Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
LOwIP7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
LOwIP7.html
Resource
win10v2004-20231215-en
General
-
Target
LOwIP7.html
-
Size
514B
-
MD5
bf0ce2dca046bdf75c84b5f21893a604
-
SHA1
dbc5038f7e2ac73a8649c05c08671a4fcaaa9add
-
SHA256
a08945edcd0af877e8d94ff1f4aa4a90ce81b5a88627dda1f001db604aba9625
-
SHA512
bd5a51ca4038fc1b95bd8425b8183acdb8bfd55ad7ecc0f74604654864c246c058bef61aa7bc213b9710a876854494b65fe127c032772633d61217e1c11854e7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e03cd16763da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414531888" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC500161-CF5A-11EE-8AED-E6629DF8543F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000d9c60e148a5995226b23ef8c961b4cdf20d7c2b7b799a558694f0723639a7c6e000000000e80000000020000200000009ae7956c8d2764d7fa407b53297a78b609de5d78b66617dfd3d96f609440af5f2000000072d015a5d35453a9a4b0806f1d908c7f4ec861b874cfa8eec9d52c426000f22b400000009589fe26b543e2fd2468bf6234628d9b2f5f1a0d4e506407b6c4d79ceddb76f2388b7b7dbf218cc450cf7a5e76ac7087cb59df00d9a1c36d5ee031035ab832e8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2772 2140 iexplore.exe 28 PID 2140 wrote to memory of 2772 2140 iexplore.exe 28 PID 2140 wrote to memory of 2772 2140 iexplore.exe 28 PID 2140 wrote to memory of 2772 2140 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LOwIP7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d01ab86fc5efc33f6650996bf6b3982c
SHA1ec07c7171bdf9a64d220bd481452de270d411079
SHA2561888662e7a782ba2ea2b9ec5c015144334366a11388ab9b96df26f9618e97675
SHA512d72239cd6e869af4a7eb59a55b33810e4242f837ff8f7ce1e5c2af4e76957d43911f7c0be404f289c15d7eb521e92991b7583fc1afefdb6cd999d0e2f92516a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec1d7b23ccb1edcd2dab2528cb27bd9
SHA1fc21d18f23761bdcc9def30f6a67a4ad53e8e26a
SHA256181be3ef657a13c569974572c1df009551b02b092afde6e12a141d9717512295
SHA5127d42770a05bc8ce9bc6e88ca2d2d9fc4328d65a0a5c96804c3b50473750fa99e80d59a2186858b144f76dbf88b9df2cb804acf70030a5accf2ab36fa40818a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a11840dfb79795fbfedb2bbc23d8586
SHA14ffcbe3b4e08480f271a3d2b5e7699c3311bf49c
SHA2564e684be4062c48f7a32a3ca3de80a45e5765d18f506bf54030335af37620e742
SHA512f7db12a8a5a7e13bb5ccbded65d2b176f5407a7ea8ba520a491adc2b7c038a7715695093e0133fa6529acaaaa61ada32887a5c39eb6975d4c3e0fa10be51eaac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52bd324296935b4da240f784d13ee95
SHA163bf997eb89d9c7be9625b4fa19795008e469217
SHA25656ca965b4eed8be2143741baca7fc893dad327c28e91dd9de49b6bdc50179e5a
SHA5126014cba15aa62a7d31f85f2d9503020dc52e637c2b2ec71fa3fb3819415704e66fe5e0bb5eac5c0adc7dcc0adf539972c06f64a26edbc76da5c83ec67b70d2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411baddec38a7b6fcaaa547afd758c9b
SHA11f6c2bb1b0b9b7a5fa86186e5a9a99646d187532
SHA256bbf596ce50338cbf4d1d267e266ad10eb46e78f38b8f2853f2aeeb25316e0cd6
SHA5127a5c2b3a0ae4f0d60905ba9025336d3973a4762114aae81c1f5b999401860cbdf30c6c960921d96a77475b194094aec58916920a0478f61d5b27b0b21764aa6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519f42b207fddb84a3072b8a3d87845a0
SHA1216dca77e9735060b0e7d8f340986942869db79b
SHA256d3f69f279951c89e4da87326213274c77cd1c3ee83f424f68b80c013051cde0f
SHA51254853da2f5f5af21575476d1370918cda89d0f54704570105e5a2dc4088705cf245e844a7b0a714cb6e3e6f7787a4bb1a71cb7ed3396537d961d60400721c650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099bde43007621d750aa01145ae729c7
SHA1bfffd8ca1786fb4a957dde843061b3b531c30e5c
SHA2569207c8599a3b86432ea06f0183f090df88110753c6c699c45e9564d2f4d601f6
SHA51278cd981ee94ee2e0b35ef0d776462c54d8281ac7397d541c829644e183171a753cf0a20b85a92e9f56b02f8ad32481fc1fd6b5a8b3c8a9210125c77e526e9e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c27ec7fcd35e546ee484b97d1717070
