Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
abe3a428bb5a9bd577db7b197ba114d9.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abe3a428bb5a9bd577db7b197ba114d9.html
Resource
win10v2004-20240226-en
General
-
Target
abe3a428bb5a9bd577db7b197ba114d9.html
-
Size
3KB
-
MD5
abe3a428bb5a9bd577db7b197ba114d9
-
SHA1
15734a28ac357330af458d545ab6eba60b1c5150
-
SHA256
634649cabaa7f1a17c8c2670d535da35198be541200e279c8dece4ab22eff79b
-
SHA512
0d237a0d3a4a61f4bed6cef3342735a5c18e37ddfb71131d91d89eb4fc1e827298edd6dabaaacc604351b4d02651044d81c33f474244bfad68ec69ccfe22fd8f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208a2093426ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ee633aa2fe52337a25a5912abbe840072a5984fab5cd81c6bbb12eed0705d573000000000e8000000002000020000000045e3772833d2bf29513985e7ac520da3cbbccbd4bb15f1d405855f5baa2f92020000000c66ad773b26ef14a3f569e6f82725c7a375532575ff68625e0467b3a872ac76f40000000d4d99ef4325852b3b07683b83b77d18f51ddd436b47e9145e845bcfdb36a5d2a78572b1847f8997c6fec16c0d5e7098bdb89e7e70767e0193c3829a58436a0ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD5F7AD1-D635-11EE-BC57-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415285547" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2064 2844 iexplore.exe 28 PID 2844 wrote to memory of 2064 2844 iexplore.exe 28 PID 2844 wrote to memory of 2064 2844 iexplore.exe 28 PID 2844 wrote to memory of 2064 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\abe3a428bb5a9bd577db7b197ba114d9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f28f1af0bc941ba4d7d54dba32d9a861
SHA1694b44e874246c628c5325fa8e52b71613c64829
SHA2561d2a968edaa28e068e4593916af230631707eb3f3ca4b9279eef80adf73d3a2e
SHA512251411ce7fd92f6a3693726a3faab52d5b805653f64d7b626a5e83398899eb2afdea76b96afa71720cf105a317b88dc70161f2c13e6e85a84f653c05c7cd315b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a26be15974883a9cb8e48606b6f25c0f
SHA12c24a7e2aa0d98942d94156295bdd59d04dacb38
SHA2567f29fad0cd58035e5f08d7945fc95da25539de7d679b726a12c72672676bf2dd
SHA512460ccbc8025f6931f92a65f30785f443a66df801905d21080fa63101c7ba24f6e97c2f6231cb21b17c4280b185639b7324a3df51ee052ae89fa14d5e949cfa5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace7498d11fdfe935341655c4904767f
SHA1357a563e856040699a5768224a42c60f66215930
SHA2567e0e21da396515ffd36ae693b036f2657225f98faa727b6231a4a2f19d9c5965
SHA51252d2a85623a3a93f18e852d12cf64cff10e17c86862104e37ca141b0f92b7e1106a187af3d912686bd3b6062520c50b507deabe79d8d2d246dab0d3ce535b6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9bc4b7243dc38efc184b259ab9d2a8b
SHA160d30f4b7c9ff4e1684c0f9e885e09776d3865e5
SHA25645a196f3bd0875bcb9911e31f14bacadc355610175db899f1aebb314af0bdf7a
SHA512533782a1485f2ed8ed301ee3c6255145ec475e6d6065ed3ffd73fb4f53220954663c874ab95e15dcfd48e71eefb4584577d83b80e4fee01ae33b126f6b2c1619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471313db8032bf314bd41f429836d7cf
SHA126baa153a5df05f6c1177c54c5d05754e96e8de9
SHA256698e71e95064bda7f3d0b01e0c116f763aeb2374838e537510defd3d01babc70
SHA5122ab7cd27bd9a1214498f262559710cad346c938c725d9ff198ae2e7ca302462fe3dc1f426b93886a8662ee2769580d938593d5e41c13c390355ec1f23ea503d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5d6fd71d641e639980529fc7830a424
SHA1e1f9779c5e9ecc062733264485f810f1e94ad5bd
SHA25655ff2ec87c844e6df06f67062e4e9c7a9d5e7120b98c34f7b0d0fe5e7696b9f5
SHA5121386d8b49d550125dc82fa957cb28f18516802d1f69e9a30eb49b595a80a7dfd421087471865c9561d41fae5750f66bbd8b1241bda93a8db94a4f09c3fc663a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54065168b307624b8d32d91e695264adb
SHA1c3cddb6a3d965afa88ea0b4c74669ab14fe7e287
SHA256fb1940acd2d77bdedb669395f607f79daa27eee72b74218763bca89919d2f3f3
