Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
780fdc053fa0ef79e0541e0400a5e3a7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
780fdc053fa0ef79e0541e0400a5e3a7.html
Resource
win10v2004-20231215-en
General
-
Target
780fdc053fa0ef79e0541e0400a5e3a7.html
-
Size
25KB
-
MD5
780fdc053fa0ef79e0541e0400a5e3a7
-
SHA1
84a18accec5dc8a1dab58f19afa459287aceb848
-
SHA256
5c0b9f32cf8d2f091e0bf7c6981b66723792b269d0465ed0f2dc8a2bd28d3560
-
SHA512
301896bf4e3aae819eb51592fdeef2f88fdcf4414cc51e635c884b91590b104a401df81c882e4575d4c7eea6608cc673922ccfa993f65a5670a4aec395c4a79c
-
SSDEEP
384:WnA4ywV/pKK5/ztvukeKXXTuFwWkb7Zu0LIWQQ/U4cR1LeeIYECdG55LkuxOk7gO:+17rtWkekGxa51k90t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{401B33B1-BC78-11EE-A80E-FA7D6BB1EAA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000005c541a2d27ea8da716d4b71053c18d98b5c89ccc0cd98063087c7d2311ced638000000000e8000000002000020000000bf93c2673e7c6ff7233416640e2f0f40a2e6d8ce6225358865b7c744db0f23ba900000007ca1f62ec71b764c6dbc894e02d2be6061bc64815d111a5f99a2c5cb9441cb1662406c9cc5dbe889ae788e3b39ed619cee3a1f1a1ae464b6ae5e1d21e0ab3297fa2e1828ffbed4528edd5b27e83f3ef276ec7db3a3564746bf2f50379391fb0373641f09a76104f9b3b5714a19ffd3a97371badb04cae2459e00c26cb3c8194d3be72a320fd23989cd431a44d78a6abe400000008d867860bbff1210d0c355d335d8327b9da64e069398c15bad7863679e5d6dbbb7eb207d15da5173704255040b188019f2c72ef656bc796d0de13029b995a810 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000004a1c9f19e1ae8c109f5fc7ac142fb91cc2000d0dd96f75edbacdc9fb2756e859000000000e80000000020000200000006cb71751e457389eaddaeaf1a3313c3d2dacbd44139c4ac7e957e513b9617b26200000008a25c1768b51d11aa9ed97a01f0e156abe7db0ac8c63a5b8c0471ee1135fc92340000000a36401941acba8dbfd6b76f7ec4e5545a5de9267a3559df57c2ebb43bf75cc726ce7dbf43846ec5246a6722ccce3e3fbe5d4d549b4f66de0e2642792bb01754b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08ea0148550da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412455382" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2672 1656 iexplore.exe 28 PID 1656 wrote to memory of 2672 1656 iexplore.exe 28 PID 1656 wrote to memory of 2672 1656 iexplore.exe 28 PID 1656 wrote to memory of 2672 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\780fdc053fa0ef79e0541e0400a5e3a7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb72ed74a2594dbde18ff1639b0c3b15
SHA136f4fc7642189323271c2d5d631f890e1f0d4fd5
SHA2560066b1449157ebdb673a07d50e651cf8a48bb67e4f1d8e548ffcf7e826fe0ca3
SHA512a7a3f160ff63a42de047858c9225d90ac058c1390d260192980434b8305ed0432177bcba38a0b50ce4cafdec5a09b226fc944651f6349f6300d31e2f2c779907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59370232f31510557f1db4a4f58782b48
SHA16efb4b70eda0ed82749acf4bcac2166ad8d592a3
SHA25634659d36ab4566e68cf68a7b7c20c53b30d5b1153d6215e5fd9d5f83e96b0811
