Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
ba3565c1987abb3e324ea77317e14926.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ba3565c1987abb3e324ea77317e14926.html
Resource
win10v2004-20240226-en
General
-
Target
ba3565c1987abb3e324ea77317e14926.html
-
Size
3KB
-
MD5
ba3565c1987abb3e324ea77317e14926
-
SHA1
7d6b6d6327f1b23ca6f2c75b433d8ad4cad150c3
-
SHA256
ac166b4af1f986f75aae5ef6388401011b730db5c52481954dd2d8ba1fbe4078
-
SHA512
87693c8304b1b446278e7b3c52716f82ec0b95edee6d5a133c983caf91afa9b41539e7e7732044ad938928676c48aab8b3e67ed7f2342ea5cbd4729b8cdab372
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002de2c53fde830299e74e46963e9fbcc0bca35a382708b6679cb4692f302f3947000000000e8000000002000020000000bc3cbde9e524fdac91799ce1f4fd5966347ab917589c5432bdd6ebed2286312e2000000005ec2e735ca272a9aeb4dce3e4c6f27c4f183bcdd082680a49cba91b5d23f4db40000000c62d3c29d9ef34db9052c58f78721da388484407511cd60bee3300e464106a8b489bfeeb8ba96d136215a4cb7af9e8030921eb22096920abd0c7b0f1469e0d30 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416024221" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 904f386efa70da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{983107B1-DCED-11EE-8CD1-FA3492730900} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1680 2200 iexplore.exe 28 PID 2200 wrote to memory of 1680 2200 iexplore.exe 28 PID 2200 wrote to memory of 1680 2200 iexplore.exe 28 PID 2200 wrote to memory of 1680 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba3565c1987abb3e324ea77317e14926.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526fee2bfa4c7c16152c6c5acfae7e62f
SHA13dbf27d54a2a61902d88998ac980a65596ce257d
SHA256b506948c2bb7711da710e5ac9364e58c6e83087b9a0875b243ec8928084ddb0a
SHA512993f68c308919016834794814fc4894d9326ff6581c41f55421397d1b2af6e0dc8a23a69c1e53ace54e67e81235b3e9040de369e83deaa94f1fe6f52315f2de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfbf4d465298598a429f409b7d3b81a7
SHA109667c17959404ec78642e9561a3c8805dcb7b08
SHA25640af86ad345281864f5c312d822335997768c40171b43905ee9c94c96fcfbc84
SHA5123ee00e70b8bedb06c589df3fca1c479381fd35cff05369906f9d22fddfbac437c45588a4048b7d5899033b1c2b19f40d7607a5ceba26d84c1b573a48e2f0be0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532251d54d3fedb06bc94285d09243eb7
SHA17a2351871bc2732a464448536021888d7686e657
SHA2560315a246000cd4cae803dadbf97bf284b2d0e1c2951dd4d06b804f05cb86f029
SHA51238eea578ece4c611963e8eed7a7992573e21c7a1f765a86dd85afbb301af4bfe130c5b8ac88d94ed100e22bb397b65603d6fe619ecbe6154311f09e87bbd5a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5165fa01a43813d4c86fb3a1e584803a1
SHA1e2b2739b6a79f4b2303977bc71459a4ba52eab1f
SHA256db3f5f0f2c20adec2ce5044a4f9bba43b592ba47b036b5ff89fa0b951d24bd83
SHA512766622f275c67dfa7e2f63a5babae0f27ef6dd89ecbcb1b993ab181e02eab8374b89bace8fb2466f388f90b66dd68fdcf80e872acad2e00ea1ab991d4be13cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022fe0b0434fde33f6e1ab9328bf8374
SHA11c44f777b03939c4c13d4fab6c86abf1f9bac341
SHA256f4c05b0e327d49c900d11ccb5dbd29ee122287c17c8c17dbeaa4f14989b7b0eb
SHA512def5e5ee44f66d7da78d248d45c45422a40cf062785dea8b67cfd253a3ff64f99e059601cefc5493b29215389ca4a4a43d727f063a0928f62d98945ab7b45454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc81a3e4f6d6784d70224d2fb46702e4
SHA1bda5feb8ecfebd1a9f7737be7d2b340c9a3b3f4d
SHA2562f2fbfc1f31523307a889edbdd38233a26cef4762513563936a8e56afc5d2227
SHA512af010c8610ce52194c352dbdcb6fe928ec5360804989d81cd0742f2b4340b1f8792df3f1dcccf6e3c4c7cdfbca7880ab448ed3e9c5def6395fc847dcedba5a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56690dca2506a72a8060196b52cc248dd
SHA12e86d3fcbc1d3d6b05f114386669a0918fe2c558
SHA256ccf0e33eb29f601086a99eca34841b64b36c9650885105557a47062700a652f6
