Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
c5953b1d85e1f6d2c1519ac037a4177f.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5953b1d85e1f6d2c1519ac037a4177f.html
Resource
win10v2004-20240226-en
General
-
Target
c5953b1d85e1f6d2c1519ac037a4177f.html
-
Size
3.5MB
-
MD5
c5953b1d85e1f6d2c1519ac037a4177f
-
SHA1
eb7c4033a79abff650c8626ac232e913bb8a521b
-
SHA256
9ed8be27a8fa2d8490d1495c25257428a4be06f893566f618c35ac7840ff8f08
-
SHA512
6c4a3cb6d1b77ff558f3ca7aa05c003fa3bda700f04be82e9ac7ce9a16bdf4a14122d90a1aa903ea9658b4dece439acc3d725ae582175d90bb6c7feedcba7b3f
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Ny5:jvpjte4tT6s5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416485814" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01f7e342d75da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a27c30bbdf98a19a7b9a1728a5a02f039e8152d313f7bd425cc9e4db34eea556000000000e80000000020000200000008544588b432713a7e9fc7959e99dfa382f7881261905b85065ba15622894eb9e200000001b73e06ad0dd6189098d91a907bc9cc2ab2e337f80e7c526797b7caeeb7f5b3b40000000c85b24fda861fe4337f838ab4850230e3808b4927c41cb14236197f256d575bd446df878afc80e8af7d9979053816a8e36c5de416dbcc3a37f1461707f05742f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53115D11-E120-11EE-873B-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1052 3016 iexplore.exe 28 PID 3016 wrote to memory of 1052 3016 iexplore.exe 28 PID 3016 wrote to memory of 1052 3016 iexplore.exe 28 PID 3016 wrote to memory of 1052 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c5953b1d85e1f6d2c1519ac037a4177f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5151f1ae723b275a323e5a9f354b30b3c
SHA12c398d78449a05d1bce8101b992399dfae16b29d
SHA256925bdee609c0bfcd31af6147978b902e05d8674c4d07df25451bd8dd6c1b28ad
SHA512cfd8061f18a833132e01550acfec9fe70c7e6c17b31521d57f1ef998ac014ca612ced85e2988fb75ecdf98fb07f29826905837bca5f5a0e6611722c9f24ab61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549fe4139aacdca4772b4c7141f9eef37
SHA189b8a0a8bd03c0ced5a907d9580d390cd5770fe4
SHA2561c4b137ea828102c1cc9babd7c6bddc670b7bdd652e338e44f2bc5b720c08ad1
SHA512714b7fc42da0a632c81e7d6d8f2dcd098624386007719c007520285893543f1ec7be6d18d54e1e86077df350199921a3971ee48dba730ad19609167d18ff7538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0cff288620fac252418203bf1d9bff5
SHA11e82a0a90d1004c885fa047821d0737328fd03d3
SHA2564a9b81b6bd4c504d0db1900f270a13afcb0182416663c0f2ec279836fd0b6790
SHA512820e2cf91ad56cace1b461a0069233cafc73e53faddd80364a4fde720401ccba36ed32b5f8c81531729c10b5cad2f311a33aee346d133075a1a9870b09b02a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef77aa941cce5d6c44fa3abcd14924c
SHA153b97f0e6eb6c6b6424d5d4aacfd48c0e2dfb2ea
SHA256fdd67c355c3df3a805f15ff24caff3dcaf1036ddd7cbe9d220fa586a656f5cc5
SHA512535fd2e7e62dd06bda43078b8870bffe5c379569b099b4ea35345938a1aad48be58069756065e1bddb5b15357373e9eaca79a3a7313032b22f7b98b22ceef521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce2a88eda0c02b289c5407da7f602102
SHA1f8fe39efb5abdadbcbe3ecab54e7108b964f8254
SHA2563bfa226307c0ac3b9f301d6510103abed5247e7420b8cf20a79b05af2532a009
SHA512bb47c86694d22d9d839d9a0d7ae32ae0e5672a2facbbe11e33440637de4731663c8a158b3fd711f1e589b05899fb473668c8187368f7123e11214920cfcd9b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d1f269e1f64acc3a87126bc24158026
