Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
c2c22e5fe732a11fea1eed2b42ceb11b.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c2c22e5fe732a11fea1eed2b42ceb11b.html
Resource
win10v2004-20240226-en
General
-
Target
c2c22e5fe732a11fea1eed2b42ceb11b.html
-
Size
108KB
-
MD5
c2c22e5fe732a11fea1eed2b42ceb11b
-
SHA1
eebf7ec4c22ccbffdabeed9d471fed2c7685570f
-
SHA256
9ad4184b81140f8f3259526892bf8943a54dbae6f45a6218a007378382c99b28
-
SHA512
f9fcacf4656ae05668351044e30a8c04d6cbc607d01ea7f42d532024ef29618c18239a177480bf1e0308feb51baf53def93bd916423037ff6d5e1dac1326ef98
-
SSDEEP
1536:WOFeR9Z8X0Qm7Hi5XPyvyKYyLkeXPZuM6OWxBn8oZzyQ1CGWxLZl50PPR56utgpu:m94s2yvyKYyLkyZunjrZyZ/0PPfDgpu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5242D081-E03F-11EE-9E06-5628A0CAC84B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416389177" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0edd3314c74da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000cf91915dc63844286ef5626e8bee41f00000000020000000000106600000001000020000000fe4a6b3af147f0e68fc007cb228c404527c91eed4de5a22ff8c3b45eec56391f000000000e8000000002000020000000e43e0f9f648dcc969713c05f0c5acc6f40bb570db054e3d6ed9ddeddaa8a752c20000000d8db4a2d1561d2310aa99953cbf28cc16eaba8e948c1ebb7c7c3c4341312109e40000000c83a17a42ebe85b0425d0362faa4e1e847ccfa7aafee97e911a3aa129c306440dc15191b6f15edcc344191f20ad0d2f5f0862c9cdc0e237970f7320bc681f3ef iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3000 2380 iexplore.exe 28 PID 2380 wrote to memory of 3000 2380 iexplore.exe 28 PID 2380 wrote to memory of 3000 2380 iexplore.exe 28 PID 2380 wrote to memory of 3000 2380 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2c22e5fe732a11fea1eed2b42ceb11b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD562212e66c9ef7ca17bb991d59a83ae18
SHA1799d4c093273ab923d8927227adfe17760027866
SHA2563639864c313dc526b9eec3138a00eda3eff8525fb3e0bca1ff01586682c3f5cb
SHA5125fa6a9c8eaeffd9f9318f947666b1c2446dbe19238de587dda9e17ce9e002ea0234361e13f84fe4079cb9e42bacce88e43770a3be7ad7673307147c557687d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57671f0de1318ed4a98ce776cc45e79db
SHA1713424fb181af826baf55eda7d2cf50638e38e88
SHA2562211a7bd8323f461ae8fec857e6f34e006eabacbb7d2bf6ad5a8987087c0a0de
SHA512af171dc80cf3cc44c40e69e6c75fbf25dc5094a13a96e46e948e80f3541dd480fb268aab291ed20b3f8d8378bede97316338155bc6612f3f28c128c7a066815a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9b4337a86b193ac53f3f5e43e9367fe
SHA1746312adcae6dfdfa49e7b6e2500d50192332c6c
SHA256ee714662ba1bdb3504cfd5291970472f8b947a04a59513512a52bb3ade89c624
SHA512d4063cbb9886feb1769951fc2e449d7137b1886dbceee17cd36a8f3eeddf951470d5d1233276ee15f42cd23e39631e8ee001c0e8bcaeac1eb06c60a4a3b13ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9108d134482286a5b8b2ec277256bb
SHA1fb9a5eccca68ced4ca6e3b7b154c63bac2bd324c
SHA256cc40ec662cadeb272548cad8133adb1cb2ef3b08f5d02ad6c0dcfc8d9ee884d3
SHA512ddb6bf6bad4e56ea8c727fe565dc3c9d9584c4f57610c9ee6497d1844bc7f494adb965d3f58919dbbde3d53af4eca1b164a71e11fe9f9b86b51a139f244706b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f541e5e556a8b7d9597ef78f993951e9
SHA1df95ef524851ace337f34b7e27143511e6a32d66
SHA256ae796e16e28fc825a83da64d722e0d4b9f7113964b1ad0b6495cc879371e17df
SHA5124ecff6bcbb549fc12253cf7f0bd973b7e7bb2d1d399789f282e675f7305a57fb9fd44e308995cb37b9c092631ce6457bc87fcc05cc9f98a6ee33816991ee395c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d651d9aa50cbda1ed860192f1651b8b
SHA1e93665f823b5feaf55839c8fec0bdf571abc1d7b
SHA2564e95f965065b01f17a134e3481605202c557c6cccc4322e43a273756a09e132a
SHA512d872e6271d44aa6090bb226b755b900a1c5d8959850c1acdda570e37cc91b6201498c7777bc3f3f1fceb1e499e78696a01c6d0fbca979c4e0cd06debd45e5022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b4ba2520379f52de5430f1b84da0258
SHA1766d1d9a322ec75fe706468e80761b762bf54295
SHA256750d529a5be3b297796df33b21ce82a2da43ec5be9adc3035a2dc988b7b5ad7b
SHA512774b8e416cf33dfc373564728f977b3eb02f96ec7389d862fd2bf42be4c95265efb6d25c817063cbf9010b8022f64645cb4f689e86bfe1f30a407727467a38b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7239311f84d8e5e0b0e2c5bf05718c9
SHA1d57fdcef75dd98c0b55e85595db03d6ce895fe62
SHA2566374c9834e4c09b5eac3757481a7e21c9f5ce857a9d88eb96971e502bd304d15
SHA512694885dd7c743956e4a4de67417f25ad723d35920f8ede517a2f0d1e3a052a9fea25a0dca90cc682ceaee6f4129e228259201bf6c9560edc0cf8497fb2d80b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c3fe00b9e0f285d0adc962a7bd18cb9
SHA14a26daf88d090e22fac334d714c9b73ab2a2ca04
SHA256d78097f49cad8c65ea3c33fdfcaff08f276c9a1885a690daed6adeea327a636c
SHA5123eb0a337920852dc1ea21b75af33b0173bd97fe276cf1275edf6f148599849083d7ba09000375946611a555aaa2b1b5b35f1e566ef570682a08f6c061b605fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d3002a93d117350390c9d0a9862cd9a0
SHA1eec1ff55b1a7b74009a87fbe5d45adbf7831dc58
SHA2562ea91126e4d4e61093ec22750a4db73d027305950f7cd360b48566ef928e28a8
SHA5123fa9a10a2f30d7f99ed42c97d7ad7dd869db6606acf0dbb9ad865ad942d33642dad63d350feb3626d4e6e5aa15af44dd371d49a5f1c85101699c363680683bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63