Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
aa5182ed1338e9cbbd3f307c11f8b379.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa5182ed1338e9cbbd3f307c11f8b379.html
Resource
win10v2004-20240226-en
General
-
Target
aa5182ed1338e9cbbd3f307c11f8b379.html
-
Size
35KB
-
MD5
aa5182ed1338e9cbbd3f307c11f8b379
-
SHA1
f44ede9f6c72866d24812b28c614e42c9d6d6e04
-
SHA256
7181cecfd8f730f9635a72cebf8f16e3589f2d179bd13d2f78ff8ac1ef7245d9
-
SHA512
d3d434fdd04bd05d8a863da5c4dfc69162eb7eedac3eefbb6ee983616a455596488371d095cb6ab0ed573ad852e7f15dde0480020a5bf7b20e8c433f79df5d24
-
SSDEEP
384:3tv0I1lHss6aIHvXfCImoFLRMiKPzBotckpc3G0aollBnYwAdLTdjMA2sdll1hRi:KpHvvCImoFLxKPzSueDToll5ulF2si
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BDA67281-D5BF-11EE-BC8A-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fffacc0240230f40b575ac5982df49bd000000000200000000001066000000010000200000008ce8de6fbfd591a9372209b644c85e0241f1baf025711e94e365fa6586ac1752000000000e8000000002000020000000c9afe449a78a76c573fd117f8c1791e4fcaa696f6d005732bc17152164c416ea20000000295fd60632037470a902fccd5c8bf1d57aa81e00455c062a8bf3dafc70e8ca474000000078f658965e6f0e58412530a571f30ea817440584120edad168ba945387cb6f95e588ef2816134914670a443e897b4dd31ed4a379420cbdc823694cb98b9dc627 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415234872" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01e5398cc69da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2172 3068 iexplore.exe 28 PID 3068 wrote to memory of 2172 3068 iexplore.exe 28 PID 3068 wrote to memory of 2172 3068 iexplore.exe 28 PID 3068 wrote to memory of 2172 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa5182ed1338e9cbbd3f307c11f8b379.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5a1ecf29ac0a65a7138b71645ba572a22
SHA1a35cf2563e65d09f28bb728074b7e7ec6f8d00f4
SHA256c3e06ba675534afc2b5a1b24188f5c1c04c092c2b8ff9dfb81940621a1359031
SHA51235eef7f3419d0471eea33261888b78ba6969a016ea7e0466b4e03745fd8578e36e0ec84ad82b8c17d734ed9ded9f92710469f99e977b8d094ec6011c455462bb
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5bfcf5e5ba95e3254094a494e1a56f5d9
SHA1ec815407f44a847defc926d2a1f561180454c3bd
SHA256b3e5df7950b18ef833526d340804192dc824ae524a6d1b46bd7ed24db3333401
SHA512baf5eb2f22c928955ce63d4d2fdd347d616def47c056e317155e5d1f60df42aa7a353ebcc8bdd2df070248a88d15ee048d44d901c89f5252bd78d58142d16de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5827b58745caf90c865eaf19174811830
SHA153b1bb5e11edc13a0df0550a2a85df8460edfa0a
SHA256c740d8278add0fada69b86bfe1d7930c88be301e7f51dccb90ba12daff758dd7
SHA512d114664dac30f63b8f25f2a1bee6c7ceefcd7d1e49e81acb007e7baec8abbed82aa6bc3c34def460d4a9dfaf016ec267271a04d491f361a5ec8419ada32e1262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542462b771d7c705335df0cbaebdd9e76
SHA1505a1f0d9b506256c7a476eb794683fd6deca95a
SHA25670247366aacda39681e653233662f86fad9e707b82dbf9ade42c5789e6347e5c
SHA51239e9c3c572b8546114575d186944995ff8b351b327159c7b0e4f46f2540924b4022414bdfc25f4a3201c864e12b01efa2243b43e191425788f3df99dc6e1c58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d995958ce31c56ac2fa07c860b7eddb3
SHA1ef67f7fe9f55dbd7d527f93df0b1f4d4e549995a
SHA2564816e55da9ae00e21247119ea26f47b18b35be61d79371d4c64244a4b0f1c08a
SHA5129b456365c6fabcf77c1e25c7223c7450a8277b00af364f813474bf4cf515eb160e98d8d31b6d4e0564b9a00ef5e8c821278133cd2181211cd1e6630a46f222f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a59a5ea486ad10e746d6a6157e54f23
SHA1b2e159932227cfbc52d7fcbb213f66574be7d56e
SHA256c93b55f7c0db7c2b68490c5a35a1b88af9a16c2d385b3f52609fcdda795574a1
SHA5125efb163fba5ced871101d26af38880686bd312c98c766b7336a998bbbf7245e781ec76fa84d43be55a7f6f3ccd6c4365974d4a6b8f5c166d803372543c1138e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377ce61f2c2a879deccba785cbf18845
SHA1cad4635860f6bd296c543f69e1b861b857d059c0
SHA25678bcc7f1dd7195273e76d066874d5c07a553833c57c6ef6ee4208841d9e781fe
