Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
278s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 14:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://nh31.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://nh31.com
Resource
win10v2004-20231215-en
General
-
Target
http://nh31.com
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412526321" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69CBF6E1-BD1D-11EE-9B28-D6882E0F4692} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000a66b8501990bb3aa94f286e2fd2fd3c9b6e0652aa7ed6dd6af697abe0e73d3a5000000000e80000000020000200000007ab1ce91498ac1825211617a1cd114636d3bbf8e5254e38cf7fc428812a9be9b20000000785282df0945d9c3387f125f7f393b1dfab34be160bf4c2ac58965ca258bc0c74000000084e4551a6e9597d8790e3aa20bb74c5fc0947174128f2eb59b340c7472e9692cf66dd691a4c10c98f1af4d4b5c33ebcd3c675b8feb7514a490b3e8ee15e54be6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b47e412a51da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2244 1936 iexplore.exe 28 PID 1936 wrote to memory of 2244 1936 iexplore.exe 28 PID 1936 wrote to memory of 2244 1936 iexplore.exe 28 PID 1936 wrote to memory of 2244 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://nh31.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595cea0b60e76c0b4e41d265423095f15
SHA1cb1805182e4a7bd9a70e477cc4fe7dfe16ef0ee3
SHA2568de280aa483d088659cc9e86f6d6d155fd3d0afbe3e6b160d046184d167a4e81
SHA5127b418d13ba5abaaacf83c95ebd9b47bc627b40f1ab767ae02882f4d9c9a776037016215cee289978bf01a6a51ecbd71cb93babedd05df1201a3bbcfc8f2bebeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5716be1659fc222bd2c0c922b8b7738d0
SHA15d04932939435ac23982e89cda8c39cedd9a1c2d
SHA25640a9f01f9f877f8f729134d690850122efcdbd814c2d6a27b979ed3db7a4a45f
SHA512f83652fad12e153c69417552b358b554344bbf37f2acd94eef26550ead6696cfa72659754948611b42082015f89e659156858d94bd0a11d3a455d82670070843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54707ba971c50f6f83db176420affa9ad
SHA137a7bb270031773d5df9dde440d393a9f40e927c
SHA256f219491d8538900e7e2a6536e4fccf92f1ebc341bdc9ef8b2ab458aa726e4f5b
SHA5129de3dccbebb4b966d371fb7259422d8f2e5b8954357a5a01cf44b97e2744e05e100232a269051c53441924458c6e5533b20b44a5c03e95ea537660cb5710b007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b527af08eb113d137a37cc636a27b185
SHA12ee1bb16d296aa1de6f283639d1a29b913205c0e
SHA2563e3a21a6539d49d8c6d69ebe13bc4f3146d667d04da95b7af0aca2a820297ba8
SHA512b81b82dfc3174184abdff0b331bc0d44c9738fdf420a7aa0f3fc009d9d8f5586c3c1c8228a950159535d4b0dac4b8bc19eda7f496607d743ea5159d023dbb01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552994bfca889bf47cd7212af92451d9b
SHA13f6a2482d04627d55202a8767f3710245fd7af46
SHA2564b30158aadb5168ee3bdb2cb69c19f2c3459fbef84c987fff6b8369796c1083c
SHA51200ebe157c77dbb5a42025f44b5247b0474c6aa0275367563acaa37cacd7ff3efde6e638e7f129972dd0ab2f46330b65966e5464b52329b68947302df95d40f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4ec8f1d2980b3859b9ee82f29e6187c
SHA1bcf7b0a431ab440d17bf26155ed6e161f279bb8b
SHA2569bac63522fbc407e13322dc4d074883725ddb3b369078b63401e89c7e8ac3b68
SHA512c91b67a1662a1a765a3c9f76a6cfe93d50dbea82027e333214caf031eb77debf23a7c2004f7d30a035b3ee9d590d9bb766cbcdf8db5b84b07fede434474c3845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d4d43a8d3a419cd3bb6148cacaf9a8
SHA164f51741ea53256eb0b90a10d5fa779c15917be1
SHA256d8b56e4881757cd5668103011a1d10bdedb64f0b178588b5bc67cf9a2a1f30b4
SHA512f2b1c009668f9dff86e9fecf5cfb204f9f8ff084ddeb99ee03e8f20539c8e505b3999f0c0466d2e17f9dfab72188cd7f19c939ea72335e6af339b182fafbd3d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c73bc75b7f7ea24ef463c19b26482d45
SHA1d19471aaff0ee11417b2e10473ae923a7843e7bd
SHA2567f1e03dee2c7bcf489e09ddb321c22b9b31a4a93fcf348a267bb087262d735c1
SHA512ffd295207c1563b18cf689f7aad868300d63181445c7405579123a8c56b40cacf42610bd119df20dfc5dc4f8f5601bb1c99f3b1a97a6bda7bd71447ae2a8127b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54150045ffc381c6d1c255b3c329a948a
