Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
a37aea16ed63675d62303869e094a780.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a37aea16ed63675d62303869e094a780.html
Resource
win10v2004-20240221-en
General
-
Target
a37aea16ed63675d62303869e094a780.html
-
Size
12KB
-
MD5
a37aea16ed63675d62303869e094a780
-
SHA1
bc558f9a42a2a2abbc192e74afb3f011a624d3c2
-
SHA256
14dbbe529a72e61f781e47cd3404d353df4d7644bec9ffccb1e3fcaaf7070312
-
SHA512
d2c9f81ae09335488fd1423d7cd399ae548d0edec646fa255fabd2468058de0ac89db3215353e7a441f2cb294123c3675c53d26fd88f97cbf48232d14dc29b39
-
SSDEEP
384:xy1R1QREDBeVliOfwvU2ee7Io48KXwRGY35kCPRrMO77OM0TCtxYLuZ4mXYHbw9J:xy1R1DeVUOIcz+Io4QV77OnBK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05f9e39d067da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415016534" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6514E641-D3C3-11EE-A7F1-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000007638099dbfcaea6655ba9f6e4300209a03ccf71c851e9eab944ead2ba497911c000000000e8000000002000020000000fd862fdea9227b70b29e615342682970714d64020c19a1598f50f8373b3d556020000000e01c0adbc7e3a0d180f239a0f3a5bab2dc6930087378f089b8a1a23da0a5ca4b40000000fae772b15111ec0a4efb88b8f853488be0a85b2c7ec9d43af6d01ad6ae72542d0b3ee645dc0c85f71f11ac697442ca4b01f70b4f059833e4f1ab91a7787d6505 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3020 2372 iexplore.exe 28 PID 2372 wrote to memory of 3020 2372 iexplore.exe 28 PID 2372 wrote to memory of 3020 2372 iexplore.exe 28 PID 2372 wrote to memory of 3020 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a37aea16ed63675d62303869e094a780.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5640dd6f09ceb9ab20e30883d35fbd4c5
SHA1a3cc276060ee9c2988515bbc26f773c1f78a0b47
SHA256939d33d7929b5df3ff476c3ad00a7cc2c2b790d4da305850dc8d93b0ab2d57c9
SHA51232e10ac287a8b1fd676354c9979fa751ca9bdbed550c680dc4b27f1cc64bcea6305c88fdeedf25c22689c349b66fea37532a961df5057d31584e4b22fad538af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a2897a1b95d953c723766023640fca
SHA14d2a3ffce9c48db5bd28ad44c0d1ae4477149049
SHA256d6bb2b78dbe30d5ea1fc64b88e7f07477d3e14bbd1e2523ac43d5fe6c39f2a49
SHA5121d81cf9e57a91e95bbb00a53e0404ffdcebd0d34bf47ec5ded5268166ed7f02c3b9caeb31cacd4c5336c4d058589a9c5adc2d94a90e299403288df547ea055af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490dde2581d524f8ddc42e92a5c6f817
SHA1666c13c9520990b127dfd603dbaf0fc4596f691f
SHA256e49de2c72c3b85f383f270bd653f12645663ba013912b1e1d9d345c1b079d779
SHA51234a30f3e6897a930c8b5ab7c427243ebce9643cbedc36ad337c0c139be725e9da560a7e7c2279153d22bde8199d0bf07a9fc55c97c93e8f88cfba25bd61649eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e36c2b3533d0488062a55e763d63797c
SHA11128bdaebf488af6311016a3bb04b4b9b7b77d23
SHA256b47dfbeebb5fb90dc95b47e3c1825fa7a5731c64293ad7ffcb9d958da61080f4
SHA51226a3ce244f7ca0609a394fba602b3406b880b71cedfda8a0723e4cbd9876be8fde9913688a62d0c2bc717c2a8b9c4f05c5b9cc99e6cf22ff49e7e128acfc8273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4660a88209ee65092fb4aceea199b50
SHA138993f98dd3ab12aa6311a4fdb987c41b5431867
SHA25633a736b70bfe28533b50f1b09b3babbbb57d90aa33e203ec0762d10097dab599
SHA512d38a6998c5ba50352e6fadf106f8e61b5fae5fa3ce6b3a224fc424bf2026b96789c5071956c7e1be6438cca2396a9772bd7bc984292179147f3282af8b1d5f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506056fabf2b1b614bf72c0cc1e3b8ebf
SHA1117382778688e0b4302540c5f434e762889e1de5
SHA2561c55fddd358ebadba8ecb0043126b1b4b733229d018f7baabc3cd33e8d993ef9
SHA5128b6c53be4e2c3f21ec8376165f9de085f0b9a16adf4e918570f7ba3c382756be17d3a46ee56b47dd4be279eaed2c3d252f8ccd75d142ef1fe4100582977998cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566751aa708fc56df6081181f13817e48
SHA125e13a36a7298d7ba13f131bd256dcaabe39af40
SHA256b9f5325359342358495fb98174454eae4a1a5304586a42ae3ab42fe3e82f4b0c
SHA51290be0562426b678743f158c7a4f13ec53c31ea55a33dfcf08f8b9646ba1e64ead7f988ba45c193c8311c3caf78548705730e95b296615d357839f78c26a3008b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ee773ea293d91d88dca5612e75ca621
