Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1563s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
a (2).htm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a (2).htm
Resource
win10v2004-20240226-en
General
-
Target
a (2).htm
-
Size
1KB
-
MD5
fa29916f652602f11362858fc58ee874
-
SHA1
3e79b7c48adf7dbe39c935633d442d4826730344
-
SHA256
923ae78ef3ace374cf0d3674376943b0cdf1747b46de74dc5c14fda16df936fa
-
SHA512
902f2b5c73920a4610f898804cc53592de6bc62979ee092b0c15121cfd632c1c1b1d85ddaa3e2275d7e652fbb0a6f7d977f77456f1fcbbd3007861ed49781d6b
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0040cc60873da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c2306770000000002000000000010660000000100002000000040c0c9657df34d0e92f9d6ad1bd6b5487d853eda6bf5115f63877fac0113dfdb000000000e8000000002000020000000f0b31cfed975bf5bbd42336cf6d0978cebd2985f7308a0fadf48b1488dd66eac900000002020b9c48fa5584eb63c37122edad1d5190d0c8f98074f08f40e06901a96596fc02b00cd59ee834168bfb5b446f4022807740ef2179fb57e775d74fbb877f2651b2a307e81b29acda29a157a30f8fb5ee4692ec0e59a5c0943bff1159dae67cb8be12d35da9d3199cdaf8aeb9067e9f277db1982538ca90030031e3a02f0aed47e249b302eeff1ff3e42c795e785675e40000000b63e4bcf3783efbd4ad6c936590ceb2fdf62d2ef0e675a278192577bbd9bffb13ca8922ad4fff53182d89572e66d2921c6c84686e92d3e3151f05c49784c756e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416250322" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000fd72dcd63e1ca8e19de8bfa45147356685359f6f22f900ddb5e03eb3a401e0fe000000000e8000000002000020000000b6c86cb8b991478a0ad402de3c1e17eab7348b7db65750957dae9fceb558de7120000000633069fcfbd350b13167626cf198867ef623784eff181c8f68419d07c76e417240000000bafeae0b45393c3d4e8817d8fb4ca33f9bd49fb7b2eb7b84741f8702e97f604f8c1819b3468751b08d0ce050089611dafe760f0b48159cdb6295d71600d066b5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{002FEDD1-DEFC-11EE-B7CB-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2932 2220 iexplore.exe 28 PID 2220 wrote to memory of 2932 2220 iexplore.exe 28 PID 2220 wrote to memory of 2932 2220 iexplore.exe 28 PID 2220 wrote to memory of 2932 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\a (2).htm"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e697fc105176e77648d5eac15a437f84
SHA1df0e33e00700732a003c60bde1c33481b981afe1
SHA2569c247370dcbb44922225435eae578960db7ec2fb0da6bd59330abec1133c3de5
SHA512c0c73ae7bbdbd90990162b11ba93f245e5e0ac20a059293e8f2c1dad9e9fdd9737fffb5c72318f3ee52e90df19d9ac73f5ca23e6939b257740ea429070df373c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef93050efe44a0bda49537b97935bc0
SHA13d2418b48c4cb2a7c5478f479c4fa43addb60c3e
SHA2560af1631363b816c6f3ab3a83c17f189453994a7e5556b63ca2209102a8d9b96d
SHA512f5d148de1ee5ee3b8bbc9917106e2652aed4ada6e514c5f1b5e892fa014d06afc0b6f00ab961ec1ad20bd29188e7928bd3e474f935a20c936bbb8dbba0defb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9a6516c7b96bb1cc277b0005db1e668
SHA1a8ab71fe5e204111e5759bdf03aa4faad79c3034
SHA2565eb60eb4a41c560fc446342e46d1acf2ea6e43f493b95b0f3ab4aca86c9792fa
SHA512de37400905236a40e229d2dec77f3b0ae459ab5d5eacd6636442681b2d783eb903fbc5853577a5c5e6376f9a7a187e71243429f6d24a4c55910f285eefe3fded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e7042e7716c447e4c6fe2d223f9a3eb
SHA1bd2ba8ecb3a7cc72e22303c93f04fd720a76657c
SHA256fc0376b933aef1a4717582ecfc5c13cc62035139c98f690be85a503399e91c3e
SHA512560a831fcc15ccef1a8f34bca3f4ca4f389ce0f2c4996ff61d2cb7bb940f5df67858ddbdbb15720c6aec93870b8bf3d89dddcdd6b67cc3fae850c18ec17dbc48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c3f0832dbc6a28e2f682372b66bff76
SHA15d707876d4c1957206769fd9a1de0a7ee7707579
SHA256519cb2ecf9a6403ced22de172fde75175e7937cee3d0bd3113ea9d8b5ebaed8e
SHA51287324eb91b1ed8fb1684dfa158e4cf0b5e0fac72fb2c1517fb9b77e3546fef3dc3023a1cb3c59b0de5bde06b58783f67c3048f0b29f7dce917287eac12638d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c492173af7ae62755013ee944e6d926
SHA108846ac909808369dc713587f6ee50c886640ebb
