Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
Y29yaS52ZXRvQGN0dC5jb20=.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Y29yaS52ZXRvQGN0dC5jb20=.html
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Y29yaS52ZXRvQGN0dC5jb20=.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Y29yaS52ZXRvQGN0dC5jb20=.html
Resource
win11-20240221-en
General
-
Target
Y29yaS52ZXRvQGN0dC5jb20=.html
-
Size
1KB
-
MD5
ef9b6f617425ad856e7a208eb9857072
-
SHA1
66473ca25ddeaa2d6bb0ac658be23404dd576159
-
SHA256
a68d46a8a67b6c8977a0194b5eb035b8ec585bc3825e26bf8471d035dbaf9716
-
SHA512
029e2bb0197ad993924c787ff4c96e47b59aba4b76dba3a8d7e9700cf67e079acfd5fba8199440b0aa8cda31f69776be315b3a0158c27bf0a71ac89e4836f426
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415215006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7ECF6F91-D591-11EE-8C2F-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807c16549e69da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000c422dc5e146d3b14ff0a6b552fc89f458331ca0a86100e7e80c177e74b71a2e0000000000e800000000200002000000077d336105442869c9b34ed1fdef283b6682e325c579fa0786bbc8f1773cb36e5200000001b28920aaf413ba8751fcf9e256b9da5f19edeb76e4b175818ef1f2f50e3643840000000cef67fb75e22ca95f89aa99e3fa07168a8a033b9fb2a82e95ed6bac5cf8b12776ca56cefbc3744232de92fec56d28beeabe32814066016f970d2299c3a557ebb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2272 2224 iexplore.exe 28 PID 2224 wrote to memory of 2272 2224 iexplore.exe 28 PID 2224 wrote to memory of 2272 2224 iexplore.exe 28 PID 2224 wrote to memory of 2272 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Y29yaS52ZXRvQGN0dC5jb20=.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dcc7a4461b6f92d1a6bf547db46c768
SHA172bfcb00373acf0672457ff77331d5c3b27650be
SHA256994fef3e2706677e0cb0a99e57c782ebb36dd52980beb7bb21d367ae45ea1f00
SHA512091214718ecd4fff320d39024b4963f3229b1d3150a5cccf3fcad03d6c1b3fa8956eb367a6e25b909b6415af9d138adc28ba5998212f4def3e98def95e80b19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a34d0e0ade76c1dc3606c77fe253b4fb
SHA13737c5200b629e3c146432ab22124707ca4ddf55
SHA256e410329271ccc1e17553db35a7e4c6cbf54ceec3a9292dc91fbc1298e869e28b
SHA512ffb1e6d1aeb4eac80804fe947b7c8e6fb9090af53143c26cdd38d5f78dd261713ddf94019a02d55bbb24c4efdae62e7befd220b5ae14d5e4c93c15bf358144d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568a751660907c6037e8cd1afee7f2f62
SHA1b2700c3ddb122da465e9687526353ee2ca1e0057
SHA2564fbbfd660a4c052cc2bfa865455d1e22028dd5a02c2ee84c2130b835a1315f5a
SHA5122d71167816d6921308e48cb3117d22227e9c1fbe07d3383d7fe12fdc8ad756a650269ad9c7abf6d4227e05036bc7077635a36c4179596fec6ca60629b5ca2eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535a548c27b98c0c234ce226ccc7f0f10
SHA17850e36123cb3dcea2e6c800309ef20b82e2a9cd
SHA256c6685440155e0e9737caef7ebf73fab1292f2a1e74c75cf8d1fa2d4025626367
SHA51226fe20adce4b3ca1a7886e7e76bbf51c32f9941cc612193de35bc210bae385db955fb40d62fa67f215be9df19c968091d8bd79a61d6eeffcc9bfc5a9861841d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583878cbccd9ff4886e951c5d172916fa
SHA1868f0d218e53b2ca5bb08b0b12529984308c26e1
SHA2560bb96a9f080d094cd6d1d22803bb468779ba7c0f224092eacc0ca787c992ae11
SHA5127c529d7496ca1e188448e9fb9305b7bfc56bfe9a9cf6da245663ca8e8133c389970ce7ddbcbf89cc05f6d4655f53a4f73762255f396e761186dbd1eb733f9f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541791c80810d641dbd615ca3806d9f3d
SHA1e7e6daa37e4e5588f4d9c2dc90aab00dfdb60abb
SHA25649fd5742dd72906ccbb3087dc9acaff8c569014baeb1f1ce642f373e3aa46749
SHA512beec7e0fa78eeb8601ebce04ff5dcae8503e023d5f377d47dafd2f7b8ae81cbf421588e1b809713ea48681d06377694626a19d954990b957556fab6ecb703e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5856168f194f34ed2dff105593adad6c4
SHA14247e324495d40473d5c8cf8f213d4ec1e3294bb
SHA2568c8acf525aa6923ab5425481de759410d789877e32266ac0fb0aca0c3e0c4500
