Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
8b43212406cb9da80db6c047ee406a59.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b43212406cb9da80db6c047ee406a59.html
Resource
win10v2004-20231215-en
General
-
Target
8b43212406cb9da80db6c047ee406a59.html
-
Size
4KB
-
MD5
8b43212406cb9da80db6c047ee406a59
-
SHA1
f3d8c719cb0a667e4d04fcff0f61e71b4f5574d8
-
SHA256
20737774706fc44e68c02d6b232a7b2e9a49dac75ab16a4b7427b2646f208e7f
-
SHA512
9199f300b2671db7765fdd1d8803b8f8ea3bc2966117c85950d2c3bb6973783da29bcd88ab8297ea585b3d32fa4259e955fb5794910ca0a6cf6647545a77f53b
-
SSDEEP
96:xSrZT/o1JhSJp8hGxq9if8aqaTfo2ZzyyW3aqrkkY9VErqiK:whb2x6JfhzLKa6kRBiK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40da4bfe4f56da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000000c474e334029bea24bb2ac0dd122e228243f2bcb1e640243900b7748baaed39000000000e80000000020000200000000a9d65ac9163f41f1ab2ba77b315121525b997a4be4103c83412dacb110b194a20000000fdd703872c77684e1c537d9b7ba552e0e8e34732ec583b31a39d0dab9876f3fd40000000a0f7448751189c79c31f5c57066ee3f44487c97aa4afbe040e82bf016646d47259c141f0ef3964400bd3f87e12afde74ddf6d238150a16224ca5b1c5f3de8fde iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413092289" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28FD91C1-C243-11EE-BEF5-6A53A263E8F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 624 iexplore.exe 624 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 624 wrote to memory of 2692 624 iexplore.exe 28 PID 624 wrote to memory of 2692 624 iexplore.exe 28 PID 624 wrote to memory of 2692 624 iexplore.exe 28 PID 624 wrote to memory of 2692 624 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b43212406cb9da80db6c047ee406a59.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f3d9caf258a79085f5ebc0e831506a7
SHA18475ff36fd361f3a9f0f98c02da0466645299ebf
SHA2564df3c304ccf922bed18ec7e999e8f4d632135d31e2afaabe9cef3fc72862b229
SHA512d9ada92e096a459eba71cbc1a76f48561f82ba3b548e08f2fcb197edad4107064a58adb83ba02b85d7ef8b0741007e607940f6eb0dc76bdc2b6979a0c3752692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ae64ffc6b0037fb932d4aeb0d3f4358
SHA1f21b3019995af3dd0e6707af5879e259ac0e7bc1
SHA2564965ed4cda673b6e5a48a87310f8d263da3ce4b2ecc84afb77f748dbee405566
SHA512a70821fa9f305ea67c47a148ef8c4830f2db101e6d6049cf4490a2ea747423e00e25341fbaf3bed965c6c89cbcae16b2c109f1ffb78df482149fb10bcde69291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8040b681e6c61054192dd2df594ff87
SHA1cbf642610f721e83c6a59649c55a88bab3c91321
SHA2564a0fb8389d8d57f276f71699c3ab6c58b793fe2364565464558c7ce77bebeac9
SHA512cba403959d0103f920a09b3ca30ac4d823e60a4e31265978a43f937a55c78abbd74543196ec9c53a3d1f434c338248419721c56b5620e51ca1c3ba21ba7b5d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509c7eb320957efba8e1295d6b66e6f9d
SHA1fffe636ec89683655c0dcfa629ac3e31a2fb0da6
SHA256273d611a377d9c01f07948f9bb673ef449f5e92ffb7c70049550a109f21eaf71
SHA5126e27d8c6ecf64a7d7cc7366be3ddd8caf838a2ab221d2aa4ff257a41a8a6dc541b78168c923d541db455786b80b255104feda9e8d359e70f69ca3118ea9a872a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5285e5121780d4f2ac6b1258d7353ecdf
SHA19989b1473d2361fcbe257c07ec2aca607541d425
SHA256bd5648312f53f28ad866d5458db8af76642eb6dd3274d64720903d7b8df51e0f
SHA51246599b436c92f544f497ee3ae51ff1ec8a09763d221b7c0d3b44ca5166519d73051f20cee917529c15a31f02afc126bdcdaf0ce1d0bf012a469334419fae583d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd48384fb978f351c58c411846819b02
SHA19cf72ebcd0f862a9ab0cb2c77eb6e1f972fe780f
SHA256a55f0af6bb76f79c130be6462813b2d51170f1a87bf55494108aa7426d4565aa
SHA5125542b8be9402e512318355013cd23f4295e8f0b8113533f1474aae8eeb5477f72de37b80a9483b48652d9818e98cf12959b9882d64869471cdab37cdbeb1a514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1263cf7865644e1bdbc1f58f5765153
SHA12767b53b30da30515c5f39251e5215f338efd19c
SHA256e0b477ee1806318e0496cd7db26f4e14deb93206a75f93f8800496412320da41
SHA512515f13d33c9de9dc637360982c6873ded455062f15da530c5f1e26f2e74f66cd07f45f00961e588a067cd9c79629b156c06a0920b629944f8fb3262c3e850211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b40275e8ad0a9c61d1202140246eca42