SHA5129cc764314d2cfc49843ec71622bd104905a04c50c55742e0d1eb10075f71a52275cc7d91813f137aefe1dded365651eda2d3aa6ff356151a78483b7bbe341409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d500cb7076230de0cff07805bf5d829
SHA11974c17552f656e0fa5f4777b8234d87ec016542
SHA2567977b835d63067121303217ebacb2841f0cbd8fbf87ec053852395cf1058e8b9
SHA512c3e05cef33870f395ffba3d6262c6d6b787573df130292d7e42efa53da3801e9faa27fd535a84cb4bc957ab193466c05e01c4b89aae06f857a4c82a8a5b7cbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3f0f95576712041c62479fe12dce4df
SHA1c5ccd75b3ae838ddf6eb51ee29c5e47c38eece34
SHA2563058b2792cf1fef2a3aa9564809324e8539decaa3f94451c3c54fbfe1ed14375
SHA512e70dbf79168bc297a1bc62b38d754fe49192cd53081e479953060363f170ae8372ac26601a68ea6211ca2ab93051493f5dcd87180ed9e5f780bc4e636ec239b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57499ec169ccac090159d7740d0553c56
SHA148c2766b285b2f4b221612249d9936af68b39395
SHA2569025bbfda28bdfb1ac6863cf5a714b9930028a14afdceb408398d27644716ad0
SHA5124b44d85b0b2cb487c5d50c935ee7f6f8810a12a595f1869df396d074b6297ec1913615e528905f0c1f45d51eab1aea32dce0a825438c153ea75c7a23d36d063e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552f4e76eccc1ca5cad4d1c726b278518
SHA130be393dbcd902c9f128c49f2f52d7e1c54ee70d
SHA256fb1b5af5007cdebccb8718828ed98631655c253bccaaa8955bc7c2409e46cefa
SHA51286cffa05197d1e9cde329b8ffee905ff09b950680c16524e250cd0667f48feeac60d19dcb8d93ad85ad90fbe19bb0f04938fc244c6a954897b6f83a6182ea73b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b35a05c647491be7525babd9631bc9b3
SHA100c187df4faf5a85e1a77b5490a2bf5fffc3b569
SHA2568e9723b8a7762a6e78153c656831d9fbfd5918c217c513b10c5e0a6f3301f8fb
SHA51281e2f14868e6d2a68e4fe0028763f662b63e503d8ccdc00a1a70a8273c4fb33c9304ec7f04e5f8aaefec19a800da7ef3b7235eb74af785ea7973bf7212edb828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563a24864e07cea71797094a3ff2a221d
SHA1753ce4ca6f80520084eabc37a52442f66569ea01
SHA256f051763e627f76bc635cd17b6b79add466acfa6311be72d57ad82e743ae0aa7b
SHA51282f9bd8d39caccfc33fc0e21f5f362b433da7cfb64ad544591c10e64ea4f1b7215279d30028f37b7cf5afa68801b83aa0c547dc012276be75f79d328e906ffdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ef1a482d1eeefdefd380f3900fba06b
SHA116b244b307c3cde2eb0748825e25fd87c8b86cd2
SHA2564fac5d46de03b5355bd6df19a835e5a856821758c859dbd35872a4c0ed11eac2
SHA5124e92305ac40839096db3d2c125c5fe6b521e8b01f9fc3eed56bbd5a865628628d83b4d01d830153234fe28b82fe2815a92de767702035792a84ec3215bba12f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5db436209a553b53538e87ea979e222
SHA1c7e0d52eb90bbda109abd0bf1a85cc4fc0b764d8
SHA2562fa8503f541e8fefa64a703f888962f2d81b4366d97864b10f349a9dedcb2cc5
SHA512654e14309510463ad9fddd16b0f8372fd6dc099e818eda22982ea5806408216faea15fa7f561b1663534865ac47af98cb381b0d40235ea091ece9cd406780ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c0feaaefc9a93320bffdbc6afcf1874
SHA1f1fc077b3d099c08522bac657f3bbc9c6f90d1be
SHA256c2e78ed493613b184f93ac9de6ff45b07d5cf44900c90232cff6ffef935119dc
