Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
ad05bcac9671c649be3e6575202a709b.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad05bcac9671c649be3e6575202a709b.html
Resource
win10v2004-20240226-en
General
-
Target
ad05bcac9671c649be3e6575202a709b.html
-
Size
237B
-
MD5
ad05bcac9671c649be3e6575202a709b
-
SHA1
cfc433c37e3bc9ed96ff53f7243931b99f4e84bb
-
SHA256
bd10c4d80a6721ec693c9b38dc17ff87edaab38f5c66843091496454e0b0c547
-
SHA512
78914890d5ec0b226490d70565827f334d59b26bab89ca9e9f01cfe5b29c2041416a1ecd56636520a588d2bef5b4e6c7f5a8600f33058271840a7f34bfca5890
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F75B521-D689-11EE-9DC0-D20227E6D795} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07247e4956ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002b2554dc9ad786346e16861448093c0af9bc967832750a095e97b3a26ee62d8a000000000e800000000200002000000003521aa6fdc4ab3cafcfff207241e623933d50c4ba723de2e8632d9a11985405900000005b4999d8eb886695b00f68cc94415603fb5f28e51bacbb07bd031573fdbf2a5d99dc887a9a699c3446017faecaee6a5a2f2769a4617761f7f9a23a7e45ee539e27833a33c2cf203d2d43d13e23ab2383c972bc4251aaf390e011038f4ba48418a8fbf872a4211999a31d1082aa10139c26875fd60d295985eb4f2fba09bbb4c40d990af517ddb68ea90a0bd71cb82740400000000c15ec0e6fd122be0858340aadf903e0aaf929675778afc477809fd2b463b023678494ba8a7a435167c55b5c7a8b46aaab66f6a2cb272d970022fc2c13084c47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a755b8dfe962ce66bca05b339146893bcb51acc32f65228853413efeff3441f2000000000e8000000002000020000000f663bae8b3aabf5c220fa1883f847d0d19f7bbe62fa50bcccb853dd5da2b4f9a200000006783293c7209f646740beed80d9f7fd357232035439d2c29c7a804f345ea8c1f400000004e7d0767cde5cb17af9dc7a121b64cfbbffa51ae6f8a2cdec1aa6867fb28496974936a991a7b3657fc8495633a9b06cbd7ff9593a02bd6221a36614ef9d6d4a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415321333" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2380 2676 iexplore.exe 28 PID 2676 wrote to memory of 2380 2676 iexplore.exe 28 PID 2676 wrote to memory of 2380 2676 iexplore.exe 28 PID 2676 wrote to memory of 2380 2676 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad05bcac9671c649be3e6575202a709b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d7446ffa5f49bbfed265168a1dbe644
SHA1602d66f324555acddf110a559e065e5c7972771d
SHA256060ea749d92a12da3c3194027b46337e7ae8fca4da9437a14c1095b91572e227
SHA51273d830debf6095664ec416f0edf98cb4403960e45b7b2a1a99ddba207330f6fbb05d28e74558be171f7a22fdb54375273a0849a77a5a6550bd44c5fbaab7e4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505215d156c3628d4330bad6f78c91305
SHA18bad76f43f9acd16e7bad44a23cc7d1763b1eee7
SHA2568ceae258387ece3815cfc661b7c0fa5077b1fca454047c0e4bbb36dc7e80eda5
SHA512c4ca0a7b4c9a64d1ed7d24b1840e5cc0e5b5b7d288afc664e64515f13af0c11a395974a5e7445d39f4e72678b5c19fe79d53aa1b3e3a3c4ee4cc9767fa58185c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5526f7a2889286405f62bb8f3aa4e8310
SHA1a5bca6f2892c8a03f77a98982f6fb86e3fcbdc3f
SHA256c1a80892268a2203a3e751c9ad57c5e72db8ec891134eccbd70c9b2542bfdb99
SHA51276ad61c2edcf9e7b19f361195c03d7ba30796c1b65a773b7313ee19ff34683db7bb5881c1cff6ba484cc10492f1eca409fe176639c9c79811509897e3eb8fe79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5335cac9837801247e4f52a79a663b939
SHA1beba9ec2d13a1ae8749f95460ac0c320ce68f12c
SHA256994be729219cc964fcf9bd05adaefe0dc8aacb24d2f74488ac60d611b8dfc08c
SHA5122ba9d7591b34ef58cfdae5662a8be91520abf887f0d70dec737f51413b11893031f4720cb94d066df05d730cd510f44e697323dad0e7befc9c075baed27c7f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522bce95197bad08fbbadec1bd10b532d
SHA1e7caadb7cca2cfaae5fc8f1b878adec6ef7da7f4
SHA256527f71a778be4d6a2e75ba264e72fda6ae4ffb7835499b5db187c770a4e0b3cc
SHA51220eb8a91ffd33d7d2b243c83ff6520a4007cd632e18abb77a101ba18febf21c705588eebe97a6fea8ed2b04de163e3fead72481b9642dbb0179dde762699f4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bfa2a851df77533fa2b7e581d8f06d2
SHA1ed2059fc32b667dc886320a9552be9b7e1bb2cd0
SHA2569aea89b37688d74d4ddb4eed28350a14928e03bdc9c3ce472438e45816fe67fa
SHA5126fcaf910a642601558cbb665efad11ee377d0a5d8a3ab628fb77750e20e5cb05991a3efaa98782c5bfc19448fb2d2d60c037828dbbc346f3390c595e8adb71d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5bb8f6073d2990189deda78da5fa33d
SHA164e1f57e953a2b0c2167b175bcf395abd078583d