SHA512148a8443629d87ea07d3c64d18839619e6aba1861d46cbfb37c5efb1491889632d5ca25b5038e4cc15a07d7b2e7cd44adf628e47a2d1a1781b49711cad6f7da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558e0a482b2cdc7598fa3d93581ca5bc1
SHA191050fdd152b6b4ca6f682a04d016810c8b550d5
SHA2560413b61aaba061c72c906e4761101aab2162d3bfe62857e55898218fdf7a875d
SHA5121b931a5cdc2e862c0c00dfe2705db4ec48aca848fa0cc8497ec2181b8a4eabbafc046edb77ef86f2cfe73ff6c552e48c0b83cf988bfc87aeb80aae1d8ac67e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51627d326de582b5c15abc2a3d39e8c7e
SHA10a3d9916ce36c7ae085dd0846e624b2df074b779
SHA2560a4a06894241fae1fd2a6e35db6ffa0824be61425c8d1a53159c9d9674e10c4d
SHA512f569724ac20c0ebdeeee86eb2c29eb62f8e24b5464cf3a8b7787f2c7d8b5b852f954f32513167e6ea98da684fc8d7d6691d63daa59595210af68434642568a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee32d4fd658de4e377d7d684b2ab60e2
SHA1b01fa63132062eca796e65d56c9da2ac03da08a9
SHA2564143aed998e4eca71b8a1376394549c1a98fe284c5ab2c38ec1bc9fbb3d0ff4b
SHA51253296878d1ed4e147d544169547a9072f62da0bb0efb50b52c2f218739ad2e43873dd40c8c5bd28fecf9b10ffa726e7fe6ab2b9b06b7f3622acfc44cc33b89a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593ff8d30c0b1b78c0a78c4f4492f96db
SHA1a264b7b85660e31d914f53244659f06450214a79
SHA256f58660722809a1834e105457dcfe5f353e558fc1f62f38512da46cc128c19206
SHA512df27b5620d305f272d948c2c435066435b54684819220e57a03148ffb9b177bcd5e957f880dab7487744e095e39a5d5f95df3a9cd9d3bd43b068303daec0b228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e75e58a26789bde5d4dbdbbe3f128beb
SHA13682ec04899f67c6716d5d99fd18d68f8024dc3e
SHA256b22adc5e844756b8418c08e54eaee6bd018a4c214845eaba30a60560a6be980b
SHA51279f6952571b1520a12bbe10b1f6bc22dc5e5aada54da70c7202687dc36276490da09bf495ce9d1a9c8d2442edd752e3507c55a7d71270bef69f16338bf581887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc726f0f47714d575e9a3f425ccbdbe4
SHA1c00788e9a9121fc75e033d73d6161a5bdd1b12f5
SHA256ba0c8905d5d9319090ac2df41987dd398eecab00b725c6cf358650d611951182
SHA51283df90ad2f5471ca8249ae83dc5613c626dadaeb761fd6e92a719e5e2eed43b33d30bcf1bbcdd783bc721ae815b36208447eb96755ca82a83c28b51429c46f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b6ecf728e6a687ee922c5536c7bec5b
SHA1c1489898a98bcb132fe4295206e8bff8fd356520
SHA256be6a9dec0af885c0b58661fdd9b15b64686788892e1a5d706d78f6b47558e7b4
SHA5126050f494ccaa70059f33295c9dea5ed50fb4183688ac4185b87168376a5a9a1c1ba7a1aa6a28661e3e9bd2466a2a0c23011f321fc794a9298894306930217b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946017cc3c32b0065bcc27b32146b47f
SHA19c272ef3ba862268122476a43263ee033fd5a183
SHA2568fc9d0619e1ce49278fefbac575e9540c43dc57ca57b2d6c71ef705e3cafbe3c
SHA51265f3d31008301e457fb267fb01433b51a615f8462ca246e950fe5bfa7d67e68417ea9782a0987ec4b2acf858589c40cec1dea20fc9976fc8235e2e03d69ef6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9866f69fef1dcc5b6305d35bbca6fb5
SHA183f9a4915ac387547697b3b47ebbdc2fbf4c199a
SHA25672b95152d1b9e7e657cd6799397364842f48045a55fbcd554c4c793ab521303c
SHA5125e23722d8527fe03bc6d47f1234a8987e3cd8ccb8c04260890c28f580716cc1b7704114eace5f69e64047613484b872c418f51a9a8402057eb00313ebe18db17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50670d39b2ae44b978225810b66110f3a
SHA1373fdcacfe23757538a16e5a0919132391e99843
SHA256c1cbdba6ef714d89eacabb4234eb4de4d61ae93a73a547fc04901083dd680b0e
SHA512ad03bdabcb4c1ea6fa9809429925912102aae1e437802c144cdefaca4291400fc52bd9d869c7a017952299579eefac61e085aab0331802719fdd0b96dfe60053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9caf1cdf037b3a7d956dcd22f755239
SHA12dd0974aafe4177cd39c43c6f1dbe052750233a6
SHA256d920ef7523b4cff9ec68ceb9b66ea28de5b0bec43a7ad3d0eb22d3129e0c0a34
SHA512991d7c295483fbeb1f5a50ca74da54dc29272a8a05322b293b7a70a5da416d94b181ae499fcb73664dc845f194d6c8288c622c3e3ebe7ef83cf62cf716c678c2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63