SHA137b0c5af2eb809ac64a521ce289b45ead3589b34
SHA256b3c6db5c764bef98ea1c6b3b00b8279b0732a3c2ca60e4e22a2b56ca764f5890
SHA512007c8667ef9adc0d0cdc89b85ed5ce15a53cbaae76ad280b2fac783cee57851d3d3e46617fe177e1e648195cdbc9fc8e616b5fc49bb5100759ccbf756954d99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d43d7060640fb4f7c04154200d647acd
SHA187007ce3ffaaf419ef4cfc7fb7eb5d6005af6d1b
SHA256f24beef621a6dae5beec800828ad4a4031e5f64d715a1c4b246aeff7af19f042
SHA5128923d670c7790cbbee0ba2fed8dcb2fd0faccd47f5f16a1c5c03d96bf22dd5fb7ffe56497682a8fd9945b1d885209137b9a27d72a1630ddae9f4d20ff3723b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55907274d06a8772306538cd90bb24fc8
SHA16845b79c6c39adc903ba0d2211eb76022407d772
SHA2568d172dc478c625b0a2231161ab5a27ab18a4c2029f34370bca7e9317e34e903c
SHA5122ae44eb4019c71f90611d6f98419dd9c166076a6c8d894b056e4f6579dabdc3e9aa7423d517b5cb0d802e1baafce2643b014a67b6493d53603d5194c5b042711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1cc0da13861f86ecbc35c48d6617772
SHA1aec32cabdccf6144592f688155b4942bc40602fd
SHA256400f4f5ba4746691203b5bec3aa7d8023b5df90b426663a22f58af581510e434
SHA512757e67d7e401f07ee2df35300144a6c8466a7195d839fe30dc7ab53a8087b9a0a87447512bab0ec3dd6aabd37ec743e731a0002ebb6600519a8f05061aa9d3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b29ebd474dd48da5951129a4a66ef3e2
SHA1a5182f822d6405e142b33c4cd0e66d0a6993ef74
SHA2569247ef0c654d4bba9a76427745a8875e1e4e2e7cd8abe6ed6534af59e1bfdf9c
SHA5125f301a7b92c46b33befef3871c4cddfc4f65116b29fd96b332c74f0c706391064bff8a50c45a66b8aba6dab0de23297206bb11d5f36ffb7a8710f0ded8c93794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dde75a40a84cd9556332478d21cd9124
SHA1646cc3d2dbf5254df07c152f99bdc5b34cf657e8
SHA2567887de54a462ed4df16d50945388573940dfb5cc4034eafa8d51c6ea394ac4e6
SHA512f0c3ddcd0aebcc117239f72a682c72b0a658b619c24258ed310225b761a51bf7ed01e786504d94680691b77eaaf1d86ccf369fc2e17063baf5c8366ae2b19ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5883f027b73ff0cb5ca6d97b459bbb9
SHA1e8132b0b85153c20a3950d679b7f4625220ea71c
SHA256f30b2474b792107ecdfe16b9ebec48d7f0259a1b14c01990973a497b46adc83b
SHA512a2f3d58f71c532f8441bc23e9d570a2df461e59d6eb52f7ca872ff54a0e4671478e7e5210b1acde768e42913d8906a91518bc75276b2f62c31a2f35966f23f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2bd8cc0613ab2bf82c9af21eac8a677
SHA1726008e0638ac76a81c49747fe57f16745855284
SHA2565ae20a2b4c2590553cb577108d06f428dea52484f110b3c6389b261bac742a1c
SHA512d9e763da0e56ac9eca5379f6b3959b2327d79029bb594eab5e4023a1501b51ab3d14805e3bd63c722de8f09b9cbdb00c9efa327e2347c72ff504f9841f1127ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4755a5f3d068b0dad991bb71e56a08c
SHA1ac14e9f7f87e4975358483b53f974eb57f8619a2
SHA256d57dc2bf77b1c95303b40d731d077e9a8559f4ecc496887ad4d6c2091eda88d3
SHA512186902c39b1b97a34a829e0e27726110cc2281ce5683b1c0db4a3263edea01328adaf451db3f613f6c948d653b1c05df23204468956b11a0728727767eab4888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a34183b120df90210751998a376d4167
SHA19ad90892ecd3ef6816a047e554a3379f81bf89c2
SHA256d8e2a9a3b126b9cae670f234dfd44a7c5b86737d0edd694f40b256074aebdda8
SHA51282a1c934aecaf05893dce8f11dacb019bfe6766176a85fff958dd38a7778f0630be8540e00e2e6d443377ee6cff322a0e0d71882b19f0744243b5211b8f6b434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e923d1cd8c20bf8985b350a1f269e25a
SHA13707b5e2a521ab990dd1ff2cb05e81e3389e59a2
SHA256ae4a8a464d43ab0da04197f6a59eacf67bce97f94aba26c11eda36faed8a99d4
SHA512c1ee13a6548888c590d968b9bc93cf6986473f25c7b3fdaeb6128c7f288074eac6116349c08ef682b0a7800422faef4ede7b6582936ab630ba9d57b94f28356a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06