Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
8ae7b064a8d899897118dfe4b7152a8d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ae7b064a8d899897118dfe4b7152a8d.html
Resource
win10v2004-20231215-en
General
-
Target
8ae7b064a8d899897118dfe4b7152a8d.html
-
Size
53KB
-
MD5
8ae7b064a8d899897118dfe4b7152a8d
-
SHA1
3cd86ddfe1adb3b10eb38aaa2e6d83daf79c9f3d
-
SHA256
dd0515a3b0da9be134e74d22a10c155996970039493f57592d530f54082b4d8d
-
SHA512
2603524e3d1daddd1de86b9bb29270ae6440b2a6eed4cbb6c5347b0c0fbaa00cf481b1699ba849779aad0ba1fce9d5311d49c4d1fc0c061a04370ac4ff1f3bff
-
SSDEEP
1536:CkgUiIakTqGivi+PyUnrunlY363Nj+q5VyvR0w2AzTICbbFoY/t9M/dNwIUTDmDz:CkgUiIakTqGivi+PyUnrunlY363Nj+qv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD2A6321-C229-11EE-AF10-EE5B2FF970AA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000221acc30878d0e2d2cbfc548be690dca1841fe32c6a9c37ac07a7f75438fea71000000000e8000000002000020000000dff5c7bca812a5d38a269d7a7fd7aa75b8710ae12c3155aba32ba152d73774e820000000538ca698dad918f10e9e675f3d17a97d641e443fd6659217ad052f6c8d2e61b040000000397101d3ff7c195711b21369ae8afbfa980aec07a2a06efb89e8b52c9ffcf55769dbb965cf04520831d31b28d1ea790aa125cdaba9decda089ed21a06352093d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413081344" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60054a833656da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1340 2036 iexplore.exe 28 PID 2036 wrote to memory of 1340 2036 iexplore.exe 28 PID 2036 wrote to memory of 1340 2036 iexplore.exe 28 PID 2036 wrote to memory of 1340 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ae7b064a8d899897118dfe4b7152a8d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568a06c65c757ce966fe6ef6326feb42e
SHA14a4477482eff46cc7d8402f5789b513f4bbf94fc
SHA256145ff2e70582952a2b93752b07b5ddd86b492b5ab014f25afdd04f80b0bd0a9e
SHA5121a20e14c76e632ebf014bb81749e9184a0c8796b988260cb82f59429802b61deeeedac5ce4c975efa19e4b35adebcbd1d59cf5310983edbcd249a4ac52130e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a27ec1a506709a118ba9d1699bfd2760
SHA15af64d1db806e92a294d070b63d6dd38fc86af82
SHA2560f904295c220cc20e12bd8a5caf9aaf5a55a8c9e358a7ae29519f87753dd7d8f
SHA5129dda7fec30eecab45012e462c3af41f1c5972c3c97baa08d85d42b172116d92afeb73c58bdd130cbc25409ed5bacf9c0ded7664857e27b7968d88913a9e5bda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3726457d90baa16fc833806aff19cd7
SHA142e5ce578f53ceef789ed82692ff8400344b09e9
SHA256a6498c845ac19baf98fed5f18721db49c5f7941f3ab492d2812eaad41682b89c
SHA5127310a584f58daac2391d03d2be56e9d5735f6267928474d7b95288dd4044cba33b824e81b70eab2839ab4bfe98dabde0e780b4bba78e4884dd2b63a8503cc8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559606485b4ef9c99ccd15cee3e5a6708
SHA1d0a5d912013bd90eaa90e10a54019400f607e52f
SHA256d6e8d53dc15367d16758177a266340c80ba5b3d9404be362e0e62b9b98013ad6
SHA5122bb790903ec5edde01722b22beeb9e44ab73b420617bc2afe0b38a32c882c12b0526d36b50cf75546cf13f28163b091c11d6adeb7adb74f107bd5187f01ae5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a87654e3c3fb4c300f54bbb044b6bfa6
SHA14c7493e2284039991b0f617e208169bb32a244ee
SHA256c53851f34f1784561c5f8468df313a4502b1e3cef4086294069a8ff1552f1182
SHA51216520ae90e99b12f327c2f08ececf69c2d8a8fbc0f4ab2be86f5046cbc86d5d748c7f757df022fcd9bdb6054137702722f0ce16f1976c3b30d0e408afc8084da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5372b31b0df20540a9124aac09f3c85b7
SHA16e873cabfd35a4834af15a044839d1a5c2cbcfa2
SHA256d4ccece363f6ce2b0e551e4ba53e668c6266beb97031ee7c71537ec7bd48e3ad
SHA512ee0d6af7015161364d2265def8adfb6278d21429a7830f99d12bdf1eefd98979f633404ee6092aff4a7d7945641a34fcf5ee8da73e3608751a1fde80adb56f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c309f3287c915c51ae8461e3ca4172b3
SHA1b2b8654f25d485af39950a39ee907015a3c8f405
SHA2565a5fc68cce58607ff189bbf45c301d9d1d4753459a8714e2e90cce5a383971c3
