Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
a0d08ead44b68ab22b48f6cc34aa04c3.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a0d08ead44b68ab22b48f6cc34aa04c3.html
Resource
win10v2004-20240221-en
General
-
Target
a0d08ead44b68ab22b48f6cc34aa04c3.html
-
Size
11KB
-
MD5
a0d08ead44b68ab22b48f6cc34aa04c3
-
SHA1
e1fe5920206ac52924a954ea4cfd0397354439e5
-
SHA256
e0dc923cc5fecf05ebd777a7b5f0bbb754aeaab6254bdfab7690e9af6f03cc96
-
SHA512
39081dc940c59228d5921473f6d5175ebd84b6ebe4fb2f7038f9280feee2091f54d874fb94897d3a40e137b907c51b49924b78e7ea11b88f68caed9b0f35d00a
-
SSDEEP
192:2VMlIsr03Bi8k/w1wvqyOBm9nUv+EXg01pgOXuBuLbdU8d:sMlIcuBq/gcOBm9nUv+EXg0pgOXguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A627E481-D2C3-11EE-9A4D-7A846B3196C4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ba6fb5d066da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414906692" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000ab45a5de1e1de9d67ab644c7b4f06510030e8ec741c434c0fcfcb4c6cc51e7b4000000000e800000000200002000000030aff4d8f6ee3345586b34d9d4607133b664d118eb79f01be51d4e44f477464020000000365a3318b470e8a7a0e3540462b24b19dc41861460f1698e15a8e8567b7b5b654000000075fc4be9b28c0745b79ddbfd7b1e6043251741e418794cbd4cbce249164905b05843ef5da561bca89a23fd3b20427ad414bfda7ebfb6a06cac11904aa6271ad0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2480 2276 iexplore.exe 28 PID 2276 wrote to memory of 2480 2276 iexplore.exe 28 PID 2276 wrote to memory of 2480 2276 iexplore.exe 28 PID 2276 wrote to memory of 2480 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0d08ead44b68ab22b48f6cc34aa04c3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aac56aeb1c568980168b291025faf47
SHA12e6ae80b12e9e8ad5bf13246c7a28ca2ca30094b
SHA25620bb164ba1ffa03a7bad1b1b7eb70275fb3e03ca7b8709b0127036459b1b03bc
SHA5123b52d2ca2b689c9dd37b1abb45a0b942bc0c20de73ba9a627c877faf4f91dc108c7e505636f936eb28216a4757b666a98cba8e3593cca8f47a299bea1b699d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9b3fc06912870ac70bcd2d41219d285
SHA166c103bde487703fc3b8568ecf3bcc3b91403b8f
SHA256a1996e47c308515a64c509af9010471aa56ca09f61e70fd8e79e8b302a149f93
SHA512039e984433b2acbb362cc07cd68a7b43914f90a2e689cb2597b66f9814fec0176afdb74ecf7764ae201540c8b95e3ef44979b8ecb2d6fd1094fd72067adc8dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5119c5e2e9787449364c69277cef4df75
SHA1eb4ffaab546b842b6f16902d45396bf0ae695d1e
SHA256d840686d20c50f12d39cef7a9be621ebb7b8e8725280b0be374d63731deb7ba4
SHA5128652cc2d07ffb267a39b0ad3511010ca5993f247dfa69daf409af7700355f0c45bde6bea0374faa0b7cfe8fbeec0c41c91c944d9c91b4c0bef07c01915a99eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90731024c5987d121ee9d0f43559eae
SHA133551c4ebcb9cc49df277b7f8a3d9b4e731b1672
SHA25619d26385037131d9b6ce0d87b4a5656afce5f61ca28fbc3568e9db64ae100db2
SHA512ad31da6f5d6203241e0b19cadf08205a18fb59277a4970d6ad31670791659a5d5a42a3195fbb06044bfea9b118b3cd5a55b99fe9a6755460a9a6779b96131048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638c1e78700360c3e01d87920b51d7e8
SHA145e0e2f45c19b530755cfce11b096df099c53b17
SHA256a5a8ff58cbe51c4fec8bf9b77964f52c46a67b5930303655909dde64d40d1e10
SHA51276eec86d00273854b60bf1e9b43b15df744f98eaaef5022028e685f6fa669d28b08531d3ae100d1a2c7c3488669f6f4e3d476c39634f0351b4ae3430d641cb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525b04dcb37219aa92f4febb4c7e2f8ce
SHA1ae94e8d5a9d66aa979c947971be8f31d731e353d
SHA256484910806fafd2d1297fe6b92d9377cbfbce5ca594ff2ab1d13f979497fadffc
SHA512cc5b75a02b863d97eb6b896aa5a62fdf2bf6aefe27fd343c683a7fa6156a49331d99ce916c6aa7658e09972ed62d7af67576bd2a1707f9ee3ec0f858574dab8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e34d4c92b23d864055f24008bdc0d00
SHA19ac9918f65ff2d5cf44416bc02f2909956e36077
SHA2562bb2d3c5c7666e5c7df103c6bfd7e83f2fee4d73d06c75fe38df277c412ab439
SHA512edcc0635ce84c5c4f2e8f50a9f0a5d50b47f93474828586a3eeee1e59dca79ba9baae3ff8c5f8ca7d08d9378c25c8b86607f161ac57a1112f351d3d510614a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba89e6c28d64b60e9f79640fc3c32904