SHA5127f5987d0ed2e52173bd0370828653f72c63d936e3cbe1797e147eae298a96502b0139986eb0d4d9f3726f99e9ed2b82a071bc5da2b140a5ec33b610b22e8dbbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc902b815d5f0c0050efc47c1e1393cd
SHA1c7a9d5d098575f23e6a86c4583bd4fe773c8c86b
SHA256dfb40c8c064c7e253c839459124053c32a529273f5dc8c83fbf92a11c28b5f6d
SHA512c2002dfcea2adb78d3b8c85734f7de8a19252c354c709c91e12bbb4d4daafeed90953bd2bba7e095f778e446590cc198f0dae090b12fd424c318e1ee4cdac75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1ac315322c3073246d0cf166af79880
SHA19a95d5f7f5e67147920ae4a7ca4122700cb86012
SHA256334609c726df9e47609afe515af5dca7ed7e069bb0bce1af266c298b66a2ecc0
SHA512c0edd70b549369fc4b5083e9e25a572cf9fd163e93d9d7bf11db50442e03e859e0839dd9cceda9bebf1781f48c0f4ae0cf10955c59687686b8ee1aba33ff6f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541397ce67314761d4186e3ed16809a0f
SHA18741aecb3ce37b3579e154933b52515fc8216ddd
SHA256d827ee0e6349f7c77bbdfd6d5a127ff16a65f942b133f48dd587459387180321
SHA51223a34d4ea9ef7380a58ad41dbd584ee19d17a15dedbd195d98b542a66af474eb27216a4eedc9fdede021fe25b051233113b8cfe8911107ad6c5f0795b7284599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd4c17dd4031e62da814790a35826e7f
SHA145ced806aafa18b60af4540f5f77847eee17de50
SHA25602ab2656e9e0dbb35083f35fa42153e61c450445df559983d48a37ed72b83e57
SHA5121560b1fe9606fd9c75a71774a3f05bea5d94c7c4a54aa0cc5108da0a639f860c2da11e0d0d1721869ab85ad96588fe1641a1de5778c82e89c78f5d6b2b11244a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57407cb21507d33add6fdbbd8fee58393
SHA18d8c581e7cce2272edb962844f25304fe743c16f
SHA256b9b51af530efcb75af39cb447725c4c9e897b1b564fa1fefe1d77395b5109127
SHA5121917ad8b686b4e7a6c95869d97e08be42354d6d535f0b80c3b4fee413dd718b5fe8eedaa928935eeda69ceb22cb996d918dd38340b1e84b680121fb379eac7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc50d0a96ec813d073a19e508a507c5
SHA1c50bd0d0e9a6a5218141bc058785bfa891ee28f1
SHA256d086fb7b15d68d7e4add810919685efde266c5254101580989291c215a5179ca
SHA512532180b641a6567da9e804b9eaa1367716aba3de531eb93f362fa1b7069036f271e66a3a0937b9b3fde726b147d1cdf49b5b894a5ad9abaa35738da486170f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bddc274a27d9ea728e1146bd332ebef
SHA16da5a72a6717493e737260ed3598f055cdf822c5
SHA256dcc2e416382e9e0c26798fceab4cc89f4c4d03663765301fbb8dc183a4cd9c39
SHA512667f844d7e2133a9c22c956588919dedf8fac286b595e8e0ec6b6c1d93f2bf2882bb974d76658f70cf3717c526f2ca2275acf7e4345cc0520b92d76376c7674c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bf97c83eb34805a47ffd87b79612b2e
SHA18dd2fcd81655ef0bcfaf694f591b418d24d89b4a
SHA2564d23c233ede69c274aff261b137c8896b764fd31c1d9654f54e05066410e06bb
SHA5126c9d943366813e45cf2d93d40ff7052f1067c77c02bf3833c3b9a364f3976677697ceee5c9567fbf93c42d8ac2bcb5a1685decf73c20a52e57344f097c823d8f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06