Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
749f154aecc81099c8ad8fdd183687a1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
749f154aecc81099c8ad8fdd183687a1.html
Resource
win10v2004-20231215-en
General
-
Target
749f154aecc81099c8ad8fdd183687a1.html
-
Size
30KB
-
MD5
749f154aecc81099c8ad8fdd183687a1
-
SHA1
7e3cb9eb8bb86d72634b35e7b9a374b0e2fae509
-
SHA256
f2a626d1a81f2a8dd902d168bb4effa3a38c8ed4b75ffd3d1ae127acaf332c27
-
SHA512
53835bed314a9a8bb042637a71adfc70ddd846038622e740455fdcc89def1501b4a7a8361a6511a33043c84bebb581517ef99d71b442332bf8ab328213d06c6d
-
SSDEEP
768:Vzr9u/tiMEjdTGZOGq2yT6rR7J6FNg6zqK/GWoK5mwyV/dxwh4CYNzFD7CAu3elR:VzpulXCJ2OBDT6NVw2Eh+A8NB4+NpFnJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 704ee015844fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40642F91-BB77-11EE-B331-6A53A263E8F2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000099010e0f1d3b117284074a339e182353cd57290cfd104853faad58a3eb0c45aa000000000e800000000200002000000086064772147ef12c2f8dd42c974b511bab9b2da928d43ecc065ce27ab9af75382000000039056ccc0ca0a45813a4f0f791db3c2f911b08c7f305969510c2240f14a3e6c1400000003a5fbfd69dd16cc41db8c70a36dba2145f7a19b26ef6081703292cc7049b1252d37da02eef0d574bc1a9a2173f6a706e3b232bc7c825619d64b1c53a07b5c89e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412345004" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2124 2312 iexplore.exe 28 PID 2312 wrote to memory of 2124 2312 iexplore.exe 28 PID 2312 wrote to memory of 2124 2312 iexplore.exe 28 PID 2312 wrote to memory of 2124 2312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\749f154aecc81099c8ad8fdd183687a1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5595e647be414ef94c9d825811cd912bd
SHA1aa86147f5be8b85ee34eee9fec336d953a4a41dc
SHA2564ed0b06e8ad3601f625c66ca1e3aaa6de472b6fd28c566361a6810cceb9eaf04
SHA512370a336b25c8160e9af59f5741dfcf456cb42a88ac59136ad12dbb50294a10a22ce57d0a9efb5199324538e1d8149fea4fc19d475821bfa6cb75b26b688332ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571b5cd23defb031f2b19d19876f220a2
SHA1c4c267b97ca5fea257253468f06ad26ac6583fd4
SHA256a518c2f04c6b1fcd93e5944a1d3accf85b4bd9a64833c23dcc58d7171f1c7cb0
SHA51217f57eb8682880b1d448c5eb202ad41f65bb4a5cd0bc206305e11c1853bd27f94bae88503b2ae03e460514f74b09548fb054d4df5b9a6b00b80bacc176b8cb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2eb0756a392164af792c5699f06c943
SHA1ae405b52c2376758f6ad55cd40c3f041c5e6e5dc
SHA256b97358018ffb59e48ff08635643c3102abbdcd830f66410406dd46b4b6503e9b
SHA512562616a0ca555ee6df069b2703f36e09d02642f48477e8cd3973b0d18babc0f22ab9ed31415dd9cc507d20a5d7be0af8e6b318cf2c28da7f5b766dd09613b843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5321551e516496dcba67048e84a99a231
SHA1c1bb6e54defaff86fdd5f269d0f63ba6708adc9d
SHA256ce67aff7b5bd4660859ed96a2bb298c0ba977659c25d302f2e1303d988336250
SHA51219553232dac33ea92e52151b59bef51b0de7a23654593441fdeade17b3a7337ca35dd0c12c5d03b38f71b732b2c8f2bac929df06dc7636a3b967c0d247714609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e04e5103d23a7ce766276c5897fb3ffd
SHA13613374168a04b07ac2e04e40e8559f13d5b9459
SHA2562a4f09d1f35a7eade2556b8456d99e4ef3134e70c463c0978af073b422751b7f
SHA512d9bbf79f05a94b6d4b8d6084c41141e93ea9aa0c05681bff46292043d1e84322feb1c05af594f2e7b58b355a8eb39b4f0d6e7c564fdf705873c53e72bbf32edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef195872be821eadc0ec6b5ab8b5b87c
SHA19f6eef1be636e1c6c89ed07db6c539cfd2409bdd
SHA25692d9d589b2d517146b8d83983ffaa88fb3964c758bdb40c64a293d43e7482120
SHA512fcf0c7023a5d8a96ac6447dd02f4fd2502eaf13c37ee6508edd3f3f8f1bea7c9a3dfb433942e12dbb7e478713953ea56a48f5e8055bbf6faae881a09277bb339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0af2dd7211c8c8221a73607bfc36b0c
SHA13e92370f8517417a167c170e6515359ae7fcaa4d
SHA2568eea516610e1976976ae858ca330b6499332f9f8ee98e6048cef0af05b5fb760