SHA2565bf902087c4352e7ab614f9f4105761b0543f7ca7d1da62af686546d136eea50
SHA5124ad9c32c9d67aabada063cb563f8cbb1a847847f9255a8315c278a7b536d10271d5eb08117d0bff9fcf313aa2eb9bd73443cf8de2d0e5cee0c7a85a77a0bb21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e15b48385eaa7c048fa5fe3ac22f7d59
SHA12c60504d51319d12004b12a2fe1fdfc27e3a523b
SHA256dfed927e9643abf0a10fe5f8ad5e851d3a544f374bf5625735acf7cd4daed57b
SHA51281f5eaef99bfcb1fd12bcc9b851e88cf89daa094a7b6492fee89fa68c086ade11cb6c4264220154d086ff407bc6c083c01a14a5636bd28eb7ea738bde44ddc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd6115bb836ce5a3800ec6d4e796ffe
SHA1b8ba7f0f0579809cbf142cbb53986bc49ead7dfc
SHA256e7f6d6a7efacb0e4182ac1f2c2cc55a0aa6ce91781acba11e158725d73ab8e52
SHA512233e3d1d26c05d6f0428a0fb4009b430d70802aaed93eb379d843ff04aa03e3495ebdb86f1b022322f8e023f15c1b70323109c116cde93f25d1891615bb2e6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c70ac20edccf5c9e56ba3e0628690b
SHA1372b6d4e0a2eabc93af4bba5bf24980b8662a56a
SHA256081815ac49d202b3a4657a97c7f235ee2586638c8016fd64d0ff557985fca35a
SHA51270e906471020a193fef00c6d54dffa1f225b789fae10400421992d919d3449042d160e3a4d35c31d833a572177508622d8e670ad971fd10ef998e3d7f0382957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a0fe06b44d56288e716237d552647b3
SHA1d5df0b8cd4172c43761fd342e68ef879761e20b7
SHA25608bb05edf6892c346a09b12d54a8486b7f1c9b8f530cfe2b8253cf273bb14200
SHA512c8c493eeb1968b415e92a824bf79a81bbd631184ce690718587008a3aaf1e424c99eb8b4ca6ad16e2c19e58fec589c14bc1135c684a07a31ecee05bf211558f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5976a41438cf3c72c35379faa9c2e44be
SHA1a1b252b597f35daaa642156137afb0206458d43a
SHA25617fb8176c7273dd8b0f38f4c62016d6939b96704a4c53b3eee93f490277731c6
SHA51243b26bd60b356b1b18ecb523bdada43ff899f5b03c6d578884f76531e207b3503057d69de3f71ee672d5e72ad522dba88fc9c121f5241d08dc0ab952971a35ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae51b0c79dc930cf60522ae99f86da0
SHA14f8d37346d25462561f85ac9180963128804024b
SHA256a8a267b4cf0ca0fc2d3a845cb55020e1fbc91ddb7fa5fdb0759a30b9c97af754
SHA51208c1c4e2487777cf36a693bd9135b072401c150d0949f9e50680c2eb2658a9d6046a5db3e776530b66a5072418c927c1d61373a80a0cebd8c3aec27cf469ab24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a23c1c0a664ab4147d060e65118a7ad6
SHA139b88358db7790bf0455293db0f5b25025400394
SHA25660bab4073795a30edd2cd80bdd0c7a2883ae7bf3781b2986f9b7d365f61cab01
SHA512d1ed3c3ff7ae67f934957a173c3090a8ab2bf3a4007251964c628d6386610d9de2bfc3a5b56211ce7e1b303751260ae2cc6b302f8f2916aad2eedb5bf1b4fab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50615fc793235f7fbb654fbd22dcc44ba
SHA1d9e277f59ef8514725d8dcace60efc40a416132c
SHA25638302d8b1aefb549c6bd55b9b1b8f4ad7da605c252252fb397d234b80f16526e
SHA512382bb296b17135322f3f3e5fd3f4a9ad6a637e3fc93e2fee0cad5abd182f2584e585c38986d6382ecbe262c7d09e29aac670574c26c136e84c9a50946c328721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db8b7b1b1dda75c3b6a408a41a29ebd1
SHA1a32fa5982e10d98acfe03293c047433533d7c054
SHA256446af988db000c245462a83209ebe0fc00ff62d1d8a7e17680c58ff7e750e919
SHA51299e4c3476a2ea5093e2959735283c8d2661ff5c2c4a9f2f0867843888f99216119cb87e212e8fa785d53fcdac9dfb1747400603a2c52dceb0776581059e0150c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cde6c6d6d2f3fea40a6034f4c5b5e3c
SHA131cef47bce2bd2898b20f28dd105332551218efa
SHA256d9d2a71b3d41ef94572d7344298c1873b6c2a66cea96f17dc30e879767adf066
SHA51269aed3ec0f3829d84e7e807e74c45b5df34fcf7c513ec232b1cd7fb9ea013cba0ee8e9c4f4b2ab5d14e6028e396015b5cab167e4fab041d6a524a51a3ebef030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f386929fd4d67bb429b51d6137af93f5
SHA15c193a71ca1f3dce266dff55e84024ccc0e1ba9d
SHA2565fb723f6e59210e3c5c530abc548a895b47729bc4376fa8560cfa826c7999675
SHA5129660956a458486e997a6bca113f42f9599252653d175dc6098daf745b1a85af55e8d064db23516bf1714600393260f9ce44fa3707640e655cd8a8a03a9160c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8dd67e89b21be8e220efb893821951b
SHA10059a834b859f7e011a08d4f058e1917c6cebbc8
SHA25684bd833af02334d9fa7661fff8b5834f26bd8e332ad324548ff66f237419f0c8
SHA51210f44fb2a11bc67200bc896f43dd14ac98b58c1463c4d6b70cee9fb9399497ea72ea3d131de7c664525185ebb08fa3b215fd766a984acbc2934657d31468d274
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63