Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
redirect.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
redirect.html
Resource
win10v2004-20240220-en
General
-
Target
redirect.html
-
Size
6KB
-
MD5
c45404e62b8dec4694e816a8ff46e998
-
SHA1
eae11c2d5ef1b1cff29dfe9db723c9181167197d
-
SHA256
0cb40db63bb31ddcb02354f16f9bc3bc7551926dcc62be94bedc2cbd1a9e3c1d
-
SHA512
065119397d9a09b646be637ca843bafd108ced90d16b8b77b60f14730e154f4ccdaefea177b56f315ecc7e188ed159f1cef23a8239c5a3b089f0a5ca97f0d43e
-
SSDEEP
192:duHLxX7777/77QF7EyrY0Lod4BYCIpHOfX4:dur5HYc0+CIpHOfX4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2EB849F1-CFF6-11EE-BE47-DECE4B73D784} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409cdc030364da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414598543" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000507797b53ced7e63dd16e25aadfe3cc7367c420106786ef4c64303bf4af1e331000000000e800000000200002000000057da8319c30dba2c1ad5ad3ac3d08569168ab0c9631c189b0392594912bf2be12000000093c9abe491fb0e9d35c7cc7f27300af059867391721634b953824f31a8bc34db40000000a1835ab1d200790bb838a3f0829f6977e4126254c8dfaae8bc8fc2879a9e9d0646449a130312ced028d65aafba9a67d155cb656bd265ee1684cbe840bb4586b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1364 iexplore.exe 1364 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2744 1364 iexplore.exe 28 PID 1364 wrote to memory of 2744 1364 iexplore.exe 28 PID 1364 wrote to memory of 2744 1364 iexplore.exe 28 PID 1364 wrote to memory of 2744 1364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\redirect.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2fe20914a0b3822d930c821466c5c51
SHA1325bc8606398d1cb49cd0bc7430d99f94c4dc106
SHA256ec4a1794145804580d0f2801d0453b27e11cad683362ba156860620e004909eb
SHA5121dfb99409f56f4ed764cb0dee21054533a8e750037450343cab2d85b4de94e1503f19395b2ad7b9fb5fa36081780a55aa156e6aaa728b48daae81e99f58a57f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c005651f5fde149621fe4db9c198bdf5
SHA1511e41ecf90c9343b827711edeb2abef65b2e53a
SHA2564841ad330a170669df6854eb393cbb62345e283e6e848d8080de8f5a108834f2
SHA512126295fbe4b50533933a334e5f8083798c8e1f779b569eba9fda7c710b3e544ada489f513bbaf516209bec4cccaa71afda12956c4fe0b4f9dfd22e29429ca27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548859a492e549b607c707f3601e4c270
SHA133908c26b15286f7044ecc99d000d6a7dffb1cf8
SHA256973da6ef39a505b11e86cefc75e0875e5a346a5deb71b9ff26831c7ec3b1d95a
SHA512bbb5725713459703ee59aeeac8a4538ba1b0a709b19d77ea6a3aeeda061a4ac81c51f3e576b9fd76b03de09438fa5c6808e7633026a4daff2f7ca36c50825828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5148d5879a22b1c86d961789704c1bd21
SHA1d172fd92148a6c4197c649c626b739a86e033fae
SHA25675f72052afd6ea32676f23c0b8e23fbb115958d5661c2d064329b5c3b1804c5d
SHA512664ba9e0169faf4dd2256d35dab182a2c1fe191a4602c35b6312006c0b503645db1d308e70ff59093a17182ba5690d8fe05b40b56afbb38897db91c8c778142c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dfdedef48655a86b4c178cbbb88164c
SHA152efe5ebe90602dd96ce54a0d8edc5a9f12b1832
SHA2564db0ea37163db21c3b23668af186eb1c3c57bd5f890ff26fd209726a2b0133de
SHA512c33f99715646121b669b8db343e0b8bed913d14466eb5733d1f04fc085cb5871e14f03f572e459ef61a1e238a5bbbb2fbcbc89e9303408770437c9ea410ec755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab85c29568c2b0c5339438644dc077ea
SHA1495d4aa7f30fa548090966c22e6fb792306500b5
SHA256011123987b8b55d9d1ae4fc41ed0abbe910affe36315b8bedcc50be09cc9bc1f
SHA51251ef87a5d225172672c3aac73c6941667ce4d71585ff9002ba8cd8703c74c37d1739813331452c4bb7de3a9de8f2efd22b983e1974c1182372553547a8afa064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad483703e319202dc007bd465857fea1
SHA1361da35394310fd4b16ed70d45f1b7a96422fde0
SHA2561a8510c51e9e16126bee473930708642264eecdb79cefb9fc928fc4ffdc591bd
SHA51259fb09d07026d8da665cb4212b3bba0b3824d1af4db578197668733fa9310fd736699105fec846a17f53e33c2cc48abe41e01294c96784ed1945ed2b16ffaec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d5ea83356b0120d01e06451db8c7a52