SHA51258745a9c67f2ed876cf64995600e2cd610b5b2211be816b52161f8fb11653945f402ffe592894de93997973c9f56b3e4970fdc159763ba34246a1cda679cdbe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fb6facb7fd741f37046ee11927096e6
SHA15987d79515897a8e0abcfdc47360b447002e7808
SHA256037c0148105ce6cd0435a1a4d23318e2d450290174a02a57692f3ab7795de9b1
SHA512111cfa5b5b34f3232d03c4b5f3889eebe573847f301a24fc1391f894d752a2f051b08d28bc5fb90794c8eb4378f62b5ef7d083913e3f4e61ce405c7dd27c8070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170b09dd04432374e6cf0291ce80c533
SHA19d2f2bc2839712b7676a437747afed415ce81227
SHA256bffef9499f39197f5edf32e4eed8f3084e0b17c430087c82c5318abcb239f353
SHA5126c0ce0c71d90e77d085cae57d74c28b60c9a983b1577fdb17afd86059441656802d719cd9cc6faacafbd16da7a5a7a88dbc527b205e9c59d4032bd749b257c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd759bf8b91436d3263e4f9a2f6780b4
SHA1bb8f723edad52523a448a4ccc574190921962e65
SHA2561153d10559cdba64333682a3a322ee380b398dec1459662697e6a72283dbae97
SHA51226c125468e7ecd717c28ffe80fd29b1127bd41605f55f3d3a1078aec5bf88eee6e0db9ce9c16abc01098e27baa96bca5ce064d224010159df872a8ed37053a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e6b51e443ea0cdcf965a9b83b57a66
SHA1b9cc3eea199e3f3bc3914dd7eef43ee3a2cbdabf
SHA256bbdf702ab47d6b759da4ebf1e6545a2e5969cade99d32d03b3eaeeace486d5be
SHA5121ea40f43f865ec4eaab5708a2d42ad8504a1cbecf0e59a345559f176c1da427ba173088c822973e6da5870f236ff16aea7fd82ba353900e2d3407bdde435dbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d327e023e8cf135e1de6552e0c52eb
SHA14f41ee2a6c203b01355a09e9f88e889ac465e9d0
SHA2560aaf81d64d0f4480104df628c61b157814cdee0bbb66d5afa86ecba82b4969be
SHA512abf5153e9c28d95b63d43043389f000a0f29b80f9c0c1f8889b34c3b85b1113f3520934a96ba9717e7206603223e4099febfcecdc0cf45497e3b3099f2c9dbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a756561686c75899113949729a74aecd
SHA11d32794a1f2d063e7faf8ef52205d28d0ffddee6
SHA256b43dc1059ad5011f1bf76570f362020dc585ad9405c04fdaa44648b8f8e9ab0e
SHA5126660832eb0faa8be04317bc1b9cc50ef714b147189ad0e403674cb62917fe6ca036d299ed626bda811f986f98636fd2cb2126891c4ae0a2548d1e509b341f505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54444c69dd9526fb0c6a254b94b758b42
SHA1b4e4e8081c949032d11e2dee20200810eae9f5ac
SHA2569ed32f3dea2ce072c0857d3282d9e3845dd04789ff6642571642df56384c8312
SHA512ca8ab992b3fcb7c4dfe510ff93fd212a8fed2cb21bbc48d79c790b6e6951cf34b138417106c5703e6d75827cef76436f5feab8805eeb9f28d0ff49e9e38dc982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547b2a39962f39ed41f6216c16579be04
SHA1160beadc5fe4a0ad256a84ad7617cf25e62c23f2
SHA256309dc5b1d80da6444b45c89fd3c5f1b33f532b0a228578966766eaa85eeafdf1
SHA5123f639dfd25801360bb245c150f812f407a67bf50afa0d20c21e9882686ef78be6efc7f34593031fe440a02ad1f82c6c6a553bc62092801c33a3ab35b5bddc424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549970a6467aa855dd851b3ebcd7bd38f
SHA1113703d048d581971449d5292049e83a95f7f5e6
SHA256f96fac11369027a6a445ca8d2f0bd6c7456e9f2df3777772c72056419ddf210e
SHA51282f1907d7384c2ee338f0d9f513ab1c0c573c27a8bc95f91b44ada459b5b83a5b487584d79292991f4a3b3c460156f382f01640b66033bf19460a40bc697593b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b0e7422ec108cc18e1c4554c1fe51d6
SHA13d7c06f22067945eb00a95d2906c0cf8b5877fa1
SHA256eb4ef8171f610b5b30f45927846b150155f2bc55be92d9648c3e0c14f5747cd7
SHA51233e16cffde74ca9774034ef9a16db78241c05beb7fc0c0e99336c91930875fde1e26ba34bac059441e6995a09c5a70ee1771abe32511b0f63f639b68ee93ee86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545849dd5cfb567734123dac3d480b63f
SHA1826d3ad3231333eaa4ad39e09ce993a859f7d410
SHA256a28d4379b96b68de1d60f4c4ce17580225ce2a8e72a76fd111779a4f3d6b3612
SHA512910a6b25935e47ba98a54249ce44d23eb441b30a042c586e18f26e7a68a27fb1a82ab54e1f19fded5f8b4922cdb389bc06ea0945a44c4f8701f8dab51378ec8b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06