Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
c0f02b8f49013110f84bd81eee4a1c87.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c0f02b8f49013110f84bd81eee4a1c87.html
Resource
win10v2004-20240226-en
General
-
Target
c0f02b8f49013110f84bd81eee4a1c87.html
-
Size
1KB
-
MD5
c0f02b8f49013110f84bd81eee4a1c87
-
SHA1
f7ff8f47d5c27d41bbc6e90b7460cea90bc7ab57
-
SHA256
eb68966efae4b23d62d99a33535b442c94fe824e256da7be5c2d618d45ff1211
-
SHA512
8002dadcc34897e8f9cb80bee81a6da864fcb62baf5cd97ef4ad749073764a042ff2fe2209f6556aeadd421ccaf888743a08f632709158d019b26e499cd7a2b6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C2C52A1-DFBC-11EE-8A04-E6AC171B5DA5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000c8157c934a209a3743e44674eb5b09dbf6e0edc7f547ef07d5b4849958be1412000000000e8000000002000020000000de1b99d5a28d673793356e3424149b47e7417fd1944af098fb5e14773c58531c2000000031e28f6f530ccb9a49e952647b48e110537a9df49e72dda94f35217dee8768a1400000006bcd93466103450848adbab576535318a7fecd7c8cff16b2d81147529590ce2f34a104b5549dc41011d4c5bf603b7734ff7b0797555806bd19a2f963f1d5ac6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416332846" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0092a06c973da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2112 2968 iexplore.exe 28 PID 2968 wrote to memory of 2112 2968 iexplore.exe 28 PID 2968 wrote to memory of 2112 2968 iexplore.exe 28 PID 2968 wrote to memory of 2112 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0f02b8f49013110f84bd81eee4a1c87.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b7efad5b690037484014df5d1287a4e
SHA1e34c82ae6b15cdbe2cce0b5b6b63976263a4ba38
SHA2566cbeb5afbed04a509a7abbc7f87eb43c18114a52cb18e665ec511ee93d731733
SHA5127f6547790bea6a5ec44171b017292528c66d80b183d1356be151ca80218e339ac61120ddf79fb4f77bdd76ac1a57710ebbe71ff14bedbb0d88b8c8b82d922246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c79b02af4d2d40c2a558d1fc17e1872
SHA1bb445baf1ef47b8bfe9a335274d5219a7b1a413b
SHA2561d78405acb3e51d6a31713ea21c258dd79933479ef0193009b705568e96e02ef
SHA5122635ff6a58dd0d21c53602b7a3031523c6a577d68b80ab0a2832d4ea5a83ef633f857a49fb7892e5b51ac167eb43deeb9a4d3b68044b4cb60a046599dba71bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce8cf15a9fb2427e0302975871ed76b8
SHA11763ea6e3b0c75841ddc5d93c04a6d95a6f45579
SHA25698230a84cbda64ea9d94b818f4bc3cb635a94f6a37d83b0af3c4a86d6e5cb040
SHA512c8537c494c709f90dab70d174384817fa1bd9973428dd9eddffef5079f1d36f2dc377c1520ad94a728f3c6c5b47f6a4fbc14b5bd7afb1d37e3f590f230566d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c00e11f1e6580b559a970013b536d9a
SHA11e7c037205b6cfad1d769bc18328ca21317d5dd1
SHA2560f592deee2d1ac4364aa6c8c9a5e93eeaa83755eb30fe2ff8c561e6c013d0c92
SHA512894d078bccbf25cfe31bebc2018864c498a1e19ba66a451d1dce968fb5b04fd6f44ca8cf7dd92022f439485a21c2b94be176a576293a9b1d6148bbd61fb9dbba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e70a8baa33c21d445bf77fec78a75db3
SHA1707f573716bc4243fea56d0cd7f8d3d1510683c5
SHA256ff64e8c95ea4d4bd600965664921d8822e753a8d5bde73ead14faa0894d72abf
SHA5129171470e8f9cfdbc02728664121da4e1a022554b23717bbf71adaa0dd66dfad1138da52e980a098d954cc7ba367c2a8a30b86bd09cbde3a8fa4e6560d57b7db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5657158efbc2500711fef597c7a1ced86
SHA1031b497805da892fae3f15d1de21f2c220d22c92
SHA25621f8d0933565ea9233ae9dea385743feb64b981e25ac2394cc9c73d36cd9caba
SHA512568a0fa0963fed8575718c42a8e2f4c530ab316d8bcac4e9f5c85cd57012ed8f7a37686c96c6cc8b6993d35b308dd0f84d72683aec17aa2719702eb09915413d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596adb5bdf36716a83f68b482e4df4800
SHA17a679edcc49ed7465938dd261ad74d91cec3d067
SHA25662f68a21b6ae37e98015ec5b8dda9e40925d8058040ddd05372425087a647d6e
SHA512ea1e2edd28224da171dd6f69d016614dbd9c5b089b6bb8f5701721e17d64f17460bf6a75b5f110adf7eba66ad1ac43a27a366d5982cd84b63aa99c16573cdd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fa31844bebea1870974751b726600c0
SHA15bda5aec2e392883af3ddc2ff34dc70117e162a7
SHA2561c9a826d1d92e72413a5f43460e50c2505920a691894d160a0f70d70d465ab68
SHA5121f314489e666ec76a7f32ebbb6428bc5ebb41b7c46dc6664ce7fe1765cda6197bbd3f9a2bd71b5de652667be13fda8970e57e3872b40c355ededf3cc84fc99e9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63