SHA2560d3764a39e4aa88a00769dc396ca828d40fddf8c1b6fbc4afb47c40f6712a8fa
SHA512dae2e5dd9b77cd131093c2ce974c50cd37d8b938da10ab05fc6d62a3f98fe3dad3deb399534822877671c42e354a005095f2d9a6d438229d00f88ae6bd59ab9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37bd5af214a26e401b24ded3cf94e44
SHA10b8aac7446bf65e713f0b7eb5d6003713852f345
SHA2566ee567f8d3fa9b080a075902adc18c852d7c835d7f7ea86c8e3d8e9f16ddaeb0
SHA5128d9df7fa2581ce32198770fb7484ace2a080b46b017ca0f7402d5d8026555abe92f10fb95d68899fbb9c92c61f7635b3d087cacdc19c125d85288d67094168ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6f82280aadbc0e7f3f251ddbef831ca
SHA1f05d0a03800255a7b20dacb8f7925fe67459187e
SHA256ba515e1a95651c2e7ca29fa47179ec7b433ed3abd53426a984f1041b6464858e
SHA512a2bb45f8222ade7dd2805417347fe45fdbf5c82d73b3926df55b2a61d256d185360a29d780314478481b55e142e6f2893b705f9b9da7146ab73b3e7f41dd6242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d91ebb1765274acee7ae0fdd9fed7fb4
SHA1a8a9f657ac72c17baeeb974e70b9587ccac4bed7
SHA2560d122b03b7d0c8b02ba4f8aa72cbd0fedcc4607363267d6d9af5571175457162
SHA512833ef342ee07d3c7898c6f1abdd54ac5b322adb6faee8c498772c587321383184c37a6097288ebb039b84a279b1e36a8acff6a0dd35d255f88ab4397529f0ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549fb433b5583d35f82b77590027d4696
SHA10b933dbdc27029894da042f01a70d62c3826b8cb
SHA25612f5b5e4c9dda8712e5154ca9bdc6ef8dd319521c837d7846b98f4c1f1e3707b
SHA512bbed9cba4ca0c70b1d1b606983b68fd00ea4a12509cd57dab68c8cb1ce3e6ccad8a9e5c5f62efde0a6809c6cd882b41ffc619d13476a6e1260f85d1161ffceaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b277e455698aacafcacaaae626061e32
SHA19ad23d4aafd33f876bf57272caaa170e503f0e1b
SHA256c0c79dc29ee4188349d2965aff0309a691012b10c7bfd7c339be3adc17b7ee54
SHA512cf4db65b3b9e187299fc3aca289010895ce52f496e535664dc7bd505e8af3f50711ad2fd95a90bc85c9d35ee8384e8906ee9ea9367b179828be5b9495e31eb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5221ec5a0642db8c53905a8b468ff307e
SHA1ec9966e2c03941653db137f60a8a1c8512bb0057
SHA256b1cd5828de2a276437381e6ff0b0644773600c29401d36cdfaeae0347cca1a75
SHA5126a3b4e2d93dace54d17b3fd825326bc45aee6bd6dfd0b3cfd2caf9e3b93f5a839a315a45387b2554c3ba9f16a52dc01bd6fa57da7926dc387be393ace3fe21e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a36d9c445b24a55f4709751b14e441f5
SHA1549d6fce14c1f7e389e531fc404502732488c033
SHA256db3043a0dad38ce0381cda13bcb771dedde55dd432552ba89b5808ca3c56c952
SHA5122c38f48b22125b717702ecaa4c01c0d1c46da917224bb0a051b326cb8c955f70f3f3cfb927f3b0957ff189de77f3ccece511947b3ff2dadfbb10ad1ecaf2e470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2f878fd7035e2e907b5a4ea76793255
SHA1d5d62201f836c8d6ccda9a441dcafc1c5088a2db
SHA256eec2c8d93ac3e49dd71ce99124aea5114cba6d86d8112cf4e035dc44c8734769
SHA512b5d16d353287b598753e824d1aeb17db4b0313eacaab2d7e2f01dbff5f18b66cafe9a0173e7673a11c05e15dcc0288ebe764925b96707dd807fa67dd63a3af72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53620228be6a5588972eb836c63f016f0
SHA14e2c86eb5ea8d41d4ffc638a319fd6942bafe08c
SHA256e5dae5a2716cb2563928f46bf400abd1c1f190d40bceb1971f408f28e41eb755
SHA5124432b3d8c0d12bff3ab8a59981d5fc049f9ff254ffa0d5e68a83cc6197dcbb1f19ee16cc73ce84bac2fadd03880b24b220f2a395a868ca37079377cd3e874fb2
-
Filesize
1KB
MD5fca1a092b4fb9a0cbf5c3cf66cfe6e78
SHA1f248bff91ee6dcc3208c7b8305f54375800c3b02
SHA2564c9b2ce97eb5d502bf86c4d59fca6b29215f2aa20277c6c406296c55e9286eee
SHA512c30fedfbf7d921a22c18106b96be409a3f0e41d572f7b82411fb2335f31071051491392f7dceb361fab000c33379895d77f43eb9a36be676f5ad6296646965df
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJ0RD6PK\VsNE-OHk_8a[1].png
Filesize1KB
MD55fddd61c351f6618b787afaea041831b
SHA1388ddf3c6954dee2dd245aec7bccedf035918b69
SHA256fdc2ac0085453fedb24be138132b4858add40ec998259ae94fafb9decd459e69
SHA51216518b4f247f60d58bd6992257f86353f54c70a6256879f42d035f689bed013c2bba59d6ce176ae3565f9585301185bf3889fb46c9ed86050fe3e526252a3e76
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63