SHA51214fa902f5c4cb226726534a294618407fc7f153dbe8b6070c6cf68c3c9dffe3323e160a1ddf09f464ae31bc946c45e36ac2f573154028794f3f248304293c915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53328ecc87dc46c566ad4123b3900d1be
SHA17687882b0088e9613e454ef6f182403d0c5f2b47
SHA256e8fd7ffe8a6f3fb9d5fe0686ce116f0432d664f0da7a45faa5a6922fb6b96cc0
SHA512d23fa8f4a4fc8925a5a822850fe5a4a2ab3646f26fdaae2284af838222b183cc50c42402c0846030ee8c16ec74c1934a5b06400e4f3be24f9aaffedf8c8102e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeec7b919a815b38d58122d11c9b2f08
SHA1b66b9b493a2e47073ab7d1e5b53703393f2c369a
SHA25663a51475f3bfd309374e10b97fce526f9dac0489e0ad83ffedb8bd6764eb49d6
SHA512651dbff103ea68cce363696531c0dbee60418ce1dd6b9dcf028485dd736a91f4337297663aaf2a4c536402e2a4ec5019e62cba2bd03eee95fdefe57d0e35be01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52702b74c3f5bdada788c245c6a8041d5
SHA1569c8c094f9add6d6ca64e2770812edb32b892c2
SHA2564a3fc74fa0e2f1c0eedc22eee89648e3420d8d0976859b690b295ab6a602f5ba
SHA512877077b2da5f174de5617d4cf56d73cf1a2ecc8cfeb3aa2689aff6320e5a0508af3151ae689426962bf1ad5311fd32b74c56267bd0852b4a8ca6233e384bcb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512aba1911122a26eefca670bdd18f0a6
SHA18d26ff4d7b382c99811420765322d1be42ba4ff3
SHA25678c3e926751fdca8f53bbdb537434e958b0b32fc0cbf5a43f8897497319d5f06
SHA51282011133195caf7bb7677e06327b660e8a75ec0cbdfd0eb69fe5dd0ecb80094090a4d16ea966e4d4924de7ec3eb0ed538d7c9dafda5661a0ba33099e529fc719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50912b7fbd3fd9dd405bb4a3cb8fe1b7d
SHA1542d5f5c7dff385a5cfd10fd19e90f8484de8127
SHA2569f98c3c903a4ba5024c2fb47358882257e97a64d60f471ba4122efc2d5fa54b2
SHA512584c838807647a81d3c142292c6babd9697a8242b093e29d9cfc2376f0ea3adfdc58b332bf66d17a8de3202be85a477b6dd7bfdd07545f34228cdd6022864b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57130bf596a11ed6bc27ed806adf935a6
SHA19de88c8ea1b43d4bee520a9b96fc89174bbde854
SHA256727a6f0f09cdd730ae6865550336a0d112fd6bed2ef41f0f1ce44a0a0b719ca5
SHA5126479255be7ab4446883b254d89a95e1b00e07f8c293bd6b2c14c2ba193b292523ce02d04f2f989a933ba4dfc4c5fc61f30e5f5f3df077ac50907e4f6a4c27f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afc3011efdb6a5c4c39ef549bc463d12
SHA1e440ffb491eedd259ddd56c36846848579d2d52b
SHA2564ba6a00b399337997f196ccc1f61c14f8cdb9858d05fe1964ddc7a69c01fc393
SHA5122b3a9c96f9c1c2d35c6ce4273e4b9b5793b6689cbc38a0e42ebacb000baf96a4dfad465abeaeacf07023c5455292dcfae2a45c82f346fb2a5c62310236fbc190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc0b510d5d45ade7dc0a5be749d572f3
SHA16ea5523b297272e6f9df2cb13d95395968037c9b
SHA2564030a07fe814ff9b0b1db8dee55fe2f3e56629f184463636a8cc7eb112d27578
SHA51285bc20b2d2ce6a95f2485a7a1c70468b674b55d1ec0f205b13166a90a216fea7ef17188dacc2a6ab6ea20cce482a5f058b2e6b1e2e3eff4c95d8405f5332136e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b4bb39966b32799a4827beb1d455b18
SHA10e9ca54839bbe57793882c11c12c5693a7fd442f
SHA256961a6fa88bed6d9642dc5edcd99c758302fc27a6232a09c0800ec1154976ec25
SHA5121e00e5497fdfd24ee35c0b589d573f830fb9b899440e3a1e6ca04303a22376a8f877bfbe954bd9476a5e34390e5b9d6d5df70f52015c649e2607d0378b795785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5696bdbcc25f3228954655717eae97850
SHA12b1b2b26ba7ef51174353374e2b236f5472617e3
SHA256eed7c1be41cb425259fa55eadb26c8d56afff0bbdbd0c5eb234a0b0b1d1a7a5e
SHA512ede3fb17ba9fb26c2392add382f926a04308d379794762aa591daf81b6e9d117624f76bc7e28bd40749a40ad77a32b16bf78eba699dc56b7c92654aad2eba4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a87d975c3b10251452306adca83aa95
SHA113c46515ba6b89b075887ae8a03a5eb382556e84
SHA256810b3eb1bcd08f6f93ec47e129061a8e4874bc22967f256315865f1067a6cf4f
SHA512f1ef5c686acf825461a0e25ab19f3f2e2b31f513dcc3434ecd9974283a37bf94265605e1a0c00df0ac33b383716d1d4bc00b7df5282548539b8dff88d98f38e4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63