Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
9c2b5aca6a0f000c1286b8f3962e09aa.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c2b5aca6a0f000c1286b8f3962e09aa.html
Resource
win10v2004-20231215-en
General
-
Target
9c2b5aca6a0f000c1286b8f3962e09aa.html
-
Size
67KB
-
MD5
9c2b5aca6a0f000c1286b8f3962e09aa
-
SHA1
ba9eeb00c1e7140ac0827cb746a36bd3c5ee603f
-
SHA256
e23823de49c8d54dd4eb5b74e34449f901bed5c4e9a1f2200cac7b5b855de266
-
SHA512
60a9592def61ee3f7b720a8daa0721a3f372061d65612f8da26c42ad64ab0ccfd1d8d15de9c076516ebb19cb81373f9d833db30a6bd134fee4c88f8f8b8d241e
-
SSDEEP
1536:SPSwhzmeoXmNCwzZ2wQzRokFZWJRigGEFhH2csw:SPS/2NCbTzRzIigGQH2cF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000008b9bf138a0100996142c2aa2bb6ff090d5b74431213b89467a84c37b86b50aa1000000000e8000000002000020000000f26c011e548d8d489b7c9654113405ef82d1cad9266ea6f3c969567055273b5d2000000091a1ad3414d8ba9eacf05a2427385afbb8b5614792ad22e92af4da6da28d45a240000000dd6ff495a1ee64bebca712456ec96cb62409f561eae697f55cf760a9991db6b12b3993f4d89d5e0c5e9bb994fef99191d0bfcec6bb8f869d9016cd4365a23779 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c01f72655fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414091062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D254CA1-CB58-11EE-A7E3-F2B23B8A8DD7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2876 2772 iexplore.exe 28 PID 2772 wrote to memory of 2876 2772 iexplore.exe 28 PID 2772 wrote to memory of 2876 2772 iexplore.exe 28 PID 2772 wrote to memory of 2876 2772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9c2b5aca6a0f000c1286b8f3962e09aa.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53188caaae48b4301d0733bb760dbad98
SHA151acde68d39334a9c55d5e94d35c0db5d237376f
SHA2563c12b37b574e1d89391b9f056157e6c324e0ce8afdcc4ca92391b8b5ba540237
SHA512a16bf44341eaf1bbc66856e9a3001403b13a6ee55a09b9894b7930ea769a47189f188119e51e625603e7fb0708afe722cc6ffe95317f99c590cfa02b81a8a283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d1f5d8b286435b3ac0d4ea3c4b0a0c5
SHA14e96ed94297063eb79e708fccb57b4fded1e3ef8
SHA256806f41df00de1549f5d4dfc4f6a58a14e1d4cd76f6042961800b2dd8051da8eb
SHA5125bb8b7c69993b01f80a782a7e9f8827c3d0eac43c8dac1c9cf5d6addfd917387fc7e157f9d2f7de9f18b159c85881e3b2a5f20b73c79e003da64d05c9350d89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eb311e1afc23efaceaa5216aee56428
SHA1af286a4da6aa4af5e765c9dc4032a33db70f9605
SHA256341c02ff3938abb685173355d2533f9df2b8eb142196e12ff55429389306819e
SHA512a412ca373c8afbdfac3451de2f19a0c0f3577631c41efc1851465feecabd53496436b42a7386097894d464d82f84c4fe88690375d9553d7f0962ebc953162e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6e029a59291a82f51855c11ac7d1800
SHA1a7ae013f0095037e9fe2a3f0bd0eaa5bda1706ad
SHA256a401990ceb9bf1d36165d2f8a9947652fdb33b00602a695f2aeea3f952c524bd
SHA512f36c9dc572afdeeae657b767b2ad5d3dcc685f62f10fc7d57a9b701b16f3216f2e5d911986b441502326a86d44551f1e06361e2d303b2f12a379cfb970f05ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b2d4677b24297dfa0a7c630c73f29ba
SHA1a7c1b0fa50b6974848dd85e36cd08c0100f44c24
SHA256c4729248036a71f66e4b0cc5b4933e1be9e8d59766a254b5630372daa1d62d04
SHA512420fc5c12f624fb0baa3cc62800935d5c5ffaf3de91f5aec8e9453cc3122307c8e4b140f3c7681eb85ec1ed4c3fa38acdcb0448fb1da7bfe19ea44a33a2f6804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b8fca7aaae09d4106307373649a8985
SHA132df5dfa1004e5300226d9a46ab415968147e403
SHA256eae2d1965dde1a0802a11faf6f33789304cbedb93f6c417c1aa988edfa122c03
SHA512a947bcf41295f6b40dfbb45fcb9f6ccf101b07b37c16f0ba5e330e4160d0db7eb178596d7fa5c02254baa5b56a797f6b7c31b594f4fe755c053d4c2182a88382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531613fe65af33c8dd0eb8c1f9aed8bac
SHA1e3f532d1324fa54d2fd5f1d28ca6f192489e6a33
SHA2566f2b0cf967db1dee448e9a9997681c9b24430060398415c58a974ba5d787302b
SHA512012344ac518c12fa4593b7ce655142c097a4a9a777c906c68fd89b5f9bd74723c987e8dbc68412158b04e23349012e47e30d011476a995145f90de9fc472f304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fd9ca8493b931a14befd16393220642
