Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
c6c6dc73e6945d9bd52cecd31d9a15c9.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c6c6dc73e6945d9bd52cecd31d9a15c9.html
Resource
win10v2004-20240226-en
General
-
Target
c6c6dc73e6945d9bd52cecd31d9a15c9.html
-
Size
47KB
-
MD5
c6c6dc73e6945d9bd52cecd31d9a15c9
-
SHA1
9770389e8609e731a9c6d829d49e8ac378083ca0
-
SHA256
41b66862b886239faa08736fde6014717e6b2f78d5198401c2cd61907e947e77
-
SHA512
23c3061919066eb2795096e568b7f40f5ccede813aa98b69d467e0558302dc8ea80935d41c6f0d372dc0a30a3669a19215757b8aee28d22b572408b267a6c3db
-
SSDEEP
768:FaocjtiEqP1ZtIxtrd1id84cTTLKQDITkOQbKD/my/XwGhuWyd:0ocjtiEa/krd1GqTTOQDITkzs/myfFIR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{419CF7E1-E177-11EE-BC03-E626464F593A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416523152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a03c956a38da0d48ac192a72ce14312bc2dea7e00cb151bedba0452886f0bab1000000000e80000000020000200000004cb8000c0d95c6dfa7ad00bb104dc69003a0c872f838770677f3aad2e6c715122000000082b258ac329d3234ed63d09b31972f646d848237d542a6e0878676861037dea840000000fc0ec0bc84c4b4e62f6cd89cd6b2683e98e242cf3863abb0a9b7e346e00d601abd6485583eecf183a640a81d43adc3a36e578766ed0ca55e9d3059f02ca57b23 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00153f1c8475da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2516 1888 iexplore.exe 28 PID 1888 wrote to memory of 2516 1888 iexplore.exe 28 PID 1888 wrote to memory of 2516 1888 iexplore.exe 28 PID 1888 wrote to memory of 2516 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c6c6dc73e6945d9bd52cecd31d9a15c9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503B
MD5a52a4f188d2b279c1a8463c91cec2c2d
SHA100bf1d03f7c7ee6dc6fc6baeefd9b5144224aa63
SHA256a7f9f6238dd421291750897b44592bb84be3479d0ffdc1102e7bcd53a40e8166
SHA512ea525a4f831bc01bb46be733d00ea5b02c4b6bbe48a4294f8fb07932666d13a5e3f3efd7122572316fe0a9f3a92ec002346e3623f40fc25efb043dabdd9681ec
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc26a473199f18b64331ff94f3841d6e
SHA1b14d5e4512ae25731e38fc9e7c3b1d866dab5f1d
SHA25612a0bf9e70e5c0892472d503a1e1b349dce7318934a544bdf4ffad4508202d1d
SHA512b5f5eb348da9b31397faf01e7740a64c46cab7f391b01a7ff6852a801a1df372b99e37cc761dda92f39c0b91f08cfe0c6287503ba0ba4d828192e5e8368dd1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ce63851376dd66d2ee1d25a00b8162d
SHA1a7a568a9a1651eb8a7b9491f666ab7864de27963
SHA2568c8dafd03dc6738ca701c537bd344bb2818ba464ef967bea14385a61b81ef769
SHA512eabc6b58b8d95fb480b3e201d16fc5ce2dcf22315ed789cab05fc3176028c5a11d4520b148919ead97537bead43cd16d2a674c3f53bfadf77eb853ded2246b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2fa6be56820f738d89a33010da3c158
SHA13fc5a37dc8c61d3eb8d2737853b4f0730311662f
SHA256adc1930141ee2d4cfc90e2a7355b37c498a30dffe6811a3d56aeb7aa105364b6
SHA51258225d87750906584274b23b089865b585b9b552f54de9238f87104b41fec0c9463f2cbf7f198eb8a9bb2008c71ffe7e22404eb4b2f62e29b798db693d66f783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c940fc57e990bcccd472219e3028f23b
SHA1e126516aa8acd6027a30961e1a7b246ee42ef53b
SHA2561cf397c6eaa4ceddcf8cb30b657249aa4ca7949b351254e458accfbbf696677e
SHA512c5172f01e2b9779a9069ede4b9866f0034367b91e414fc9d5a2d0e0a2cab74410c2dfae2452fd6922bc415471bb5664ee912aeb12f3de9b8d162f3764640e1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b278844765238a7551e9a8c01be23e38
