Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
9s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
database.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
database.html
Resource
win10v2004-20240220-en
General
-
Target
database.html
-
Size
315B
-
MD5
a34ac19f4afae63adc5d2f7bc970c07f
-
SHA1
a82190fc530c265aa40a045c21770d967f4767b8
-
SHA256
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
-
SHA512
42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{698E0261-D0C1-11EE-8383-46FAA8558A22} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 3004 2560 iexplore.exe 28 PID 2560 wrote to memory of 3004 2560 iexplore.exe 28 PID 2560 wrote to memory of 3004 2560 iexplore.exe 28 PID 2560 wrote to memory of 3004 2560 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\database.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d70bd165fb94848a8b7b35e38022c6e
SHA1d32e290fe15bac5c2c8414b4d7b05615cc098abe
SHA256fb681b1c138c9c9a56f870cb80c222dd81e369cd33fc52dd1b86bc6478dc7079
SHA512afb9b2b531b1bd23b49d0a29162d808fc08713fa4154294cf816bbc14b37dd30b6a3ec7f61d7c3636b84759e8a3f27a63259a3a90b2b4d9613d2917b91dcb176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e518c8655d1ffa9ea98d1da24b0f7c4
SHA1260c3a48eba68e0d1d929c0a40104a0a213260fc
SHA2565fce25b4fc17b2dfae3ad95b4663945a89f382f1ed707ff9db65cfb5c3eaa979
SHA512d7e59b6fa20128fa384459d9ca4efd26a692371af9064028e8401499c0ecabb0c315f09bcd6646598661684cb25836f86be5e33b2322bd9e570ec7f88e0396c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dba9e89e8806e405a43a5f838d74fba3
SHA1f1d2fe8af459667f63de8f58b5050170f9f97f9f
SHA2562057e6dee2a7b9b46b8dd93eee6e351598f4a39bdad39615f44eff8b5d0b7b30
SHA512a5bc001e12534767847a22f1761aa845265be5ea8f404a36d65c08a96a6fecaf5743b453afc5489182e486264f49647d85103e5ef3da814f1640cb23ff11a986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b25e16024b78084a47f49442535a25
SHA16987db9c9fb861ae1543318eaa9203ceb401186c
SHA2561a693f7ade86ca350950ea228bc6168f4481fc7c23c887a77254545b42e155af
SHA5127e5c3f3132df2ecbdae00b9f8c44055755768b7ad1872140279b531dc73392eeb5eaab1f9649187a5a9b8be3c67f7b3cfe011f2bab046e5adc6cbfcb5432dfd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5052ac358085925b1ea22afb8ea9d3564
SHA13e283b8e107b2be94a39973eceefc404751cdb67
SHA25615cc5f003703a0d462aa2cf9c667c9fc84ca8d51540f5199f2ff411ba5b43881
SHA512ef1c7207914b762ce9545cfcd0029979f2bdbec3d2b6ddf68f2a681883f1c53e102c5219b8161477d78db86d3d2cf12904c0d638010c026c49c413153e1468cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edc3aa782393ba2e6541d8fd5fecf558
SHA1a695f84f9b32df607c917e4d6776d55dc24a7ef9
SHA25601dc7774f02a027aacd918fd77b6b4fd1c4f7be892c6ad03d820450e3d6edab2
SHA5123babb4b18802aeb11af46f93018708f6ff3f3bf74a340043b3286b6018dc9e9852e52cf917ae76ea0bcbf09ecb255b232635ff7e3f7d0c6dc50760732eaa1408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afcc60972a8a14a83727bcc0e33301b5
SHA11df7531f87238482c3f4045a997e57a7fa82d039
SHA25692a70fb3579158daffd4fe6e54b9f144e0313d8e6b49dfff57da5258b9aeebad
SHA512615db8c44d8e38f81fdb302a9f4aa81296ba507a924c0e3b35961817266681ced376abe400e90f0cd4c750d19ea8a61be378860a17311031fd445865fef76931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526fb89be7cb46df2548be7ab782e9729
SHA1f362661c9915345785489bc295e5dd9f1c108864
SHA2563d3e3347324f20382ae7804992cd0c7647d608a81e32a89f78df7cb73341aac1
SHA5128fbe527dc62a3550920d03bb67e48c422f28dbb947c710e0447bbc0d1513e429fa051eb570bf4e660d4dbf39664b4bed9b45b7ad340b9c8e7b4d1b9888b54237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abef8406f17b6666315b8f5b5d17a18a
SHA1e22baa37f9e543d2635469c180b9840b5ccc08a9
SHA256d3261f86d568fe8955419bdc89767a7e57d8e3018158cfa206445c111394b249
SHA512058df2ef733f1d346b6bef3a2855a713840770924de81295f6c457da54a15fdf9433c79c06bcf4223e2e5a4475c3bcce227be8d5c07ee64ea6d9ad4a61aa5a21
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06