447c2b9c
SHA25620e04c46da2ee41b7e75f175f3f4bcd26a84d953919b7ad276a3e01f149a0074
SHA512b0085b494c2a480cdaa8ad675734373d00bda4bd96a9c9d5d035cdf7b0f74348ff2e8cc6a704142972c46fc91dc708594fa30a43dc2795967e8300a906080d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a140012f20a66e7c9990a450a4d369
SHA1f6f22ebb6d386ea2bfe8a6e64bd2d16da6a8e4f6
SHA256d7a54cc79f247f0b2a3a19699f66d32205d32c3bff1ef14a84c1994fd0dd6fe1
SHA5124161bf55c64167a612ac7e9fffa25a2e1f8a6cca2ca2ab61dad2b1a2c1026e02be01146217f8322a951a3e17f4abc17b1e9a73e4c4dbec1b475138c6330f511f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db4d1fef2f7bee234a094d50e610b73
SHA11484b6bdc853ae4fca487ac6f4f6f734d04d81c6
SHA25660869dfbe1832f35a4911e378d1f54781b0ed587c7103ab731c10c9373ea21a7
SHA5128c142a062a8f7af8a06dd9fe036c798576aab8224d2fcf0f36d5ae59c60b05893acfeaa05d1945c256f24f399d05465b8b754d75e8105d0406075c6c9d13fbdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517637a1f231382518b0832f773fbbd3b
SHA1a24faddacd93d665746a0ee9b53ac3e269462a1c
SHA25639eba4bfbf5c3296d2b63c8f67f687e92c96d6cd906726ec74b77acc23e90df5
SHA5121217b4bb492f9ec5cf384e5da058d077879828a26b11839d3af96ff3ed65c7322f7d7f2563cc2e35fc8c18520204f6c4d459395c17a35668c6e2ef09105f6208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0939a00440459edb53bb67ec6bcc08e
SHA11695780642903dfda951e1957cd3df1ff66014f2
SHA256afda11a81e0364c84cf01b331ddedfef52113e4b787e8664b891adcc10ec5d80
SHA512742145626f55c97f4ad43eb6cb20a7c1d6acbef3255e423414d9e58d7d9db25672f39b5cf612a6e31958a0cf89f3d4163b1c5cba8f5931f31dc5569830b351a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5821457a556f5f4f601388933b51e27f8
SHA1315310ed2982144fe6aa2f4b6d876cb208ed7c95
SHA25675d72eae32ac5e8e30be3313ade0c4d6065c04eb169882fb39c2909d539c1000
SHA5128db8bc53923014ecaeb8044952e35f7fb9c425f0ba12ef712c8dd3c323262250152d1caf560bd7fbab0fab4899fc425867891e50b190f08cbb7b2bba19201d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3df213dbceaa4b193420fd360caafdc
SHA1337823f3c487582be9c92c0d4faaa2b427f7bf20
SHA2560d73bf53776ac788e3479b50474622e7cc68c4d0aca177c65ffd50e21af597d9
SHA512c25698c484330e919436c9bd81e52758c7dfadc6df68feb16be5286da97e64e49be7bed8d30fe4eecc51fc499f2d1033bc9a5e37f2031f78efd507fe4742debc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553bd17c5e26ad8877e6b606b4dae0643
SHA1640c09e7f3503331aba2a05bb6b85451b63b8bb7
SHA256b56fcaf252d2ed7077f94aa4e592a6bc4a2f464516eeb4b165e5d3cab223d137
SHA5123e1a3a1dc00cb637debc9067503809a147fa0cf37605b785ff5ff868752341f4f5c32c291141bfeb935259cc63a0345fad35918a1448e124aad49005e0246e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3d354e0c3b91c6dec548ad17ba2dd7b
SHA1dd1237c7efa64ff30e37481914046058469f0b13
SHA2561c556d913eaa69c86db16066eeab7ff637ec3df694ca05a551fad095c5e63a4b
SHA5124a3cfaee9346a29c1d1a2504d2faf38098cbafea83664cf97938801ff0193a2f0b81b9000cbc9be7329153d78f2251f1068988781c6c0aa725ec1fd5b5c4dca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ac8dc6a91e540ecaf7dc3766647892