SHA512590c98808bf33c57f54cdf8d82a9af65dea132efafcfaa4832a1c5236966222dfb095ed3abe26a360065da72e5cadf719a17734302795e8be1984325caf3fa2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508dd8b834bc327107e4be9e792e69ce5
SHA17311aea811ca11a4b0129c2223e310c7297aa039
SHA25617bae2a10859a7872c8e981f9dabd441560241f27a765c61aee4e033f980ba04
SHA512bd161c4515506b9bc468ebd87c9d60e929b749c74eb62abaf16fa114dc88917bda6cf4c7c51256ee920a7deba6079de44ed7ba867bd0905b12d0c88967ecda52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f63f66569ec88cf89cd38575d1d7cdd1
SHA1e598de8f29ddcc4bb30bbab3cc283c4fdc64fabf
SHA25698b0ba4cea9c0af9ce882569438ae4bd03a701a4712418663871e97840bf90e1
SHA512e85e7163f60dac4c21cfab7b1267d62d8e5b5783ce9ecd1de1ed913ec980f373dc379acae11ac39693422f835c72f8832e27278d33070fd22b02acf44638aef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fdd763acc04fee26c2936b9391782a3
SHA1370d0f94f55c1ece4501d1cdc63e9bd21f3ec3d7
SHA2563be14b9e1dd0d0591d1095ec20b32fad3662e78aececa44303f14ba0de70ba1b
SHA5126e79903c201ec29433be0352d161a878f9d07be9761334c8181ed0eca1a8320789bdd8e6dca9bdc7c28a4a6dba546f23989cc137eb1ce0e7e556b5f97456e4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545821df0736a774c193f9a000a99e80f
SHA1d8c8d568ec308f0370347909f04d8133132d02c0
SHA256fb4ae156415508f091e4e06502823a9c6fb948cb3e47c11da67cab30717335cb
SHA512486666e295d413ce517b7f200f7a34ab1dddcaa5e26f268edc3350b0be46357cd76ecbd1948ff22c5393a81ca6bd8cb8f4763cbc47f4e14ffd2843318f08d4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525630b8cf938acc436696355cf24bb93
SHA16dd058962a747ed34d74ed24ed562c1808fabf35
SHA2565dc578c40a34cb968db56021de472a94047dddb6554cb7fd9934b353c0f53ea1
SHA512fc6e21343d9155b38e0e05404f8254badb1d319cb94578cf9df9bd549a952a2b94c562b0eed3d36bab6bc332f1d2b8a3bb122ed414bec8163991996e7519bba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549ee77c5a771b4b53cacb127d7fdc88d
SHA195af759e59bd7b376628c557a73da6034e379fe7
SHA25634418c07e27e5f18437010515ee0dcea8928a9f164e756853f25b59ffbd9fc79
SHA512479bbed043db41cd284502bc34b0cc47e63f0064711e4768fc9a1c9ff2425d87e6bae5e1bd5a17f3bf43b0756dbe438ac9e6d3b356728812704c131c16ba7a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d35267707d85324e1d04a3b07dd0caf4
SHA17d03b1fcf55d54bc24ccc401c96315c202d13e4f
SHA25620b15de30a0e76b15f48519c1af2d23ab3397678d51702b7d137fbccbf9e2a06
SHA5125d8212a8d3b3252b3a50dec5c69ed1f8aae68eeccdf9eda944dc708d3c224d0b1d2cba567f7cc10a19bef5f47dfc540b4b1e5ce021eb870807eb45e393049592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feb1b6685362c2108715a309d90da448
SHA147c8637961641aa5caad16c2d46496458e43e4f0
SHA2566ae98b791d9e7441a6e17e89430e2f8bf6e080f434bd028afaa19e20ae9dc7c6
SHA5124eb182198015e47d73a8b624b6391402e0228c6d680db55174e1b1627496bf1bbc7f712ebc70264644ff12993fdd234f2badd1f73de11e0f991942963638fec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de1c7ccd5e03254c6cb9fb2c0ed203e
SHA108c77b81c1e740aa31e95d15cbf60d92862503a0
SHA256da00cca9d4833919fae43ab9d77682436e55240e2adf06086aa138587efe43cd
SHA5122373ab5ecaaf8786d8f4d70375e36f8e69365536cf79a1407e809d60428c3da5ffda527f241fd9b38b685ab9a6745ae3405902b06916119b6e641a685b2316df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50908bbbb9117a5b21ec38d2c266d0c79
SHA15c0482d6bc206bd1bc436728bc8eaa74e8622c91
SHA256ac053338f08e5af552f4a0370616b6eddd5e4eafad4da0a83c315cfd2f77d916
SHA512a381a80b41311b995432dd1b4f6bd3462664b58739431d3f33519c2109eba17cbf44464afc5c53a68a3b3a628ab9512716c0eaf81446007c80e9e0856a280342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5bbc4fe917460b640f2b3c2aea0f55b
SHA127ed9623144477feef66ffb72e7f33e4c81bc151
SHA2561780747430870f828eb3660d5f7cf4024d7d64a74551aabcf6422ab56332b855
SHA512cdbaf05a24b0df95717354123f3784046d2b3e7665b538b8673d8ebbb37ef02518929248114ee2479e73c37a48028a5e23d4e44e4e93f117e03906b972a9c1a8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4K0WM73A\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06