SHA185e79c2ffd0f9ffe05b0382014d3f86eb9218d80
SHA256c0a5d39cfa254d10c218f895da74b72afb5d94b40dc70512d6d654050f608ba2
SHA512f9d2dfe142f305cecfd219a5c2895099a3aa7cf19ad5afa0b633a205bdb33c18fb391b637e98728235f4aa067883d7530cd938ffb812d9d9af606eb191d8603c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9b737a4c7c3d595c04b3d5ad014282b
SHA1047c9041edd2ad76347855aec5ae40e25d190361
SHA2569263a4917fa2a70167daa88c31b8aac2bf7766f12d4b18067b8c6a60204e07ac
SHA512e0139c66ee58398849cf4c193ff5de22b7a0102ca4bdeead455a7cc18f8777390b499f210a8b6b2a1914d3c9762de12663905443f8af9f28ea47876da2e1af52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d91b5b6f15df8723fe6cec48d69ae0b
SHA195d4326895f93239635b09e13a1d67fcd17e4987
SHA256174d23824b6cbab51e221bc622cf81e81e920b23fcdc19c411e38967431246c4
SHA512df2b604b301370cf30a6bd2141f1195facce82be2822cb950cb9ff27e8f9f634c1b1c3c0995b2f2816cbc3654ddf776ad19a22be3de39416377f9601a00ccaed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546aef3f800c42b7b07a419e74225896f
SHA105c5742b0567df125fa5f8cb67e0c276b592c6d0
SHA2568d5509ba424b8b8e87677e5a24e7a3d56f898b17c2caf640df1f9581c86a93b3
SHA512a7fb76fdaefd3c1ffc02490fd9a1012122ae82c76daf008392d110c6fdc32ee22a9ee09bc6530b16f0d5c9d166a5571e746630a56ac000b305609bf5f8d17532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b68d7fca8502c0e490ba897436b8d88
SHA1ee0925a95aa757414486ea5e223ccd44e089d68b
SHA25676b73b61103642bcbf8884414f2f7edda594242092fa3da70965ab5cb538e9bb
SHA512df653c4e96c4060bfdeb83acd5af17f56afbe982286ca5dcc9fb6ae70744f1a285ced67ef1cd51ee9e6343ef3028f1d793264b116ec821a4f4eaf558088d3bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578ad9c73555c2bafcbb2ac3c9bcefcab
SHA1656787ae9e56ed426ccc980dd6bb4565623793f2
SHA256fd9ecfc20fe295ba373555502656436a9664d90afa2503d752a9bc34ca25e4a9
SHA51207b237705d45118bc5c4198c192086523ee342d914c570dd6b6a5d24c6b0d42c2b396f9c20df32b51879f69707e1afde2ffcc0d62ae3125ab9ce59331eef481d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d76516c1016322a70e6d3a4ce00440b
SHA1e07d44b0cf3afc09e868c6cdfc36a0a37b2faf3c
SHA256d387c3ef88fee7b1ec7160f02176880bfb7cca97e42df4821025ac5ef43cbfb3
SHA512f63a8a0956be9e287ffe03f576dc2cbf8d258bb3f8874d0c43249c9664897e7d6d0e67ef37a5c82c8829e3866520d70b4410b0e9214629145d587dd1263cbfd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ed8e4159c559a8e586c2039829129ee
SHA1b49cfc1c5b394c4efcb01bd74faeb63d4f031114
SHA2564689d6aa67f398b3eb3a15112b2748b27c382c3fbbd443f96744627415b2196b
SHA51244878b224a8e80dac5e345ee88b591fb8a1cd7e8fd7e92cd84e01f34e213e9eb39dd3152023a2d800d41bc013b47874f3b8cfe4a7ba289e11938729b837a9858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d584a20517bd9b3d38d5049713fa26d
SHA13ca61d76f3e2622ff0c08e9e181161b6c1fb6aeb
SHA2562e0d885a226bdc3e06900dfe32c03f065e156c6fe3ff572814a8483b7fb27d5f
SHA512a87091a8fc69e4104534c8b24ebd63dbba26d4d2e69732a85279713e6561578afd3324da10753a4d09d61f0adebac68a3e8c2452791ec15cdcc6c629791173aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569f57f67396ed2f68b36420f38e087b6
SHA16c012a1b8ab5b7b5ee636d33d8db106307c5601d
SHA2560aa4bb986cb4fddf4cca357357350f3dffdbf0b9c75d7495894355af252e0e98
SHA512cf3be4f6c6b3c2fabed6c193b3587835c58735483203318a8a87dedc63fed63ea5b65eadf7623e061ff558e48022a6e1e3daa3d35bac9cace80067a7201227c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5971c81ef81c7919105f50791c245a654
SHA16570fbbe457ac8898528a6ec4a7d604795aba2ca
SHA25617a7e419f702d2df8e9c0fce4b9906acad567d2922bee3481474283c61b53449
SHA5128ae38a4b976362ebda356118faefab88b08ac38edc2cfd1d086c2a424356cf65fd6fb20b8c4b89ffc30820a1698cca0670055c8e9aa73dc1498e15ea071b9d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcaa83a14e050d02715333f1c5c94d5d
SHA1236dd3bd6bf5185c77c0bc6c24e36112a12e9856
SHA256a414f331beb13323e0806980db1a42657768cbc29a23f97789d44c820858cd98
SHA5128df35a86f77d9751d9c6677eb598703bc4501dd61903f2d50f0ea86c0cebc669eba6bfbd822a08a848c73468e9e82615cf1c761d286873459d71aec13201a15c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06