SHA11b473f47f2cf9065b460db8751959d18cb677239
SHA25603e13227d36a5e9bb479f953fa970cd78a042204d28e93dd2e4aab6dceded00f
SHA51204b4392f87c87ad9dd9e4d05981ddc06e8216e8d27e1d391e4b4f7fcf73cec5d70da63ce53f418c664b8773f80ac70740d74d4f131fc0b3572ff1ee2c0ac2823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7bdf97d581c1ad46893969d6dc1850
SHA114400db1e0f6cfa3cb3b04afd93c5acdaf29a4f4
SHA256f8b45974a8d87e68aa1a88a427c98266c791bed4bc5c765f66f4807ca12d8947
SHA512893d6c02fa7e56984acf5293b2a0884db12e225b78813fe43cb3403645c232fbc185adeb73343cb20e17a0156809d4480f939740e10e70179f0a40e364fd3c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543612c7823c4f5a09741f15b7397212f
SHA16783017614306096ffbeda14d3a339d522233b2b
SHA256e7f83164739a73c2dea7319f0ff1a05921e116293161e01cf46fa9ff792feae5
SHA512fd97997eabc74ec1c0773e4cd014a7218012d06f7467c5bb840f4bfe860ea42e3f72ec1c92eaf4e9d468f9f9985b8edc0f667dee4d2445fb4a43901b4a87e9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddce56bbe9d3a96ebf2ca01bbe2753bc
SHA12b13972bc7e076ac54a360f2be80d1e3ecfc57d6
SHA256e971e0eb73e7e16d54e97f0b4d64a537dc88cbb292d0d96c5a3d9c2d2f2e35ee
SHA51274929881f6a3b44248ea91022cd012b102e232abd3c2cb0e6e14d1b9b280068d8145b405fd2c9e6ca0b3d6f430a01cb757ce8b7ee17f7f25b62178073d2e49f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508ff745e246b499f5a2cae5d8f8139c2
SHA1a057df4977cce230a9bc287f077720358247b576
SHA256a609a9cdbe1d541c0a2ae2a4c7d4b5fd18b4ef15aa71d4fe6899303d1f08da95
SHA5124e0c350e1046ed0fee4a756750c123dccc3bd78cfa35033dd230d2a3962e2b6ec127bea3cf5a1b89016e148018714d6a68742c49bb1c577c8b49edd71d440500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b22fcb92c929892b3efee42bf040ce
SHA16a961c1417c3c79f6a1cdfbb6347ecd7383daa57
SHA256ecd30682397e4b48a9ebbf06891ad51d35d45bb51aa1ab94e2189dfd3e3dfe95
SHA5123e988829386b2eacf278db49dd399b5487a201253a394d7981e40c2532564a2ed3a3527da82601f4ba466ec8339787437fc002ec9b44034d36b5cce4a04f5c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dd60a7240f6bdc0737cb26ae0f59ff2
SHA18f060aa96da8d4d7d240dd120581f6f34c1ecc05
SHA2562529445e4cacccf8b29e055b4c2ad7bdc5652298d71f0ca3f5d2c15da42be878
SHA512f4f0219f43a65efa6cab00881fe7207033c3e1e18bf2006aa49db9dd99f234cebc0cc29fa69e3f05a2ec719479bd0f7464e0f71f30a4bea45a87aab0094cce38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a925507d9d8ca3c60ccd47adba96a37
SHA10b1dff9b2eb74fa746d1b12099f395b9b4bd1b6a
SHA256d0ca240569512cd4cb290a25de4df81608b4ba3f15473e842db95e1804ca4ce9
SHA5122d79aa26873d0c88078eb6a309522946f4865868637e5404e62e27c76f9795d6ef5f1ef1e8b2a6cb08c1ed0d143e55b31e09fb141f32a591e5306f711d7011d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d01d7afdd9ce017972d3e1dfb17ae8
SHA1a10981d51d80a8a39be5219590c774c75a71884d
SHA25612452026d837abbc8fe6bf8bbf4b90ff5962c269271049fac23a2d6ebb628c49
SHA512c08fa0f3bce6d228133ad192314b8249e8d4f3cce37d1ef1812b52390252c16a22fd9dbb560d62d1c58646b5a8ebee35799a10e82875fe0cb8d7c4202b238e7b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06