SHA190d7e46f3a4686304caeec8c41ed8a00cadc2c01
SHA2562e535ed6bdf076705f636df81fc863d68a5542c26c02343cc2684f2a5978d355
SHA5121fefe59c7213b5bcd0618c6acfa403e14a3cef4deb024e7dca588b63943b2c982a52a32fd65f3dbc1ed8a53a4a9bab4df72252f983bde2f02db19bffa4ac2499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096ed0fd5d7adddcf99115c73e7fb824
SHA1066643c93185720ee089b07305cc5073ef4ebc21
SHA256be689626945f957e8ee41d9acec842c24de1ab9bb0f2ad610c581c3166755f3e
SHA5129ed0095f421cc001fc3039e4641bbc25f497887af8b89759718662a02dea3080d9f551664aaea6d5c56172236c0addafe25903338ad590d61caa323c182c37d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5572d5e6b32811ecd6a71b47115ae5129
SHA1bfaa8272b6acbbac445f9f171cf8abc802fa398c
SHA25602f4a1f90fc14dd7a9482fe883efefafc00af3f60d2140706b592cdd86558c9a
SHA51282994c51fb0abb5e4e77181b189d18818349b0dbfe147d5ddde59f635d490d1bab4bb3f3b12aa76e7fddc38d7c26b26273a5e839932d06211b6838f7ae9f3040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc331813a2b942f13946f190e83634d3
SHA16d0d85b63cd42c7db4a3bc3afe7875153c699f9c
SHA256aa8278156d0122ee88ff4b57dcbf26f99b1a997fb7c179ba84cad2f773cd96cb
SHA512a4b2cbb0e5223527f78404449ef951c1ae57f7f0b95088a399c6bf2069d11e1fb68302118a8f253bc312fd50c122f32efc6da790738716467d13b59dc200ba90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5729988757ad8233c388df5d4ad5df1d1
SHA1d6fdcfe9302e0c3b288f5ccd337174a1326c52ce
SHA256ffefe6e546ebd5ea48bf73707e04d2c5d76e82e81fd14d28536823250b7cdcc8
SHA51288fc95eb9c544ac343253583721e34a5e1085c4807e15989864fcb89c8919b6bcc629c704cbe5ca6fa266c5f3fbc8ce7e3f01c15ed1fdc68d4a5ccb59b4a3559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531786da2024a9f8bf93b9c77eb8e31fd
SHA13a01cc4f24efb69452fb142253091dd46d1e9bb4
SHA256601d54878a9ec23759c73c4e35a539e878a8a2d15c24c875dc243e3d843bb074
SHA5129731cae9c53d4bf0a030ab2d275d25304518e96ed77f4056d6c5f439b4653aaf0cb3a198c4d0eb2a2d0bc7a435dfe354805884ef42453851b4171fd5517d537d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb8d4d57d453d75ed0c049056f3babd
SHA13c01aa04e316e80f7c07a3ad1a68593ee7f1da28
SHA2569c2c862dc47aacf7723c5f89d2acac612bc6e2e6777dfaa38db576f028a22c30
SHA51219b228edc9fb07d56cfc47159cdeb5938032a43a7862d073d5e491f2b29d11f202e11e371f9d3ea67d6feb5bfcd00558b2e6144be74eec8a8475bba9f2f526c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9bf32ce8f1ebfdaa1afa7b957a4c28e
SHA16675e8780864ddce7a2199d065dd0201acde81a2
SHA2561cad6102c8446651bf9b43e9deccd410e68779dae53a9c11d24bae914138c230
SHA512ad8a0498156f022abbab97f1ac6943480e84263933181e754b3b9aa717db193158249f3a01101858c3a0e6e7d4862d9bcde7dd9ee74e2f04e7c1e674f62b4f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5415a7d8b0331a67d554313d0bb749f2c
SHA15a2c6f4fcdc22081861651c9378144d9dea04c67
SHA256e76007d8a385d4e82fd829eee6cfd25bb7653c8411dcae22c661a6ad1058ba64
SHA512bb5a3e52cfd6f452eaafe1b0e53cdc183f7ac8d3d11d7eaac3de10415c74c3db069796c8085060874b7710e93253f5cce08e025c6c8bd34d384188f254e57e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faa3a7021f6432cc948c87f4dddbd843
SHA17e26b1b253af04dad83cd3f550583b4212c5fd51
SHA2561f39c47f92e6a30cd445159f4d80e8c2f48f4f05c936cb8274babf668ac6f77c
SHA512e72f39fb985477402b3a2e67774066232c112265dc920c8ec7cfd3ae3d63e605f39275c8c33e557d7e045d8c42b38adcd96a3af4153b118834748fe86a942f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cf4793a38515020a8675599dbf92828
SHA1c534b3df4e57eb30df26fe0d6769751c061dd0d7
SHA256e55bee3c4dde68554c4e61ef743c96ad0eb7eda6dfbd0822e4d1436aa6711567
SHA512cba5d442d84a851e2916ef0ffab8a1aab85128abca402d72dc287b962d2eb4589eb59d948ed62784b93c41c9ea6c5839043e0eda55ef54b63b1b3ec9fb376db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ea556b05cfbc688b8efc0dffc968859
SHA1982a2b8435999cddf023c95388dcb9ecce2f39a6
SHA25628609fe802fd93a0dfd33421bdcfab8d0914f0614232785578f4f64a61336ac9
SHA51285dc1884520f69b3521dba40d895349e1cc92a4692322f1d1e4b325a1fd8f0abfb190c20e2c497362bc9d1a926b463a7f3b7f4b139ff5453f97e001df9ae11f1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06