SHA5120c3023b7408911f3b61da26c2b79647c2f7faecf20d51711d89a0d929d4dfa2d9c7463e7e9ab47173401435ce287acef8449366c88abc26409536cc1c14a9eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530a17a1768af9d654bb4c07830845732
SHA1d94867f10c760e7c2b01be3f0e7867f0edf34dac
SHA25629ab6aa759e2bd12051f4ada62adb6866b70b757164c2b895d1e5b830b114313
SHA5121d868cfd48d572e008ef77316242a1b20448190d8a57d80759ed215e12ac294ea3c9d860f3a2375c576b148dacd1478edff74ab55ca1429f4ec6fb8e7c77817f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9cd982b3d111d9168c3ab0be9f101a0
SHA1e5401bc7575a36eea90f657e41a0d0f4ee3ec5f5
SHA25680b8c99a39287799db3963e49317cceda925d9a3e02b69bb4135dbff2f214905
SHA512eaf2373483711819e56ed3688bab69809e34312323136f19528e59dc4ca68d56a253ac0099fa38e683901b785a325b6b07b7563da33af0b98a410832177e976a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e5b88297aeaa48fe2d652c546070e7f
SHA15beda01d0435fd2f551a57197e6385cdb7a0a41b
SHA2565898b90f008d292ec968b2af67d793bf8c2629d898b1080c04df9f452a340ac4
SHA51260abf0f6fb77c6d886373bccb00e1e2a8541ee3366e8a9bcf6612de55e770811ed969e6b1da8dfe3c824b66fc288c29342862fd4b48ab3a62b1104160139e921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14441f08e1e025b46766d3aa7f0d881
SHA1c20a40b6f69639ff1cbc82e8a415b61c9b525a6e
SHA256ee5f08da5a3e6a3de4faab3638027a73fb7dcc51146b6597b939986048ed6b9f
SHA512527faafb61b8d516f5df811888083acca21509db43be75dd4385c32f0b4a5d4668910d4e6a8a3cb34144a159c1f52e5906aea6ee7efc89af359444474270077c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314193bc57e3961f6cdb5d5797fdac80
SHA184801f02cc192b263cfcc1bd78224425df8c6a47
SHA2561d33526edfe9331b5458b44bd733198a17d138b2c0339e8ad5a60b47b071c391
SHA51293d339b6d70ddc8182fddfbacb737d55a3195ee0caed6895274c25b54727891c897f643c492c59bbc9377e0238a3ce7d98d28f62d9523dab92c82fc6b412b304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be1abb6f580d5a94c0475433b9c8953
SHA18095221f3cda113d8d82d34451b38bd6cbf5c189
SHA256985794baff9dd464bd28caa44fb7f8d03deebadf6d4f246d638e4aa939f2970f
SHA5126711102be2a7aaf0a454746526c5b6beafb303b09d8c585e4c7ab174380e648a85fc89d942967ee8abefd06d5d56dae8ac923022c2819e3d639600bd6aaa5e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ad119ac0475967dee89f8b8f770ffa6
SHA1753794e58b69ae9a8016d70d29a712a2af3afce9
SHA256abaad923a784706d2597a046ca40324ae8498ffb2cf03b281080503910fc756a
SHA5124afa5e7518ab47a9d660445f72c05bf07b39964f03a346f212efe80ebdfbaf43a3e9e41f691e29a55483ab308cbdb0ce61334c3705059431bf6d1ccd982c0c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51150a1392dd7a3a43f5788358bd8be2a
SHA1384603cc3536bbfffe198b55351c9a383d56b3c3
SHA2564799ab5b2e7bbf729963f1767bb6d50c14d43a53382b4ca72dee379afa7a1626
SHA51207fa76959b25a7d0c07a89ed34187d754db1eb3fa53717c3ba87fce55f6c202b385dcfefa8d41bb59b04a8c32cc407c47ff4f00fd9c913e05ad96af9606c13b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d822ac0ae9c2dfe18595e0eb3e071b91
SHA10591389b6f576b963f1418a41db319e339c048c9
SHA2563d879d81726076723063eb95fbb5a64c82a14fba8884c32fe783e4bec3aa6221
SHA512610d96c0aea75a58df5f40a92dd34c79aa9b49f31d4d27901d37a3c5b83d94afa123eb11cebe125d598a649ae39f6ade9c1729d0d7b82c58f3f063ca1fd169ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c7eb8edca9cff08948d75019aacd87
SHA16defd057fe6d4627b13916c1ca4aee0bb26a309c
SHA2564bad919b0f2fe776881fa69eeb0659be6b9ebaa8d1fc9a1ea09ea3a21eee30b8
SHA5126b6affea83de3cd504ac8ea279998cad9497e8039874e1b1bd7822ddfd40221a6a6fba59251e9f9db9097b5160ee46ac02067cceff47bbbc18155a561671c3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de1c203051263755b5fe5c154a81cbd1
SHA15cb287d6fe57bfeae80cff1ebed0e94a71cb8541
SHA256f2e9c420a8fce37a04ab342513930d10a9007341024a3be1ca20be12903ef5a5
SHA5128c386e7b048c5b502b4bc91f871b7361446224d112cbabd771569f2c5a4dc0ee69afbe503cdc416f72c546763dca7b733b299d1d1173f31faf0fbb9933861fb3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63