SHA189f14cb99f41f98639731c0ea37d60caa1e6c3c1
SHA256805fb31f7eb54bc422f2622fd406c60cbd037d3b9793fcb0ae24765d01dfd8c9
SHA512c7f47b997c6b6536db5a7d3559fd77d3aabbb719a42f2566008a739e097f8abeb80122be9d9d73fbf112030bfcef6b8f68ff5aa092ed94636a064199319b8439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5945819730a6ef9aec2fbc9b8a61afe9e
SHA1d0a9caa575ec358ad33ce2c3fa8f9df4c172a265
SHA2569aec96ca42ead563462687f2aec845de65737c99e741a2b98bfa5167b410e790
SHA5121ab1478ea3e4784ec1687736a78183dc4f6e08389456fbb96c15ec3c0f579b08862aa7dc7c1b46c3facee891ee86dd064b1dd6b9375f30cdcc51aeb5cf960965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c301512cce2635e2bf6d80ede7bf87d3
SHA1e0d312d20c1a1561d8d8da15d14d75daae83ccec
SHA2565fdb448319c8e44aac4da41ba73d370b43cdbc9454529477fe2874643eb54abf
SHA512c3adf4e20d2a176ee80b0896caae4865a48ac2f669eb49f6503c1b46557f94c2b4f230b4fee252776e773b7fecfd1af33f2003a051f35d8c0584e84a198c02ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be74869f5e88c49a32b21389ac93a24
SHA167e10fc6c48c5b61bd1592bd519ab4c39a05296d
SHA256786bf9794cc7fc4b5159f3d1006b0dcc269db5ed513c2991a6823bedb9ae60c0
SHA512c5b3bc25f527c37f06fa51116705d19d79b60136756e0c07de764e6d84e569f7ac8b49fc40013053e74a9397d6339369c6dccee3e90b146a5a26d49a50ee90b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb3e39dd453d11c71088fa161c5ab6d8
SHA19a50a0a4632a11bdc32ad5bb3637b74f0665ba1b
SHA256837bbd9c71a85454b63193be1efe71856d0ebe760f847b097cc3c69fdf4a3c94
SHA512d8f426251e2c07b6d85c2ad82f24ddf0355e6b969026389d9adb7885d119c61f7303595321b623a76bd4775d87badcdb1e68ace83ac62c3e9932232e9b44d2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c4d5dea831db1b56e68314d6704b9a1
SHA164d532459c45e1f6f1a91a70c12daac10a5f7791
SHA2568f62ac1780ac8703ccec3d1f74cc59d7af193e56289083daaef4bf6d93074ca0
SHA512d19aceb31542aa43f9989ec555379e1e577b78d5b58a3c8574dfe4acbbfccc2b124ff6c79bab393aa7fa418c9cdffb339b7a4af8ed7a8031f1b63b2f265c5145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f906e63f0343fd2ce69fc968608ca2a2
SHA1f3155577f64487d5a2bdd8412b28f0782f1a9e0b
SHA256c0a5694c59e27713d9c8b28eeaf4700562a1e46f1a06dfd9282df90d377bafea
SHA512d34ddddc05019ca1cd361194cdd48d2e96098d3ecc491956e2190d64881e8f4c9970367dab43aebbc68f8b538da66a144b4cafd02db0dfed542ed49c1f69c317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572fd9963fad129b49085f7b070541579
SHA1d1f64c167f3ce8b3877f8a91cd352ebd21a9a128
SHA256555e40ee11edf04fc99a6c8e67e494451bf8b492b9a936301a25dfbe8e603feb
SHA51254c0aab4f70b56a884650c435cc6aed07a0ec73d0e660eb4d528bf40fdfa674abba6803d966254c0272ec449f96177fe49bac4d513f53f5c5160ba2efb5d04ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500fb6fc63269274ef69e5c52e9436444
SHA14e4fdb9f7549dc06900001870f1b01d6eb5a433b
SHA2565ea3693be7fb7447b9ea27233f16c80aec20b0999e87215b0cce05f8aa91de26
SHA512651fe2c20d3d1e316aeb2f441ee415b9ed156a4b3364ecd5d81a45a58532d107fe786641fc88cf774e1ca8ad5fc297f8f1a79cff00dee2e5183c73d42e195eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593cd43f7a3971392af6f611e2eaa9cd2
SHA1302ac443f53fcf53574107fb7ad0143eb51963b8
SHA256f2b0ab21e0bb84e27639fbcb1a9f75325e7e05e0499c65f844aade9b3b525395
SHA512a9f3472fa88c9ff5cd9cc3acd74a58d15773a138e86a91064184c42afe938c302b89d94d7ddadf04b48a22975f4962fe413cb9189ba65ef31a19c18e31bc17bd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\902LKC6A\boxplus.white[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63