Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 21:43 UTC
Static task
static1
Behavioral task
behavioral1
Sample
b9baa1396555954db525fb446a12e21d.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9baa1396555954db525fb446a12e21d.html
Resource
win10v2004-20240226-en
General
-
Target
b9baa1396555954db525fb446a12e21d.html
-
Size
15KB
-
MD5
b9baa1396555954db525fb446a12e21d
-
SHA1
6e53f1a5c248fc8bb05ba9d610f65de89886ff9e
-
SHA256
e8787bac01c0a91b92fcbc748d7139daae14c677b3bba1700c8541581f5f2903
-
SHA512
f65129fea3e15053fea9bbac9bf51f92e099d15f9827d8cd8d46c9505dc4f5a13f6b86b95f6f28a203c1a82fa82d3f96267c700a88dfd9fc97c57753ce89e2b3
-
SSDEEP
192:huaxZ/MEmNZO6gTs7g72w6Kg+zBv1GqIGq4bhS8UikHk/FetC4vVgKYY/nlMoL9S:BscSK1BxJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000227f7b88df75a66298a7c5a5dfa1b1682d83e55a5a1abcc2e3cf223295236030000000000e80000000020000200000000d8e93860c447f114a252aa5e9b21fa08d15e4cb06b90e938615d0a90c6062cb900000007ea24eb7076a76f8c088dde56ed8394c072997ef9ddcc4f7cf7c23ca3484aba3168b6abbdf266ab3c6ce2e0503ecb6ab1e0ec38848449a51bd2358aa14e250df30dd089119f4849f66a3a01ebee3625e0d79f6f732f0c1e5547cdb42c2a2d94f596138026ac0e961fa6ecea7383fc598619a9e107fcd1be87c193c4cfcd33afd30025d90999fd21aa38bcd2fd2fa7c7740000000310f263b1860427032aa3de10d8e12d19f272bf8e2e6dfd3997aac02f75f068c8a02c52bd41b519554076f8cd7988627fe8496d572c4b198e995e160ba56072d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E86447F1-DCCB-11EE-8718-6A55B5C6A64E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0967bc1d870da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f7000000000200000000001066000000010000200000001d15024df9d5148bce5afe6de41c33a9019002bd211bf30bf42ce984321eb3ca000000000e8000000002000020000000ea05e3d80e9ff08d67ecc178241b904f0c368bb4c51910c2158c7440209dbbab200000003b93169a7643a0fc43169892cabf0af2c409d38c078417b7b100c3b17f8f894d400000005381dccb6b3d11821a72557635d886eddbd20e97a70cef0b726db505657873d4315f576171c163c07a97c5a05e8caf5d2581c5f613eb552839906c6b4aa80849 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416009761" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2544 2472 iexplore.exe 30 PID 2472 wrote to memory of 2544 2472 iexplore.exe 30 PID 2472 wrote to memory of 2544 2472 iexplore.exe 30 PID 2472 wrote to memory of 2544 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b9baa1396555954db525fb446a12e21d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fceab3b782724bd18b1ffa6486f0f5b9
SHA1d48c38b3e4b71b1aab41797243e1d1c29a731112
SHA2567da3d46809ed1b4a797f3b746e6ca0323a307d755ee0b3f143f261c41b52f93e
SHA51221f902e52bafa3e783f028627ca009926bb3c9b270c9dc7320f797c2a963d9477236466f51d344534ab3a3f5b6d6f10982302201893b36e9da40484b4480e95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58277d87d5c1b07ffb22e2624216cd26f
SHA1556fc65b743a7060a21d74005eb9e52651651dd1
SHA256fc07087ddd8c6ab87f6fe947dc5567c74db18c0b77be55a6f37ecd7b28268bac
SHA51205d40f02ebb2542751eeb73dda0b096b66c09d6e05ddbf48f735fbb2e1ee13cbc809f01b99a27d1982b21f8a94f356484789a446508b3f94afc7d3bd8244ef94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f14a3935e36e60b819db8072dd1b2a0
SHA147a2ab2c4a545f582d31f2dc2edd99b9cf3b2311
SHA25648644970dbc8e165b2a448d8efc75c40de54d4b8418ab1118a9733aa7600d6ef
SHA512dcce38b90e25d9c11bd087d62058490f87ac99e60d45f574bda96889e8ba7804e63ad8486c13a086861de501fe79028e45dce33045522983732f1f26d800d9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d93bcbec999da7ce968d117d117bc734
SHA17a983f1c2cbf37540e91e85d53501dbbc27918ba
SHA256066225893cfdddd36435af56ccae2a37abfd217653ddf7af1b9ba1d17beb525c
SHA512cf2a24b2895f23c131ce0a10a0fb66aba4fe5c5104f2fc42646cb0038cf29152bfa73545f4743092062abbb2933811d2e0accf9dc8ed5d73b005855e70f3c9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d06e9e0c2f9c25326bb106b9069449bf
SHA129826820e69ba9113ad8507f2ae164c2a67b1739
SHA2565129d8e2a493197f532e920cbdcc0d806b3e9026b2c4bccf61a9452f461cbc64
SHA51217b5119245b61117e318ebf7fc659f04b4d3ad029e05521fab050656e21729cd28e1856b5d5ccc661b2412d4a84b0496b73f6d12ad0ce736d6023909328b636c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63