Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
c3ae0dca4c6e07b94299f2fb7e9ad4fd.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c3ae0dca4c6e07b94299f2fb7e9ad4fd.html
Resource
win10v2004-20240226-en
General
-
Target
c3ae0dca4c6e07b94299f2fb7e9ad4fd.html
-
Size
11KB
-
MD5
c3ae0dca4c6e07b94299f2fb7e9ad4fd
-
SHA1
be8a561a7cfa8a2ad15f665ebad74b0379f93e00
-
SHA256
917295d8604747fce73c6e48f27c47e36176ca1743c18ea58eff4a37dc03d038
-
SHA512
ac4d1a56b6db0fee038c58f99e31bc6a5ac126b35f1444ecde35ede709d6b1be7febb19361834475d22f8203b714b002bc4b6faeca88d5fe24dad5829b67a8e5
-
SSDEEP
192:SInUy7sm+/8GFdWI3A7eelvtsFtSGIkmeGsRljtp:SInUoFsFt4NeV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2357A4A1-E083-11EE-B7A6-525094B41941} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000004a859b9d839dc0495d026d55fe8715ee2784d9c42c4310fa093962416d0890fd000000000e8000000002000020000000ab5a5d2d41e02d3e5481dc32aa5c593f499b8cb3e4f9716ad2cec947f87808b120000000639c17f2966ac4553e22ff0230b87cffd4d19b74af5488deb1332f86ad14d4c54000000019ca0fed81e66f62bbe0f9dbab5a145f77f3e7e94bf4a7735c20f8a6f916c54d4104422d6c0f991a207466744625b192f1e56f4627e5ebf81d7803cfd4f577cf iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416418305" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a732fa8f74da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2368 2212 iexplore.exe 28 PID 2212 wrote to memory of 2368 2212 iexplore.exe 28 PID 2212 wrote to memory of 2368 2212 iexplore.exe 28 PID 2212 wrote to memory of 2368 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c3ae0dca4c6e07b94299f2fb7e9ad4fd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560759c47567857b1e7de1c9bf9eadd11
SHA1e82f7fe2ada4a2908e52894ea79acef6011ed36a
SHA2565eb9f33f1bc33f50aba75e0669c294943c08d1763e2f39fa1ef9b6ef1cef3ad9
SHA512b1e53233137f8c16e50e7c0a9b4997792f7cda4cf1e6ee62fa730743c4d701c821081cc2c43c6e0a74f65d3167d633f06018ec619ba5bb25562d38d839d08ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587d8177a359206d998091ab13c167688
SHA1c963c116dd5bd2177d8f80eb801afb3798544757
SHA256f3ba352a97ce38c41baf85f0ecceec51bc8284bdd261af5e220067ea6ca4b24c
SHA512ca8b5e561fe5c385d13c5cdc35996a833a16d036edddf501c7c8124aca5c9e214e028102563ac79a9eeb0db72537c032e1153a0036d9b1e68564f660b2ac9bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5931b6f8aecb7942aa67fc4e9b3fffb15
SHA14f9022452712ad32d0738070d1530c89e3152f2c
SHA25608d2069728dc222857ac3fd5c7657bbdc7b4a297f4342abb49a0e0ec5cf9454d
SHA51242cdc058537098978472e22b479f005d2456f8e0dace8a8164cc44b3d0c6ca098440ca20ee5a11fec15ac2149833c1eac519e4da7f6a8ca4d3e8ea67fbf87cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5803bd11a840619d8e805fad9219daca0
SHA1fa7f28d6b710373c461d7ef386eed77d1d577867
SHA256cbb4ef33b15b697311858946640162bb8813367fe0ecfe781c35b416911ba9f0
SHA512485977eb0d11e9c6267df4c63889a3eca3f00e24d3ffb1b62c7ba8e27d8efce9f2a1d73fa72d72715a95c2f259fe616a1277174c7ea348254ed2bcb3580d296e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8e3e8ab971b0988f0b3042862c7e259
SHA1f1cfc4f26b1ada83597181a371158398bbed85c0
SHA256e550b9c6c7a3479e1263cd82d1388671fc7fe70165b7d4551b32b5d50f8c8eec
SHA5127b4f76b3a0725c3a5db4a8d074e2872ad3cd1845d46fb4107339fa5085c1f1c7a3cb65a954b96867e464696deb06c2f802bd90fec5e6c241af154c8efbba3705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508018aee362132b9b249dbc8c22c39a4
SHA108d7ad7f147256345fc5f826e84eadfde42c76b7
SHA256d9e08ac48a970d8e1bb548bd202851afc636ec4ad44c8f16b95409360fc1cd3a
SHA5123b639b5849e59045e2e68595f9cd96d1f99d81adf7cc3f876adda76c83a20ce00974971402428887391ea420a462cbcf5104a17f3ffc4e0dbe398a9d040b6e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86b3f8ae8ac18aacc5c058cc913b13e