SHA1a4e694d0ee843e3c55c106171fec5050d2c9a657
SHA256baa7fdd8a549e2eaea50f4fd33871ed533f96559981160cbb4f1b156f12e15ff
SHA512fb988d3545b3123838b5c097da41c53ca8821676776a4f19963359e2c7e97d74ab1b71c01cb9aee1b459bdde328dc334c8d1d32f968cee726c6d402f8c5347ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9cf912463392d4afd134800c52b62f6
SHA1d22065320679e133406c90520bd7f6e48327f75e
SHA25622674913b0e586b2ea7fef7ed3f699eb7f6d0bff4eb44f73a7be10aa6340199e
SHA51207a9aeab7d9aa2829d478c6d77975e7da265a3ffa846a204d0ca61745e5d5a12023be58b19631ce6eaeec292b4fc203c560d53de0b98eb6fd987396664dc6aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f947d283ef241342e011eb7684557594
SHA117fc649e88d3f065677d11f108fe5333f5252624
SHA2565b206c23bcfd64c67ee6c30718271288c665a4eb216a8f8a13bbab1e1adb16e5
SHA512e9e706abd9988fc4d72327b67d847778c4d57eedb145242df0142dc19087b01a07832484c2c55153e2acb0c21ae9b97387fb5032989eae311f94f6312aa7194f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f0aadef0210459b46c5c9cabcbeef3d
SHA13eeee185a5d4c3f8900c3d25e54ce8fef10dfd04
SHA25636e6cc3f946fd8e8074b3c59aa3fe26d1820c7d5bc98d6bb58ed50092b4cc79e
SHA512b9cc46d5830bdeba659b6221d2e5489b05f41dfb7db35466e99a4f476b235c63d26ccdfc4e3fb01fe00b6c584730614628cb6e9324c23b730cd6d9a471a480af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529fe0a7517d02feca3b1d9d42b018fa7
SHA1e8d2d95c6373ff4e370055991f4815780d68d33a
SHA2564104a2203f4d3c0af4e98a8fb39e6946d3910ba5300182673cbf35a4653b5d8f
SHA51275ac1332c5333dece17041f2f5a8851f3a04e74292e2ff09be1e298c68021a8c2a7057f111dd556950d6ca4e7b8e5c66435b15eb66f2b01cb26ccacee496f45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f06d87ecd962b3f798fe1ab23602c0b
SHA1f95acd2c75e05e2ba519236551baeab69bb1e554
SHA256e522640d748d5d170446b08257f8fdea45f01deec486531a5b64bee0caff2466
SHA512cac3e5eb137a8653eeea7721a3b251c39f4cc1e06b740ed39e81eef02991c8c76ac9de342eeea1e405ae8e8ada2c7d698e5af9bea0b7a3926694bebe4b3a2df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd59b558f5c51cf09e83a37a00d15320
SHA1929daac704162e28772cfb930520244a9474586f
SHA2565856900f3d11fb86d397e9d135491d3067983b2096e55667e688cd0783f3b2dd
SHA512dc351946012e0f6494db2277ee823d4c05c467d6d43153d9192af2dfb028e141a74380feb54e53f9d2e091d5bc1123fafcab16a7bb31e25fe153a23ecc844b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c75f6f874d5c7fc27bb69a504ba9942
SHA14def7698097dc38532c0fb9ee33e2071cfbdb243
SHA25697d8a3171a940e7de2cd521dab40c8786a42e5b760ddc333c0a1534193f0d008
SHA512bb998c13cf3ff75a32fd7946051eb61ae97ddd3c1137ec076a5dae2eb298b4bf49e8dda0e19b4ed5a9692e77a6027d4456aabc8729981c4dae78eb2121b01003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a09182d1cca13b2d5bb27f46fe084da7
SHA1ce3a683ccbf89f1d22d0cd393784d6db694e8d9e
SHA256516ed01c65e1b64c5911203495deea7a1759d81e72fc5ef25664a1d1a622d340
SHA512bc3fb0eeb2c1849a2c938faedd940dfe9f65df91d7eb4fe080754ff7eb20b49485ba69b1a8809fdaa88831aa5552f465e8d6a420ce828a129d4a0a410f76ceed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593b8a27b17270032fa29a0b7f3298c7c
SHA166b3bfc9f1d99215ce03f51c78646c60e045ccbc
SHA256bf0e5127a25b3ce86d1ba1254ca4b9ffb78e15616ae29df9b0b641b0c0a5e584
SHA5125a5a5152eee7a3533d96826e63040546821f64eb90298ac7407318ea1143c6b42250c929a76dc62278a0d5df1300d21924c6f98f9897d4988f52549908a72f70
-
Filesize
31KB
MD55e5ca0fdbe1d68ea7bd0a783e267806d
SHA11274616bb685ff9ed6cf05e6e2915b426a9c29c1
SHA2560d66035db992ca603131ad96084c71287cb7d4ee2879aef8ada39df5f904e753
SHA512a896595d4ac35253cb41b5b020e168ceb5e7811385e81f22136aca1ce3f59d7d903c24781a0e01a2867cc1ac723ef718796b32076d338be0e511181541b111eb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E324WJ9A\favicon[2].ico
Filesize31KB
MD5d2c8dc23aed1d37becfca0483933f9ec
SHA15a49854b5c499fffc43c2ed4e42f197eb1671d08
SHA2566d2e6208f16a0b228b823b565f77d5995a9de5bfac47c086df44e900750cdad1
SHA512eb58809e07dd89354a7848fb49402b187b5067f4d05538179195b913cc7b709eb91faf66987d845caf489dcdfb5a3e3a786c027af0ad714e5be6968411d3f7cd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06