Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
7c9be633487bbed52b7f0470f9be4ba4.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c9be633487bbed52b7f0470f9be4ba4.html
Resource
win10v2004-20231215-en
General
-
Target
7c9be633487bbed52b7f0470f9be4ba4.html
-
Size
9KB
-
MD5
7c9be633487bbed52b7f0470f9be4ba4
-
SHA1
05c19ea5880ded3be088a89acb6efe5108483ac3
-
SHA256
fafad53c8cb58ef6d84749f88e44d21163ef367c3220dbb38c6aea3c26245fe1
-
SHA512
b468c7f6a9f91617f932a9544f8620e7249bd881647c9f4548d7071b6ccfb574671719e41438a596025576263b3a277ad5227dce1a83c4522447b8bcc2be30c4
-
SSDEEP
192:TM/l2sq2tVBexCf6gCwRLiYzsUUQ/PJMjMY:TdyVBexClJMjMY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412591500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d300000000002000000000010660000000100002000000027a43cb7a5617b95825d0cf3c4ab0d6a53a80e489fcabde7444e54045f3916c8000000000e80000000020000200000004796c3c587adcd747a50c45ae05f2de613ce9d6067e42c1865935446c523563520000000a2ef407a34f2a082cd30d1da5e83be38f9636411f6fe8a37c1a522a69f87d3094000000002b857ace609b5091d9b73269c308fb351b360dcefa744b20bc1e5f67120ff2d6b000c8b3ca9a16a055f88646e5cc7b3e8fb9d9eaa1c020fe9d385e69bb2a33f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207ed000c251da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B8D8041-BDB5-11EE-BF73-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE 1120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1120 2212 iexplore.exe 28 PID 2212 wrote to memory of 1120 2212 iexplore.exe 28 PID 2212 wrote to memory of 1120 2212 iexplore.exe 28 PID 2212 wrote to memory of 1120 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c9be633487bbed52b7f0470f9be4ba4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530568d06d3e5882580e987158c1b5866
SHA1bbcaf41088dcf9f04f9b650c73d1305d1d865562
SHA256e092c5e352a597b305f6aa3eed8d12647b039e71826f4a207ff2171f339ddc14
SHA512e01b73085e0c561129c9ec95b0adaa65f35d15b1bee891a8a867186180836ddcd1f194ce3544622454176ac3e0ac527d0e32df54d1a3397c0f853ccd48ab8f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaf0109609f0f9bc80be84ccbd2cb1fa
SHA1233b29e5eea174f1e282c73b13fbb03f6f48d8bb
SHA256788900689d43c4d9a96d825291d30dbbaa9d77732dd2adaabc353b45caa6c8e6
SHA5124a31f40fcd7cf2ae686239c6c7543f241fa09f2230eedbac63f40ee9fa18cf3038c0b60b59b8762c9e7dab367783d7e868dcbd15f393d33a4e5f15e5ebaf4bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a80f5506d19da3925c4423fecb4fa45e
SHA1989285b749af0b9187cf373086330b45894b4ede
SHA256df6e12aba6e6ea13fba1a5a5449b76354af14def0dd3ea6c67054c16acc19bb3
SHA512a2f5687e0f05971abe5c56be300e93960d99cf4102f0f3c0d5c91865c4cb0ac90e29b229f5675fafec95c5a442ebe0d312e935193ad2f2401cb82f03aa0eacc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0818fd7d22c09ee06dd08d9ed612aaa
SHA1df87a7832ada8fe7e6e43c0e35fbf09afa8b2cf7
SHA256d955601d35dc346ef027b57f23be120d6682b05bc73c0478ad0c861a75b000e2
SHA5128f16f1297743def9f6f618d84832c3b0b96d66c17028465cce2aa9a78c7e617e4b81e36bff01798684ae9e74f1011a5dc492f05587f5aca3731151ab45cc65bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f72aebcc56f33cf413a0a3a6328caa8f
SHA156b1687828fd626265e877e447b8363b98a17ce1
SHA256f4c95fb6d861e7e1ce5a24b674641e67c17ed488b92fa8b282c0ecf3f62ffead
SHA5121e1a80736684529dafb272f8bf0d90b9b16b7be9ef1b406bebd13cde18be970c3a726118abe8e401984de2eabef6906db226df19434f5dd2f1fee86b2702176d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbd90ade17c0320fe5f99c10a69440e0
SHA17fb5c0479f60ca1467160823136ce39aacf9077b
SHA25671e3e3d53ae810e419ec3dc6492259c3b250280dfa993135cdb163e77caadcc8
SHA5122fb3e7d4ffcee4e805d15ef15be7589653bb41b592885092ed5b92fc32a7510744d355fa28100c8b0e338a50d156604eca62ec0113aefb6e80ed4415e125a0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba3c0bb20892d3599bd9e2655074514e
SHA143c709ff342c5040612c190aeadb3f3d1d6f6f9d
SHA2563c22619cfdba259c85a89907c51ceafe5517b2dc0ae489624f7f9c9e42022964
SHA51265541f851d5c0311942dd99cb02f9077f7b65d4b443bea17cf6002808d205b219aded6248a2ee2dc8205d0e3e488cb9619541d4efbe5cba5d4101c1395b14ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8981018c2aecc3945a7f9681b389b0f