SHA17adba0936d3068b955bbbba2df0ef06905128b3c
SHA2568762a7403fcb7c7b8afd2d9a894c5a48e718e618ddd7373b2595161a74d29ee5
SHA5128cdfa48193645a2ccb934982f67e98e83e41328f67c30fc01997b4a0546791cb754371585dbbbafb45e22471a17734effc0bd55c6b4f23ca1d812e93495ce7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3b13b8dafab126bc78aa0c54d1c97c
SHA19a8d02c3e9bd7dcd8af6ca5618ea621f5176978f
SHA256d3e425f685ba7fa3b5fc0a55e387f251cca2e53d9a80b8e6dd673f000e2f9fb0
SHA51299400abecb4ad10a13f98208fd738043ccbb90476d7687663d8b168efdd7bb9cb2035f5324959a00133b9351dba414aeb6e82d6c8db38fac0d753c922e164392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532539525724e98831d8b9367ba5dfec2
SHA1268788ddfb11de49223d5aa08bc83c11cf66d588
SHA256a927c79b5288ae861af60515aef689653135cb6ce6aff7dc442c2f2b736a4561
SHA5123368365ec0a88ff0ae2822f442466efe7bc476cf311f44b88a826be3ed33d3b0484a7fe7be2d199b8a2833061ccc11fe7a8bb553daba10241d08d912d5decddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533458262d713bbe108c51577317c7316
SHA1c4dcadaae1404deee6909db6b75195e381b6ad04
SHA256428bfde6172de5ff581ad03b34cce21e6ba24bd4cbfc2349463f5a384cdadda9
SHA512aeb416572294fd79a52d737542ff9d91fc37732c7fd2bf967dd7584ec26ef051c8a9f4c84a30228ac3f3cb99a3505987040fff7dd54256801e676a32585f6d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16021bff7d4b64c5c42182414331b94
SHA159b51313bfe6d1cc3082e14c5ca5b38afc237cde
SHA256bd116f3cef72ec9e1f7b917ef4f10f1e4b490afcece127a9a96fd3a33029ba48
SHA512dd9df9c29d62b94065adcf9ad3f81894ab5bc42a70659eacc11a67a4918d94d9da4048a40f8740da9196f9078590d130133278b74f5243dd0d4f1a88b1eb4986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37baa4aa9c0242580ac61a2ea145693
SHA15d4a29e8e9f4cd54bb8a99483b0eeab63335cb9e
SHA256233dee920dbff89690d50ee1ad8fcdadb9765bb81a868e5e4e11de1d89d439a6
SHA51204168d7ecad32a6e25ad8a1f4cac76a2ba46219b88e9689a59863f3658b7e02c5d4a00ef2599c44862dd4e89d16c43e9c7730842fbf31891d1bf504d451a3770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e7c4a46cac0801329fe1d0a9d3ba175
SHA13c8cc301452bb3c4158d2421d3fddcaca9f914bf
SHA25658abae51d7a8e4b4d4f366a7f3bc52be2d6775e0c5f8fd05ce7312f2a29985c5
SHA512ecf5506995286a922dcbcdaa4e47cdd272d026b1ffba1d89e4145b5ab6130a67cbe5f1158ba3ba5d31020c1c2a230d9672eae7e031884dfd944ab8023c8d79a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d30c3349ad3f1bf7e0eefbcaf66a791
SHA1016b6e4bf0aafafcd72843f61818d0df1ba2e773
SHA256f46f669c89f35d93f16310ac9a26899eebfc9e128a6f32319c6b871315e6bd6f
SHA51270f52118f86f0bb3a966eeb2d1db1185b9f44cfc8de38db18aa5be21703208399f47566d77d847e524800260838f76e5d92564168699b8d7dc91eb4977221722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4ad937975a48e1a4ca25b54b95cf6d8
SHA10a83a64eef52d04b5f756df1e6b1c6170a11f1a0
SHA256553cee97439b3070df0cdecbca7d50fe581fa80ff46502123d2fb7277da702e9
SHA512f68f5eca745248f17a322cd3ad0ebbe7e6807414af6f09307a4a24167ee2547a5b613cf449abe67949ee3809a68ffc52feb305327745201d941e8fc40be125da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561ce314c4c78d0376c408736c587b336
SHA1d91504d0d7e92bec09b068966fe4cfbd873fddc9
SHA2563a1f22907a86bdb6b09c8e7696eaede37638b28a98422119e47b63e89699b379
SHA5123774349932682b1600ad2e0d3fc19cefe551e21ec41209823ad0c9803a9f1284da6a1189fd7b43ec2f38ec261c2c4c008f6d336dbee6440670baa6dbdaac0990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5570bab6de9a57e1090cccbbf2cf289d0
SHA15f81a496651c023075dded727f5bf3fff54a953d
SHA256c2abf41ee52c84f44966852d655f69c07ad8910850fd7504f59409bba429188c
SHA512c58cc29e64c1137c3bf79cfac5b6bd46863f14c3312b18a736d4fc996ce60eee8d02fc7fe078ff05927608e57b35d1a6fab94d6dc861b4b9763d471c5275b44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589cbaa905ca810ab10ca259e68c9dced
SHA1451d28e95cc623e8e8401edb2ade0e2903acdf8f
SHA25632e733bcc7b3a1b1adfb18c75cc1b41524ea7d02e684f41692518e75bd9aa02d
SHA5121aa2ed480d86b78119b320347abec7cfa2e99ec33b5fcfda986e94dfb351b17ad6081584c484adc154f80e31e390f0c175dd1b8b4a5858e6383e453c7b6aac27
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06