SHA51283c3a188c0d47081dcaec74e6f272551aed23735f3c4101fb95fc70e7e58a7080b0105aba4f007c905dab1dab643b863c1fd923da4170014d1a2fb8d626b0056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d5963549b18187248f3bf6594cda1ac
SHA1423c96501cdc1b5b721b41d041d59445d0ed7a82
SHA256cbb512e1810ebdaadad17ba055b87ac5dee805da7030b084e8fd7a49d34a70fa
SHA512280f91a8cd7bfbcc310bd9574d265cb572b058ef6e553249d915964d2432fe18defb2269818090902032b30285a7d635f134df419711e4ef6001a36f7f7c179d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ec2d0920890b47d12029e15620b489
SHA1349765f5503c5d56fc8a5807424082cb919be7d9
SHA256db1e42807968bea05541b494079ab599e3e63a7441b8a9dd6c93841493630d40
SHA51220537db03a11d1cc7e31a4f93fdb2c71283bdc457c73763c03d4be05c1317d515bc0c26b4dee445600338d4a99beb1212d46c973fdd2878866fa2e7f1cb07a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e441a4423e29f999c42a20befac70c0b
SHA1bdce6186766bcd1c679499741a2da146c5baa3b1
SHA2562de6dbf50b064b55719949b04ce2d030aed7c9981ec98479f70be74c5873afb6
SHA51210059caa546aacf7f598e000a0fb11c587b0e035ee694698c652c65228a5d83993dd6c46f178b964f665d81fdecf73946ac45efbf6098629e8d31edc85d41b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c8c1d7e8cd85bdeb2ad27222eb2588
SHA1d118dc66af227493372dffe6f9af0cd4bd0a7359
SHA25698ea00862eba1722e04cbb0179b8f7c8710e21d076d13b070f9ed2943f811fd4
SHA512add617e0ce3d1af20b059e529208005bd8b1e39ae8e54a6e059279b78395e512d71c5bf1f3775c0ae34d6bca342fa3b85477f76cef53315f0a1795cd44d674fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bdc57caa968d5e1cda45bf4b1701189
SHA166dcc6c35d5f4b74d130b55bcd5cae2b394c0f16
SHA256f85f7f133726da70d541aa144dc2f442c9b883c298b0c796123a762c2f1fd6b4
SHA512a1f4d91028b801e18e19f1eba45b62fb23aad8808571c075f88d2c61e4d8352d0475852a5b3a9c89a990846655b02c04478bc0e8848514b31f9082417f785126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6c5e4254b67d1bb308fcfa848378204
SHA1a757eb9200f24ad2d70361c32b0039a2352a7600
SHA25677d1f3a56a3476fefa0f00d8358cde0351be7f1883ab5e88de22cc83cdb17a0e
SHA51201ee45632742c466b6b65a01b8dfbbde00a88f03b14721a8bef6ca1767adeb265627d59de2c5721ea2d377e12555fdb45b7e8c31fffccc5f535be7bb4bb467e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56de4996823c0bffad065342d5bd8e3d0
SHA1ab38864c02894547d51b926d201d0b0571770724
SHA256692c7ed1fe687ed7634f39569f057981608fd7ee493a03d9cf1754f4334cdfc8
SHA51244f36380a39a56c2b030a8d1242933838f19a8bf4cb5bac6e643b88b757afd087cf8e91cda50dbb06a6fa6d2e9ab3d280ed2b03e35517f0f29f7a7c99b34fc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2bfa7fa156f0c71b804962206f1be1
SHA1816abf0f9f0f3e738003b96315dfd6c3a15367a7
SHA256b80e1adc4cebd027d1b834cb8899f4e053c904f990c146ac7df122516d503d26
SHA5126dce479a8fdcfe64088a5fe8b16bb9297b41e221bf589cc17fd4aa44a27d396318c310c3f7942dc2c49ef517f923d0bd55645548029f3a14b929b18bc283df48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d0d953d15c9359926abe6f8609920c0
SHA15636e99c897d9ad76f927510636d13816fe98288
SHA256f37624b8df18b4f8e8c411300d402fd8a02e83130c3f23e77edd08d97b5f98d9
SHA51278225af6db082e59ff07247da1e76ec8adaf103d5c9c8d7783c99bc79382db8f2e2586015dc91526e867c50b87fa3f8d2d0092a4224f0324c8fd8cfd5e84e52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e8cb8317254ad3d98e131327413382
SHA1f02096ad2beedefa64978f17a898110deb33a2b4
SHA2569f99ab8fd6fcf967e1934bd7a477a62bfec7733c1a4cc8a925144aa58f4f1fa5
SHA5121717f48123d235abeb7f998fc3d11998df9604424dbcc4fde448d6b83aa754cb798f926be0bc9170110d402b235d09363d9eaa1799cf2f58709a4644fc6cdb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54110e0f93c331c1cac0d97381f3719a9
SHA19196fdfa3067089ee566cbcaabea50b6cfc5c042
SHA2564e9fee5528e4dfde58c41b5dff662294bc85c0982b4785c01c6da2d5123622d8
SHA5121e271693d9c96dd56a0bd6e383f307d62bb6151eff03ebe9384976966a6b36d085edbc56fc2640fb35f40aa0cf310af3abb0300343323e5c3f0855ffdc2659b6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06