SHA1c084acbcfecc4553712547f1a1c6d62f1ca61a50
SHA256b17d372218c7e141a02cf1bd59e44a40f7da849bb41733577fec2b11d10b7bd3
SHA5125c799805f6c4694b194acf90d485c5fa0a8e867c23158e233b398961d068d6dabd4364e75c48629846bbbff67c0eb0f0c66f8c3bba94ea5faa80f214c31314e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee9c9163af828f510ebf15830328f02
SHA13a3e54cba2dce0db28a3f739f3448ab64075bda6
SHA2567eb23315d78188d3b8a3d636cf0ab57806efd1069b2a21c6713a30e391058d54
SHA5123013777907137d50d8629d8eeb94d8713a4ac31372c40651013c8a5a6aaeac05f4e41a53643ed168273a71058a92a944ac5f8d77315b21f17ab9cf07c9e5045d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c630d294f9382580f97eee07afd0197
SHA109d4be26e50880b5ee8b133403c57d1cabcb504a
SHA25611e30b8fd548f8532fd5c2c4f6ec1689431a30ca18fa8ebf1c171969cc9f9b39
SHA512233519ea1188b7bbdd63c1ebe5963526f000ea68cb7a2a93cc0211617ba367f1fa3248656324ade0a5a83a86630c3131d463f0035cf9c5ed71be0c2c5727688c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5263e35712b30d0452d8042af907d0781
SHA146c8f58e6f43cd66bbbed9b3b654d0917c80cfb8
SHA2565a8ee894bd8fb25695926fd15002ce947a82917f75b1da51b4bc36f983c8fc3e
SHA5122f6667a6f1542df29b42c51a6352dd860046c8d255ca691ca80dabf36744dd02234c1a6abbe853afd4f835b628e2834a1731f7193f91cadf4ecfec105046bbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6f8bdc81914c90fcd45e8e89b9ab62
SHA19eb76a2a00986d5fd7829a8b470df4f6974e6474
SHA256230881a3e048ecfdbc1d04eb89c3f03d2d10a6dc64c50ce7075af9cddf1060a6
SHA512a6941086e2d228ccc88c312cc524e758c15be7d5afc32e7674746b1f4ae104074c8e7002f38540c584eddd3658fb40699dd62e3e2c6f0fecb83f35bd3ad5cea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bfc1e700ef2de2425b1f5ea3a3a5912
SHA1aa752ea7feff9ce2b659ed409389bc7163ce346c
SHA256f79d84e96cd57cc9a1286f27c0b6fc807d8f6fd715008cabfa6656acf45dcab1
SHA512194b9419cbd4c66959e484f5345301d33b3a2a94c2959f00d59a4bb704ade0fe2c0d13974c82f3ea3a85d235a9b03c3a7bd7c5971e0cfac72fc63ba399aed338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccfeb4db255bc25c0c9a1feecf251ffe
SHA147a829c8cf76bdc8a91147bbfdc49e8ebb90e926
SHA256f74e5cbd4c4934289ea0897c02d9af0f0fbcbc1d4da8f71e94d400869058865b
SHA512e49501bab150164c3936a5426dc6bdb05134b5e6ab796ebfdf3da7a371f9b8f7764c95bd107e4dad6e6327f0ca617ea40bf32fcf4f35115ecf21d1b39d9ac49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561e6f34859dcbf552341323c0715fc5e
SHA17b19d5d26576602f07b4fd42b033bfdb6d1f8ef3
SHA256dd8d73324d984d1fdb36107bb9aaf2fc32954568ef82f23c21c3c183e70781e4
SHA5125eb0667d8f5dbf6dee3690f8477db3eb2859a8e7be18270ffac68f08612742ffe96232aa16310bb2cd5c0df89f655bea9a7966fb4a776b77a19c858175115d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2411661eed7fafa3ea8b9eca173010
SHA13784afec9362fda330cd5134ae8301028d0f5087
SHA2569b289d7dd5cbd1a6dc8c8a7589f14db5c48434a684b84cc1a16b7ad574729b75
SHA5121a1cdd220961bc355b7082c940fbd85edfb1a31945785ad8eac52a09c4aeee41f1cc6215021b876817e7c02ea4cc20d7f837e84f77340e4c8d2f9a876cfe5824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ed2d378556793ce94b0a476788426dc
SHA139541b660ecf1b6f56ace6d53624a2e9938526f7
SHA2566de0763de943249bc8d5b955f2f1124fbe33810e8bffb4b06c0e79ebdaafb1a6
SHA512a4a0eb656af3185cf433e82e5c701991a9ab4dc93b51b0c1ac629732045155deabced2b0e332a6cd35e9e2f7e57193995ab4a27ca2830b22aee40ba2f73da28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5f2afbbc75a3547a8b014bef4977a31
SHA1d2f6998a543eab8df6ee011515c124914f6a2fbb
SHA2560ccdcdd376d9d79bec564ff1ac14637562c4ba172743a3224d68478ee1871dfc
SHA512bdd9e82de1453e34376b5a615d7ec0a99d5de54e7a929c8f853796d250787fb85068397126a49683cbc35502ce5ea5ede7f54f26b79bde81a6085aa6b5cf0d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f108eb6eae49ac442738bc3970bc7b
SHA19a23e94b1f2ba316c29fbc5fa504b9c8952c7d45
SHA256aa65345936d0803c391b3b314c28f44b85d8482e0163a977d7aabc8b2c1d176d
SHA512c485d4f52731cfc3c0784d5be07eb609c18518310aeee8112cca7c29fc3b2f36ef991614ab18b85cfb56aac44f0772403b43b4b71cc31158b66375bec2be7fec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06