Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/02/2024, 20:22
240203-y5zenahdh7 703/02/2024, 20:17
240203-y2qckshdb6 703/02/2024, 20:12
240203-yy7gpahcf3 1Analysis
-
max time kernel
25s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
XiEqhWreY-0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
XiEqhWreY-0.html
Resource
win10v2004-20231215-en
Errors
General
-
Target
XiEqhWreY-0.html
-
Size
3KB
-
MD5
eb27a311dd76d711d3b05cda0cb7b28e
-
SHA1
ba23d0979d768189a3c3639ad5a7d443733a7086
-
SHA256
c6a0dc2ab8b0115404df325a714298a4fe58871a358a2357cd1572a88134f0e1
-
SHA512
19ebe9cc766ca0b4b72d244e069eb22b9cbbe4ba77cac49b0001091d9d1348f63d4972d2da6dfc3db8c506ab5b77473bea2dd995f135a309cdbb795ee0d7f8d3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0E661F1-C2D0-11EE-BCDB-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2112 1992 iexplore.exe 28 PID 1992 wrote to memory of 2112 1992 iexplore.exe 28 PID 1992 wrote to memory of 2112 1992 iexplore.exe 28 PID 1992 wrote to memory of 2112 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\XiEqhWreY-0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1944
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf430c0f0b3bb92f2e6849015dfa281
SHA163e0083d6855e2f71731a8105cf1619ea22eee1e
SHA256614737fbc78370720461c35033c856e6375ab05fef6942b84ee75f6763227ad5
SHA5123c1e9c1029ab6198a1c8826af90da14d314e7d1d4e76f369328ff83d5ac185b027885efcd7fbd11a0a727e1a169a5bacc110c3d6f66f80cc90520181142763c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595b59f6cc1ca70f426bcf1254d37d6b4
SHA1b30eddc6496ec6d259dab94e83fbbd6de8c9b3c1
SHA2566302e4d2283727743e1ef837da7d644900288892885c30d859b4033c9e10dd89
SHA5123ab049eb96d326544752fcace5b80ea18c3aa58e34315bc53328e8408db1ee9b5c451cd6e89447e1c39be8dec76d92aa3ca6c3a65311fd4783a4a0840b3940e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ab3fbe3b17f9a86c23e90984e0eda5e
SHA1bbf007135dd089620da2d2421ce083fd71d8064b
SHA256b8896a6b907adfed080cd6934491e60a9402bd17b3f438f6a076339635b28a02
SHA512c24a5659c7acf9c22051afc3307ba76c136eb629a1e87839c6377b5f1d92e87b850ee980ce4d590e4dd61df9910b6feaa355176d2e188fc7f69cda8005eb5e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c32841abeed00f48f925c04e20fef0e4
SHA150990f7864f61016167a0cc163e57409a7ccec3c
SHA256692bf61cc53fc16d1e6b469ce3c6aa4fbf82a20816b77cc3e5a927c8b8cb8ada
SHA512a8ab71a9877a1003e20c4ba2793a68c2f2091cff152361c7fd9f3c091489934bd40d9d787dfe0d60c45804f9e42836341bf5d9ff9b71849c334f91af76862164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f91fa779549c9bfc074ebcefc49df0b4
SHA1585434faaad69a0d7d7bb45f0fc348d15ef4021c
SHA25678bf2ddc4e47a3fcd8aa3614763dc03657fd6debf6d7bebd60129431548b421e
SHA512190aa1af381dd3bb8ae6ec6a0e473c68c06c9ade3ad9287cc62674bb66296e3ae2abcad1adfdcee4e2680fe0bac47c34134d9f66e3997c7e26bcb7d3dfdd1238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5582d5ee82ba6b10b84258a79af0b5682
SHA192221e599c273822dc732910b02d1abdea7fac75
SHA256fdd6d2454d9f7499eeba928877980f5628713fa6863479b34506bc05376529a7
SHA512827d7efff925a73d3a1eec2e58449969713028c202b670297a2d5b8f412ca377d24fc528360274352cf65d3debca68911520bda1c6f231c164c73d085f9dc160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac7e33c23e8eb42f0db36e516edefa7
SHA114391b28e0f2d4a23c74a5c89f5bac2ac29a3658
SHA256ca4131deb891e8afd893fbbf144c4e502be788ef2a5ea843c99ce8009da75b8b
SHA5127091bee8d7ea231802ca80030299736de9c08d5298263c52a5267943ada038c379b221289c2e5978aa0c7a8f6fffeabc23154e394669a71bc77f1884390e4453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e388c6fed23ac6837ea79873f7e155
SHA17e6605cb88cac103d11f129afb6c0a9b626ea7bb
SHA256f52aa0e5f10c57f264d66dbeffd6441ec78b5bb01a1406733959c933db0e5695
SHA512307dc07a904c69680d65f8892b55e735b8993921018d33cdd2fbe8323b3e79130f6a2eb7dbb742c38c055bf1f561871947766fbff22f84da8bd99fb8931ebdaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502a5a4456bf05f9c1293e2956bf6470c
SHA134434976511f9fb21801dee1d51054b94d1a7f8f
SHA256a7a44116a83a1f20ab25dc1a5422578012c68d78d2971b7cfe0983faed39626f
SHA5123042fa56b520a3763be1938e9229c68a87a266e8e9ed0b317e7e8669d8e47cff68174ba3bd6b8935af5e0fd1adf59f1d214187652f746948954fef0544dd5cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5270f26a1211620818601988e5f32c69b
SHA152252792c4c01cb1f5cc36e28bce13a2f09b2a95
SHA256f2a98f0d5df340c51c916933528413eb66a863ddfad61821b57fd8778d352666
SHA51295c90f7c5a9f08f2aa7c91126319ed36a9e19f17c3a755d2925d1a0f0cfc32a3a49ebc01d1f08b91f18ad73ce3609d92310da0828feae5762e81ae18e51a8c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d317b8396b9feccfdf3d6ec17ce12f65
SHA11d7889bf63c4bf628ab4cc3682ebf1bf6ea3cba5
SHA256972ac012a2ae47784e8bb470b29271964376fb593b7127de158d2bec14ce0a21
SHA512cfbf8cbe6e599d15d431d40e0a43c84dbe71e3629eb64c54525d979c73646d479f430e95913ce38137180baf051e7d5abfcafaf721b319024a6621865ad48d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd2a2114041c7a7b4897c4f05283769b
SHA11e2c7a3939d015d61307edcb36875d4aaa6f205a
SHA2560ddc68d69de4e882b48ae8ad81fa3a852d9a55b54b51f45e4844d3fe30aa6cd0
SHA5121a433990823fae0dbac5944fa110783f0530e2c36a6b5ab597d1e8efbf7bb8b38ba6eac6708cedd2d740e1e413261804d0d7d0de359ef1d0d64bf27804621c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06