SHA184644c5f52e118cbdd3d5f071a21fbf9cba18993
SHA2569e2b96f5bc6b0ec34059e0636d927acb3d5e12d69e5b7be29bd4945e9efc227c
SHA51238cf90c5530bf3f913cae8a7dbead89422b30d21df57ba39ab720b6bce3d0611f812c5848fdd5fee5cbda6300345a92def9ee0bd5e8fb2b8681adf08f0571037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caeb1144c52efee22c6909d8704b0a30
SHA161799028b1e82364b55723f53e1fe4b0cc64ed0b
SHA2560a7dc4af1989a0a2462b73f7c7d154e08192565e2b1780ec113bc84913ced87a
SHA5129194f5b646a7c549324031e477f30efed91262aef582a43784dab5519f56eb831c8b8b3584c6f93d4138470d16bb9a354aa35ad841a0173d32927d44dbcdb856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2226aa8084e64ef6ac40b0a167a45e6
SHA1944714974028a2b69cad4a1f93f859f2ec09fe4b
SHA256263f72cd2cf71a3650bf89af0de8b4ad27ab25f553fbbed2e141afabcf95abb7
SHA51263af4595bc2efdeb95cc5649ba8c8750af58479a96ca76ea4eba6439aefd16daa02608b7f4338d512a7fb3c2c9daf6e450bf683f52d0a727550130d3a381c867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a5aefc998bda49fafea64668db2c58f
SHA111ea10f95de43e4bec23032d67aa5a19b7406c0c
SHA256721beef008e2356ff3d973cece8bd40feecc6b598528a06ad83e834b324ac9d9
SHA512e79e2b0dea868faf184f30b3fef101c6dc1ffb529c912d1c7b05ebd7412ea4875b7e414ad4e89b2e989b7ec2a911af022defc893de1383d0ad23de358e87d1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94dd0705009333745b6b196129d52fe
SHA186ac433e0215770c4500d6f29a3b714c6067b1d9
SHA256b2f315a5e2839acef95d9e10007b49065560f34e8824247516c31b59754bc560
SHA51227a300ddd2b490cbb55177c7011d163435865d42e85269f922dd2b7fb83f01c9c36f437540185861d5bb398cf8489ccecebfd47a7ba9abc66e1c2ca0ed6fe58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540c7a33f32a25ad7a3823a1e8fb1c98d
SHA1bcf69e3fa2d188f750690b1639c4748b05c1aa53
SHA2569e8bbcaca864983ae2b117e5e5aff600832d7e600ce861ca796420d0fe59b931
SHA5121fae0c0535a8b469d5aee54d7115ca32c4ac73ebe30e9c98bdabed54c9c05ec8f3fd8f15687ff3625f1077785581a8cb08ac368ff997b442b7a8a2fa0fd4f26d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ad0c0bdc9d361c475481aeed53aa76a
SHA1ae958906de2e3fed6b32088fe95101ff38f989e0
SHA25659a811046c4a13c4cd43a35bd9a9fce5e4f3daf379ce93bacfe09481260c643b
SHA5127818d73cb93db2826ac5b0072cc6a2b7e9f53eabe011f54571f8d769c1470324e4f2c4cafe2a083578919346c83c102cce3f9cb5142cdb7ec73c0fbf457e6959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b4b406b5ee0fc97f0f845bbbed8be6c
SHA1450b14b864c5a5a18f4a020915da464f85c84ce7
SHA256180e5d8f3ae6cd6583d1244c4b1f963208008bb5311ad663a979ecbb94ff82c5
SHA5120989bdd71f358a5bbcc4c5ec43f4836cda73cfae4c8aa9c2fcc84a045cf47ea41d2cd5687ac04f84d1c7ec734a0aded84a197c7a6ce93f8d9cd4aefdd971256b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57acc002673777a645277a1c06755a1f4
SHA141c1d95a32898699935ee67550d92398996d2bc4
SHA2561549781a584e989a373cfe8d29713c44e29464a4da8ec204c9067e0039552b28
SHA51296d673adc76c164c11c466789fa67c482661c8dd2bc1dc5fc34d74f9511f0654a23b5f191faa8da62150bdfe81d19e393021ef1b6902c34ac7a4784cd3f12da5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\beacon.min[1].js
Filesize19KB
MD5dd1d068fdb5fe90b6c05a5b3940e088c
SHA10d96f9df8772633a9df4c81cf323a4ef8998ba59
SHA2566153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101
SHA5127aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63