SHA17207f2d4cbdc36e1da05b200fec83b39442bdfee
SHA25620a2c50f959a77178b39069e145fc4c2f08b87fd34c70ba9a8e8e3d87ac5c556
SHA5128efabe428132117e7510a5e4e06b848f06c519a4653c3da7331dfcd1db360791664f13913a896de23cd0d04e922b376605faedcaf5a667da478ca4c3e56d6a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589653fe93c9af7289a36df4be8ce659c
SHA1bcdf381bbc0099e5f3bc7f8198d248e793cf6e68
SHA25616c73eb3d3054927c4b6913eb37f43cb7a0728e39b5fd442c78777e3ee58e4d9
SHA5124f9cd993f91ca5d8ee826f39c78269e529738847b9248b9bc233e5d3a7325fb74408cedca1d9e147ae2a52f76f20343ceae2461d80a7a6821f4ea818e5dc94d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccf766237887b4edeec14c725a18ed2b
SHA1accc98e3d3a7b9d52d2bf7bd6a17e187898fdd41
SHA256293a38bd1f71e7d8d368a695f08e0b13ac247202371e295dfdeaa9f1c27f9531
SHA512c0cce91718eddae83942057c0cf389c6f6a4710c88b74b18da96ab83c154d8025336e1f67ac28f15a1955ad12a3d7dcfea87f0473828e4f5b58784889747263f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557866b059ad0fcf30bedbf1d9813e06e
SHA10af558346857b61beab18e35dfff85d936fe6095
SHA2565154738868181d1b68cb77829c055dff55d8c6bd6f010c530ff525a749cae913
SHA5122df158e72e480ea0de75a87be632468ebdfdf08ce4b01f1ee057919bf478ec605ce195ea48b5d9f208e33610e9db257c72c9e1073d95d94cda469fc2ec15d9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552b9ee54b6c3e0f70a515dd03fad4bbb
SHA116cd45a77ae347538adf8c98c0e7abbd2631949e
SHA256779976caa3cf12b230fa779ed9449167a77147e168de1876d9fcc6ecf9c86b1a
SHA512b789e8b47276fc3f33825cd33251f718bc478f187c9f97f6711f7767d483a952224a80c4c3bd34f54c59ad5d1fe727fa81cb51dc3e3dedb4f65629c45030e0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b62566a03a0ae0c25ab4066726aef4da
SHA1a51db433f3527d68e783b6a263d76c6ae47733f5
SHA256c6120c365f5236f998c14d018b6d3af74a457b8620440561b0b55883d52ef932
SHA5125f797d60cb195d52b93c41f397a5b4f3d8a64c38e1503ce8700472acd46e8f8d79b2b74b25c9ab6fba0c191f1626e2d0962e05de92a8f896fafef1bd8bcf55bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b9aa214e76424307d4419bdc21cecdc
SHA1d02ed311ca69412ca4972c3ce5c6ceb896e5e4ec
SHA256908aae86de9ab65cb73ce7ea510e9068a6dcec5efc44144589f3d9d2c990d62a
SHA5125179eb7aed50586252109b9af7d8dc98c84190520ac841d04a4c197b8593f85d4875392d2004f9eb426ecb5ad326ba1c1b7458f8d14966052d66c00b21f2f365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595f497db5067b7c7d1dfcb017d513581
SHA1cbebce0e8b84a1b762c3c46ffad62578328649ba
SHA2561c9867a465dbf8b4689f6d3efefe0d48388662cbe935cb6ce05e3cc2ac015545
SHA512fb793ad19fde99d8e918c2450e9514a877f03ff365fad01a235f39779e9e3ef0742d3c563d4650a0f4bcfea754b152d88e614a5744418ac4680c2944d488ec6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd676114025c974eeb98b9bb65501b0d
SHA146dd3bce42cbf08ab622e02d1a5b031f85ae6944
SHA256759e4c51187a8a13aa5a62640f4adf6db483ee32ec06593a9ee126381611689d
SHA512e29b6e74de98026408c575bf9a7c7e832e1dcc110814c481de5dc5a0f64ca2090c3f81b69cb06dcf63ebe40f1432c773b5551cf78d63c11ad5b4dcf61cb56a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c445b57328980284df5a9dc843389ab8
SHA1d71d3237feaed99a501061090b327987c96c4261
SHA256075eeda9fd140d1aa5aa39173553da485e951d2ea183db9adf08e161bd47fac7
SHA512323361ed327d8f7a3d63bf81243512c75e29a725b0b62fa66d9ab40f5032533b4873ca1bb50b8c4268f85e6b3f6f79e9b9045977c758333ad397d19423446635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558ae27dc6d0935d1f595aeba5a8517eb
SHA1077ead76d3f6e16c3f4e62499bac721008dc1b93
SHA256b4de962496f0f48a913ad33715f4b8b6ce898e16c1566172cb962bec217005bb
SHA512c78c6aa49ddb5f85f00be372e5bd692334c6dad68708a5577f9e54513227ba893df93c2bc607864e0dc262b335b7ff64ba62bbdb0cf547a1ce0d77122113e4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8b20d61b5934603ff9e2ef9e4ce2cc6
SHA19389dc5ef7e1cc6b99dd77b6b1481addcbcbc61d
SHA2565ac9aca20ec118eb411bc52be64124e2dc0a101964ce5016bb200c355e8f2906
SHA51272ae80246c895f0edb119d6deb507748ede16970907332985d290d989c1c5c0c5a5c3ea6506118feba18017d6a36d7b5496377a64f6607b11d7f330273a51802
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06