Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
8f6099676ba733975ec7a73eb33721e9.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8f6099676ba733975ec7a73eb33721e9.html
Resource
win10v2004-20231215-en
General
-
Target
8f6099676ba733975ec7a73eb33721e9.html
-
Size
11KB
-
MD5
8f6099676ba733975ec7a73eb33721e9
-
SHA1
436c56f8876b0ae6efccaf893757e2438b0f7ada
-
SHA256
e8e81ce8a36014dcd48f7c0512910fe8d73468f8b05a09a6724851fbbb1cbb47
-
SHA512
c9364b3936f6bc1e908b8e01d735f8fcec304261d8ed87db00b5b8ee70193685e3171ff82ce205c70a25764861f7c208e056e6aae7ea3c847157488cd235c11f
-
SSDEEP
192:2ValIsr0r57M4VxaYT8IP/w1whqJkR1y5uBuLbdU8d:salIcIQ4VxayP/gGy5guLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5CF32A1-C368-11EE-8951-5E4183A8FC47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413218474" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 948 iexplore.exe 948 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 948 wrote to memory of 2164 948 iexplore.exe 28 PID 948 wrote to memory of 2164 948 iexplore.exe 28 PID 948 wrote to memory of 2164 948 iexplore.exe 28 PID 948 wrote to memory of 2164 948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f6099676ba733975ec7a73eb33721e9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD563d3a15f9dd1f12b6f9f6ba7f30845c0
SHA1251253c0027fcb332324753555c09cfd69e20748
SHA2561e05813f77bd11e4b2e77da7f3f106aeee0f7f9720cbcedbf03db13991c7dbd8
SHA5125e4ebec29db627dcaaf5fec3b6ca277a7a6ad4dc179162634675dd25778522ff7ab8c095e68cb94f36e2dbf96ea31af2ec22f77dc944747f75fb1d0dcc3feaa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da57633f6b4457ba7d77af276a30973
SHA12a1d34a3eba6c71872a7320c17a91996220ead34
SHA256ab9fa851787a6f73419e11d20d02800bcf942cda698d6a51df8b3603d948e17f
SHA51251c92a044dbf2834157f4971c2255b836e081c8621f1193418cefd84a1f5b2e1efb2fcd1d03f3629a3754811202b9d3a4f902711ce77fb6c00152a3cf78f9528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d17b18e9fccf1d4dbdd9684e05c1bb3e
SHA1a42fdddd8d52c63a14f7d78fed9d54dc716ab36e
SHA256fa6459ace4322ed98c77d9fe6be60abcef2ed6119b8052f751491739088e9467
SHA512db5c24641f829f8d004e6aad92bbc79ba1c792b0ba2439f4f7757077afea04f318da48dcc18263fd8be4e15722f82d91cd1f986eae738e53fb2b6b756566dfc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ecfab2d59506cb35f40b93c7911290a
SHA10ac36639a09b08758971ff5c8a6011f023293e89
SHA256b1238a5030e81784d5e5cf702122f763eaa42daa795b1077a467284875ce9133
SHA5127e642458bf0a080522f823724eaf47981db738b5b09c90ac5989e5036e66221386d8e6264c1ed73767c9ab38995c87ad67d6c8cf38a9d9e30ab133f981e76b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57144f48dd2709e5333a0c5d953fcd7be
SHA1ade7b9e3dc3e063cf544125f7f6831d02db123c4
SHA2562b2777415f3632801426c9f599a82f9ded9de4d205dedb6cf5115a5709aa9552
SHA512002e1556e053409cb64afe194772a96498f4a59d333cb0f9fad3f2e9ade25a4ac6cc250cda77f3451b261550c0939bb8859609c6168f1fc550e753e535fd9c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ce18a992d94b68f456bb48eb18a11d
SHA147e4ef4ac09bb57a387684baf3ab430113caf504
SHA2568bb7cd086f3e53c35254d3e354faa42ff74b37fbe7355b005ae1971b47296652
SHA5129aa738493d82cf7e517d0ea0dff2672aae65bde07452c0c7c03c8e36fa951087f267a426cf544a310ad4636ac194aeb850bafe6dadf3fffb9cfa8b383daf05d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db4fc43e6951eb223e6f658751bbc3dd
SHA1bb2dbea3514a65f006a66acf7dc3e6f7a8597a0c
SHA2561ad50ac66d0c43ee3d770f8578d9f1120380b6530a268b882de29e339a82b088
SHA512ca60f624d0c174508a338160a49b42222a68e6d1af483ed2009f505ab4b1056ccde598135f67e2ab3878e008d291706a6a08e2692b785678e9bfc8ab0a26ea39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56348be41fc88a0e550bd8a5330cbdb8d
SHA1ecd6ea5690f28c6b3e0ab0b82cd6f333fa9fc98e
SHA2563127cf7ab4c1fe6fa707ab30345355eee0671f4ffa35e44730a391f31db6f929
SHA512851535b2a7d03eebc38ca046e12c9604037729bee751d30fef304beb38c89f6fd3bf8a3b0f12cbb415c8de7b9bed3db51992023a3ed3be28c827d9e77733e32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52207d16b27b561ed95bba8c31a907ba5
SHA18652986c5c4ee211ce36116c0bcfb2e7c6430bd7
SHA2568496a7f0408c8f43145fec2798c53a0a2c2a29caf3fa8c40b738611957a4d278
SHA512acba65b717e5d0ea6eeb441829119a04ecfbc1bcc76e238e35a1df7b931ffa32f25bac4cbc2bdf1ccb6daea05e045cbfb39bb73fee68b59a8a23dd63df95207a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5df02b5d15b2514fe01e2da70261ff
SHA1b6a9c3007ceb8e0fd865da3115426a7926d1467d
SHA256cb18b388c7dceb25f6db62f177c63270dfb68073e29822a7f4eb42f4da648b85
SHA512ba8b462342addb5d4ae6c292a87a5962fc69937edbe0359bd44211965cf2915e152033d905666ff6aee76d3d6682fb3ad98d48feba44bc64348fdc1b065cdc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD573240079c1634d3875578d8862fd5036
SHA199349280f7015a74b507d042c8873e66fde7766c
SHA256f3055c02ea2e14fe2f5a0228707bd4d955b7e7b6d98227e90d9ab2d7358ee13e
SHA512a1c59ff69e4557b50686470563d297e2d0b38e2baec151c6f9b0dec98acf71f0d16c196383384adcef91dd7aba482504b68fa6e4a5308e18ee9a41f2e4a0b305
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06