Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
c54fc6805802d0ee6d9e8934ced26f19.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c54fc6805802d0ee6d9e8934ced26f19.html
Resource
win10v2004-20240226-en
General
-
Target
c54fc6805802d0ee6d9e8934ced26f19.html
-
Size
26KB
-
MD5
c54fc6805802d0ee6d9e8934ced26f19
-
SHA1
1a9e8fce1dd7a26c95a83964a66df0bd4eac23a5
-
SHA256
e9fe0bc41199e0cc8aa801884c0d8ab17fd6fe3f5043767e601f3162b8d9b793
-
SHA512
44b8e6f6cb8f0fa6c18e75077ae7d23cad540a4a2a961b70d9fa37f075c103f6fe1315e5fdc1f4bdb8976a9a3582f0df097fc6c3a6340716cbb8b24528705a5e
-
SSDEEP
384:4+QfPFd9QZBC7mOdMciBKfpC5IgSnbmFe7AciH6JCkJvAgo0iHAAPd:Zcd9QZBC7mOdMcPpC5I9nC4nIP0iHjPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000008da1af0637a02f555c67dda07dffb6dca407bb97e60f9b420229fa4c7aa8dceb000000000e800000000200002000000022cf35ac3e7d14047ed7eab3977c10befe0db1faaf08da582a5d275f305de5fe200000006643a232eaaa45b24f081ff1ab5f1de7a71a34a353ea9f8e024a3eba25c4d27d40000000b1a32e5f7cbb6f1a65253874f7cab05e94b984eb44560f1735ea40bd5139d180a43705643af778a5fdd29fc0eefc1f2d67e1e9779785a64d00599ff62884766f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416476662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03C2E451-E10B-11EE-9CE1-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e044dc1775da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2552 2176 iexplore.exe 28 PID 2176 wrote to memory of 2552 2176 iexplore.exe 28 PID 2176 wrote to memory of 2552 2176 iexplore.exe 28 PID 2176 wrote to memory of 2552 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c54fc6805802d0ee6d9e8934ced26f19.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa4ff23f72b1f5c7679b60607906a25b
SHA18e8e19daffa4ebb1ea49e2e5942adaf9622a8094
SHA2565a84a3618b612327f5c6908b020ea6e5bef67f3d9866fed2ac0d94b2f884519e
SHA512ba48b4a8595d9f72f2b968985be400b4fb619e5a9193239fc049d5b272bad62f403b2e98e9db2370c7517f1f9d6a9a68d06e2afee06bd5244f27bf497e251b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e5956354bed637f3a079214860038cd
SHA1991346325608fbc2e6898de6ade03fd9db5aa7a1
SHA256d2b25a244d677862c1d4a65254a537fef0aab7c6cedb5350fd3ed6f799e4fd82
SHA51298a2026f2d8f9dda45c52cbb8e11a858395e8f32417136043137272e83f2ca41028bfd275d152d6c5a8a735610b95c584b605ae9316fd5b6dc2b85ae11eb1b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5b587b83e71b0b41bdaa33281b3a8c7
SHA10a753be579cd33250a200c0fbdd4d76793895fd1
SHA25617191f619a634ea5b045f6c8d56b775dbe5980cdea3b18e90ce01f3e67882c34
SHA512813dca254e32dcfd736cfec7e69f24b5c908e6c8340cbd18edc135c27b38dc3935d01f9506d6795e0e89a6877d665574b2751ac5d23e6be5defb1b795d901dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59297b6eec6e37105d64ea9dac74b3173
SHA196ef61f0910124d9ebc734933bdb2c2f25aa7d8f
SHA256928c8c66b5c776898a10c7cc3ac9d6a95c998153c2a4f0b768494a5490d097aa
SHA512fbc82a21f8fb898f731b8d9292dff67593939cf2f106722a51f2cebc1060084529c69c3e464c3ec21e4e42b5a54e125bf3b94dc0433716634e998cc9d24f3ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57603280e7005cda37b61b56c192f0000
SHA159e3eef7541efda916aa20c9d0f038d50acf0583
SHA2566bd9c59f39717357b5246fdaa3b5283ed55e956e12c4dddb499258293158d5b2
SHA512df047a6de72ea89de4c7f86687e289e67c8371c93ca6565453e90631cce26944882bbe3e6bb460d897705cbe029b06a8b5bb40776fbab4a897452c9b2c538020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daa9b7872871eb10030613ce4ec144a3
SHA1f0740c14cca20983e98e381d8a9678d3cc450c3f
SHA2560b1292ef0882bd243ccb0591dd0a8156108ef3cf7e00ea4670bba66b45306aee
SHA512ac36af87e8906d1ce8f3f7c130e8674e2c33ba69fd0de03b37382e48da61900d67cc312900bea0e969e5ed5bac23c56e1606311398e181bf889e3a8fd428ca93
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63