Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
ba90450ebc35ae4510139b04b6f92a45.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba90450ebc35ae4510139b04b6f92a45.html
Resource
win10v2004-20240226-en
General
-
Target
ba90450ebc35ae4510139b04b6f92a45.html
-
Size
41KB
-
MD5
ba90450ebc35ae4510139b04b6f92a45
-
SHA1
ec5bdf000a3ead717b36c104209d1705be0d3c9b
-
SHA256
6af72a9c2f60b5747d03406e1ff7ba3d7b068d00dd0c4391d56e8039c1ed9429
-
SHA512
17111b86cbeb770f11d47f6e006ac8a85441f8a73c5fd606978bcd0ef91e7fe704f0d10847a36ab1e103bbfd2374dfe1d4efe33197a9ed80918f5683d7e755f9
-
SSDEEP
768:/beBNzeGNJx5ofH8DaLNp0twcUwZjl4yaqall2nGpyiQlvpFU2pKj:/SDexp0twRjg0yiQlvpFkj
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000058bc6226ef0be864f0c7ca4cf2aa5ad7eb3809bfa4b8880430602ab338342329000000000e8000000002000020000000952c1fb21739d376504db357afcc5456b5de9560efc382c99137b0f22fda3440200000001ecb5432037d2f7ee40a5a86aff691476d80cd900093e8bbb9af76da9266d68040000000b4abdee2d689042f3ea5d7b5990b6336c78476b8bd1e8ce0a24c1eccc7b432b048ebe1fda3c82c0dfdc8235517461dbd31b8f4d2f42031b4f06c7eb0a4f33304 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416035514" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC1BF571-DD07-11EE-87C3-6E6327E9C5D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07f4cbe1471da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1680 2300 iexplore.exe 28 PID 2300 wrote to memory of 1680 2300 iexplore.exe 28 PID 2300 wrote to memory of 1680 2300 iexplore.exe 28 PID 2300 wrote to memory of 1680 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba90450ebc35ae4510139b04b6f92a45.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5a757a2a5fb2249733650563a36836fc7
SHA10e3f0f05d3fb61398e507bcde88a32ec5a88b4a8
SHA2565b75679110beb7d514c1f6c7b993cd540dd29856da2e2e995bafb70e77d2bf4b
SHA5128ed6aa61e91d640f2a8983fa67d937b2abcc5f5c43375a739773b991414094121efc4a049436dd39e45d8e627e57779f1c89352a606dffa406382d875de46b97
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_C62530F37AD5C5022195EB4B959CB082
Filesize472B
MD5ab83e9fae0a140680b7509bcc6c2e97f
SHA1c2d527f3cf4a6b68de579136945f2c425fc0da4b
SHA256f8e24d5abf571ac5f29fcc05715d290e4b293b264e5899ae75de83ac5d0994f2
SHA51242bbb4461970aeefc439f76bfc90a6b7f0f48957fc559c2eccdcbbb3198160b6c01fc65b61269cd4bcda3fb228c604f0d84141e0d1f121a28fd1271c0eb97344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5c9b0ba7f00ac10a9eddd4af356f22deb
SHA1413294c112bf65b12c584554637fefcbcacf002d
SHA25609b1d3abf4bc0c8213bea808a14852c511f972577b29be8ea02c898c8134df62
SHA5127658d99c9ade2d159aee1b0d659242bf391fa0f33ef7c195c8b43c9f5854ac408c20263bbe140bdd188ea28384c2feb5cf85cfc9d8c619d010b8a0d409c6d5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae6a710c60dd5fa4edf7d56e6f90663c
SHA1de8a4be7f4eb2ea9026f0430f142e78d42a5c4be
SHA256845d6f20940dcf9a0e549bcf1e05fcd38a01b3dbd6c163df710fa6ab7410cd21
SHA512891a774b020c926753d5f4d5dd87cbbe213bce879d63e813d95979c2e1f3f70b52018697c697cb6789314cb971e544a4ae73dd6e0c793b5f548b8e8343a1a48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52345913d8704f2c7a9af6ba0ebd2dbd3
SHA1bead2acb6a97e866a5081322d31e682300729b7b
SHA2562062a11fce7224d9fb9ffdf192a1d21a8caa7a3285e900c06d695ab7e04ee894
SHA512b03e6c653780a092f61ef3aeeea06c989e51343c793163cb216b2b8dda9456c1f83df8070d818c34638a7f253a97e64784d307ab3ec1aade11f66c31575b4819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5e54bd9a9b68a7f830a5c1c824f4a7ea3
SHA10f2345d66093fa02d7d3600aef2517be590d9f4c
SHA256019aef32fddcd4abe3cf096fe8c2239642e1903eff7325bbf7da48d7db89be0a
SHA51268b5db659092f58647dd081b296f4684b9c85d1d3d989a345d6349d9af695251adb157f03e55a68e33dd4135691db40760395b454bed2f5c867a999a52dea8e3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5bf78e91c4b8c660626008446d6d30703
SHA1db09dae5dda987e24027a540e47650cb970e31bf
SHA256f554260f317f497231227b9def0144f0bf370ae71cdd7a54ac60d0ae1a56e096
SHA51215cf262865ed7a9aee617939501430586460eea04599e7c09f5b223ecbebf454450e9e6ba93b81e6e1a35b1039d0e80039bd4d4c768dc72ae5e3bb3ca1f70fdf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\cb=gapi[3].js
Filesize133KB
MD5c8be3350843695958a33474aeb3ea8f1
SHA1ad92694d9b189ee479c1be438636e39247b216af
SHA25622494eb4f5fc2ef8c229b9df2e171990687e4837282655145cca0fa302af1278
SHA51254ba5d4076fe9fe4c4ac22f45cd7d2ebb4e8027d8b8f82580436dccbcd60fa2adbb948ff1234d9912c663bf1fb33ac834007850f5a3f2abfb96a7a4feb110bc8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63