SHA18699500e9b14b800aaeb26acd06d53d707103b51
SHA256ba239e09fa49f6299e8017a043063331dce027b7c5fbf4e6b2087204c350a552
SHA5121d1fca8f32268a23076633f724014ac1c0fff7057a1a6070b3842ba22c1a05385363fd78ee62382e797b268fe323e4c9728badf0ba677419c1cc0b2219a1ecbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a0386d190c9f6b796c21b799fda49d
SHA12a4b968f0e05704cb2dbf2f644986b50ebb3b6ce
SHA256ed038b1f6ed44ddda2a03b931a6be0c3895d517115905b7e005fd79b26ef415a
SHA51208de0b8cf5989dd6a853ca7780ccb4ae677d31a926e0c1d964ef9182a3419871f20ccfe2a8b2e420cc2df2cc2dc2787bb67b1f4dd5cf156b193f6cecea807fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d59c8c391b318190114a35a368b435
SHA13d38393d7a75828e28568cc54a62ad7076eb68f6
SHA256421d7bc866a11d1a88ade6eba3a8ed99a75fbc21da1e262c910e967598e4aa92
SHA512e60a79b4215ac31ce114607897493b738713e88a32d9976cc9225ccdba4053b89958775a3f7e7d519eedef9f4e6aa594519bac3b37357b6e354aeca640d9ffcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55458992d3fa38ec802d40ae019abac1a
SHA1ddd449bff66efd5674b04f5c5d8935ba6aa551ff
SHA256476726a784b60f35955a657fbddf4312199a88923f81a035fb2b5b21abc8c11c
SHA512f55f9177e8c9c4a4bdfc0da48abcebac6916e2f94c8c1816d7eabe5157ca3e7fb131842876c7ba0e46c96387cd1beb76dd58c55541b49619ee7b423cf957934f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c4a5b765232d800dd9c619069823d85
SHA1d7a3195c95898d40d689dcd4fa92d7cb9d514548
SHA25619abce2d6176b73a6a1af0c73b76e554e936182c3ade46b6a3d2ac59ea169232
SHA5127e20ed409385a4abf0982abfa050b3a51deef06a8f2d8061fae5f002e03eea81c0db68683cc0607a8b5472b63ab37b66c40e0c7435332352245047b7a6bfb662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66e28ae555392b1aaa02bbfb3448a75
SHA1e8f3341969f3b45122a036b4835a73f9b1c2836f
SHA25614edac258d15490fd5540faa7a47d897adce2b45ee14071b29dd345b5f2732ba
SHA512a3283e189b17e84d0c347313e85d4b05aee27a7c19df8cb3270b48a72850f0c2e31589b3ffa713c9bf314e2f998e99e70cfca5dd2c22f126dee38ccde921d457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564cc475488c5f785a30f2222e98f23ce
SHA124cb460398711a344b4c569c93c6652430f2f9d1
SHA256a569636e2a2802587eb6b63b99c4ff7c4f81ab2fcd33256980d5d020ca6450c4
SHA512673d56dbab4efbbc7e50f371dd189f1a539b5c5a330c4bf80f8aa4e4da09489f07cb89d1f59f66c25c6de1a29f87288c3cecb115c34da666703a92751582fc6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d34301c007222e40da1e8e6525713a6
SHA1e9ece2eb2c256be6b6e3b891691a59a1794986ec
SHA2563c93224d2beb6baa3c77eb1177999c30359920cff6e8bbef67d850125254f6ee
SHA5124db161e39b5fffc8d1e4f09a362e6e584c625a6c924645844c531d80a6d2132e9b2362abe08cafe7e630cad4fea88aa0b71e492a161f4091aa37530f0e0cab73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9a24e138e8462ef9d2327f6ddd2c5f2
SHA1ba4645eb12ed21df9f571dca43776eb576ff8dcb
SHA2569553e41ba8accf65bbb1dae3584fa63b6444966f959908a0049a64a8af9f4083
SHA512309a04adb51761081feec9c960fcb4864549b084be16b670ccb578b23ee9b28efd712d665721b8b4f958f7f9c09901cf7276fad2ffdb2f578af5225364f371ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3be7d4fa552b1e6b4c6f4a9a86b36e0
SHA1a0062b835539eece1a5d3df9aa5f7ba32746c5de
SHA256f49d0295b34c662af10fc02ba895e68683ecc2872f419c7b1fb506d24275f4be
SHA5121a4e35b1c724ca94a3084714ab4830d54d6bfab8c8b4eb1dc22724f8f11cadcd55e27c10efe4e25ba142ba890287117875ca6bcfacdf09a1822a4fcf2ab0090a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eebefade7c9e1286ce3b51281ec1ed7
SHA1983987d5f473c3db5451086a0d6339de51691f71
SHA2568e736d990de59faaa6580bce255e4ebfbaf4a8ee48e2c3a045cdcff756b3c357
SHA512d1e88ca6299c9bbd90e2363993aa1d1401d2f5f7ea8fe604de939c9b53cb6e9293b42d8e56e89c902da5144fde4d4d27201ee376b94f6e013e85598fd9e82efa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63