Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
c88526e8c2c8c8e880d2d7c457d38187.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c88526e8c2c8c8e880d2d7c457d38187.html
Resource
win10v2004-20240226-en
General
-
Target
c88526e8c2c8c8e880d2d7c457d38187.html
-
Size
11KB
-
MD5
c88526e8c2c8c8e880d2d7c457d38187
-
SHA1
c5fc1831f155354939b02fbb701e4172be3dc57c
-
SHA256
dcf95046591c50d28d851489dfd63d8c763b456898c3554f8b42e9b7e4aefedd
-
SHA512
5512843dca0c0407d8365c77f1094618b63e9187e09743a3c6a1cd4f71ecf8ea21a968d783f8d6878bad8bc497590ea3da760c997bd11cc4ae1f83356251e39a
-
SSDEEP
192:2ValIsr0r57M4Wxa/T8I+/w1wvqa1JauBuLbdU8d:salIcIQ4WxaX+/ggJaguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34C32501-E1F7-11EE-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416578104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2736 2364 iexplore.exe 28 PID 2364 wrote to memory of 2736 2364 iexplore.exe 28 PID 2364 wrote to memory of 2736 2364 iexplore.exe 28 PID 2364 wrote to memory of 2736 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c88526e8c2c8c8e880d2d7c457d38187.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8ec17c284cb0a571c944fd8d33a220
SHA1509bcd3f3a03307f3aa4e73bf140a5c29b876604
SHA2560651013b565e9d60ca8b572f2e97c28e2936fd4c6127972a859ed12389f4d3a9
SHA512becb40d689a0852d71600516fd9b2a5e50f37bce1edb59d15c25ab271114dd0e654a78c0b02c03d2a1ed990ede4d4e1b9634bb980c1910c919e8b8dfaeea2aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5734d08dc5de7e5c96c7de032cbf6788a
SHA1ec382bb6adc73dfd48c47b98f72583db48d734ea
SHA256080c3d316399206bdf4329ccd91281443f8d7b1fc1aba251fcd9034f78fe779b
SHA5122125c9e7b1aaa27fea6e4eea017f0450cced93426010461d161368effe1a9366ece158d68a0c573aecc1da79ab3454cba63ca34e6adffe0bffde9b442a50c4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9322368c0a2b54fb24662cbb61590b
SHA153a5c103ad5e479c7bd9ff01ecdfcb45ef18e50e
SHA2567976288656dac60de287e9683e9e413e013ee831f6850aa06465528ce64be43f
SHA512044b2d3d48beb360ed0a49f73e27fb7635c5ff5482dd8d0a0fc2da80a83aede8843f0db71d1961d624f0e2f46d613f23f3357f3bfe83f55f638ffc0796209deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5855c48550083fad2c8d92c35ab2f9e24
SHA10696077e56457a2a0d885e2265bd6250fc71f0f7
SHA256213f54f97e8ba9f7a55d62c418f2e9ae1f05da352a6af131341574c60818782c
SHA5126b4c20f1e401639a76471e7bdbf995cb57c1a7994ea9a8ee3fc1c97e4cea106e25798b43b316ed25609321dd1d87588177f6560c47ab8076d07a32ef145475de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52241543bd6636f9cb9e5bafbb2a09c77
SHA1c6e742a712d0cad07c067643519e9bef32b4491b
SHA256e37554f65f2ed34878ef2800bb13b9ac97f4b8d71e92a618c54326ccae1fce0a
SHA5123e53eb5280cf52aac004c5d99616eb06c627ebf8d6aea3115de6cb506079abdd107093eeb0516b8ba5341df6fa1dfe82c6bd852a304f4e7a3d09caa80249e86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6a309ac838a54eafc7acced08890787
SHA1b4d7b34ebd156a668ea50c6900030ab1a3bfa082
SHA256eb874179f4869a7d2f1869739835a4269cca9623803a95da8bedc3846e3c9c7d
SHA512c7fa10473dfb6132969de53a27c653d1c35fdf1da203025cf48cd73cc7ec8057ee6f55b98b94bfd3ee08b1e3d62639afa390f28c1928100ee6b1b22b7e15fb0e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63