SHA15afd2a5eaefb4aa7f4cdb44d4c60a218c851116a
SHA25678cd2f9334326267f90645679f1e9a64aa6a2d9c2cfb92a744512e6d9f467fa4
SHA512e71184288e162d84d63aaf3089f9131a7eda26c5e93c4e17a39b37883108c7a1fda0229adcd9ddb974c2f5444de4200d91ee43a41e50d2c0da32a793b4ee51d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565942cbaf9860e836fe5b7541d288acd
SHA1c0c24ff1557e4abe893d127e685799926150faa9
SHA25635447c3b9cae5134a8505eae4b8506aaaae0d1d0d883ae033dc93ef362d8aaa1
SHA5120ec7e5dbb8f8bb53630660731af82ae2ed5bd7379cc933fccb252be3de8ae2b080900d20ad9a037f9b7fb4859632fd5f37a48f556672cbac52881416f3ad785f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a84e505ae3877d9e30ae3118244fb949
SHA166c10037c9376ebbfcf87ab9ebc4377c896c39e3
SHA256a30a1985d3eb0f12ae8d34cac8126bd3a19050e3c3c448656b3ed159532ca7fd
SHA5125cd33c4e848dde786d9c81377b1b4cc37bf37f5756f60c96cd2b8cf21a92ee1daed0a49dda602524a75a45c5db6398de910c801051b610e56bb47d0f71c32242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c76f7ddf1aa75cdecdbd15477af05967
SHA18dc4fe974d6d92d3aa0e1ff8322e5d2bc543a52a
SHA256c4fab142b0efd9125875bc4738788c0f8b0d28f4b18b8a1c8adc023a45478cb0
SHA512507ccdc938c9dedf4f731bd142707c52a3b42451de61fbe0f269cc5370b605c800dbaf97b0285aa2192cf402ed7f4c870394e64e67fd35ae47328d01843a00a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c946b056c6517b81211e4bda68d1d5f0
SHA1f7ded1a56aadee081ef6385b081f39235d48a8c0
SHA2562d59d1c9b148449d371f517b7fbd6733a9dab849ffe2c3ee70e7ee39be21b156
SHA51233922e00519fa1b4cacfb4e32e5d0bd26258b0b5920a176ffee1bc61cced21d5f61828d07ba518cd51c00d473b13a819b460a3fb272a45c25537cbfa05b9e7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e163d76dfc9f8beb39136c9e40735ec2
SHA1e63bab3ea6f4f389b6ee39b28242b53e3f71f167
SHA256216c82e9a23f1cd80139f43b3917eb14d9ca58a6f786549195f589ba10389a42
SHA512f95ad21254feca87cd9fe226344d157351fe552db0d68a0bbbfe2d05868a395cd0d92c9c279d79f0a40220057e2d1c1342f37d7d72c01d8b2d59661374d52c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2524e4f32371c2b8fd424ee299322d3
SHA18aedaef61e817f5ab03f1a3544b9b01a6cca8d2e
SHA256a349351425cf0aa5577beb92a42089a6a74eafc9c1739320d24166ec5101ba1b
SHA51289deab718f48e26ef1a5c1ab70a257698376e2f47528f66f0e1f0c8684f2d5d13ef3316c80a05f2d2428b9101b71ce8722ee5932130c003d26edaef3cc1c9720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c59b3b2e7be79ddbc7120f92613a810
SHA1fce11ab93621e4b282089a707200049aabded63c
SHA25696098e400c9dd9c7728e49cdb6d17a2307ae38bdb2e10c64477a5bcd417f443d
SHA512359a1e30456652ac0793184389d45ea5c3af8f2ca69e925cc56c52b7a4b983cc5ee9a1ad9c7f909f646b5853e55710681d8a0004dae6c72396d83b4e260a3342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5786caf6b6fec131e72ac314775b82355
SHA106fbe5031a3c1fbd9907a745ff92c49ae011dbc4
SHA256560f441916b49ee289a2ed5967409582c431b082ed8189e0823721d7dc995705
SHA51209ec8a1248171dce4bd505e38ad9a2f7f61d0aff27733a472200746f78c2d37ffd9b231b2986a058ab1e14853ce008f67d8603a08e087cdf9098640616590080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5330661b95c951d8b0f15d63da460a705
SHA1fe0ab8ec2135bb0f3cdb57c7a0fc67c2636f40e0
SHA2567596b4b9df97ab58d0994ab833c45c34c3e71cc0793236a93ba94d3420baf7ee
SHA5129ba7026a7a33dd3080fec4dd86cd51767ef74955e357c35a8011dc3cc3ac5661aabac1edd37790278a0d83c3524083aa652c392cad895354cba5c05b014733c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ddc230e342d36dc21aec42810366e74
SHA1d0614b950fafd79cea73eef976a0bcccd32d66b6
SHA2564675e4cbca3f99be2b742320298437efe40e37a3509f0ede05d7b2eb0beef080
SHA5120a54e814e47b984d7708a9a0d13bd8013a67e97bea1bded0aefcd1b3daf85ebcbd59bd7d69230878bad20610ef689d14b9ac6d3c917dce0a10bac6a3c1faed89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532b692f23c7e6154f1e123b1f1acb2e4
SHA115f6b916219fc1868867f2fbaf53dc1646a335bb
SHA25600471d1bc2c04c548cfaa047d75ebc2b4a35951771715e7d4305fee587277657
SHA5127664092fd28839c423f853c967ebf97507e219c9ba61e16c734b99dc85cf558ecc21db4777872e543e26ef80e3775ed481b311ea2ae606a83f25e94e23a93f5d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06