Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
c97b48b882b02e7f022f41653189d372.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c97b48b882b02e7f022f41653189d372.html
Resource
win10v2004-20240226-en
General
-
Target
c97b48b882b02e7f022f41653189d372.html
-
Size
91KB
-
MD5
c97b48b882b02e7f022f41653189d372
-
SHA1
69ed86f0494e3fc8547b41c19bd043498c6e7447
-
SHA256
1ad77bca3b0ed04071dbf4a485a8bcd4db474af600cc9774c5cd27dda876e589
-
SHA512
932d820d0027e081be031e4e3d0fe0b454f718b4eabdc48d70d8607230757857e3edf3e7a512d1df834f8ca28f5a2bd11eec5e46131e58c62299140d62f1c2c4
-
SSDEEP
1536:WxV1EJB4yzCGWuRAxE1WwrHmHv0yeMmoVCFAFNIUtTOzVeZ27uG9lE/LIMUPmNLV:I1YT1WwrmclMmRezrOzVd7uG9lE/sMU6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000397959fd2c75805f0be5eb48c56398a9989ca91769bd97e7016f026a31fd1a61000000000e800000000200002000000080b8749e916cccdccf311f15e51f450a7ef41df322feda9929f697605ec5a81590000000fe45bd2d34c9efc463a14b46b60a596fd079f9b506764b52a56f5f04a17302566d4b3532970672c7b02864908554747fb182c31b2c13abac6f9f19649f7e88f1c82ce0aa6bfff9628d8c02cdea5a34c81de9f2a3fc5ec5efc8c64580a44e4ad263d03a40c128f59cc1f266437d52a9e76a95563522d8c1019ba1d5c97078ce2eca4410a2da18aa1cc94f6c1464c65068400000008530ded4f0d0a466ea1ec213fef40f72a3624a18ee96b48e10f048e25b0ef1384def20958aa3143233775f5e2b51481234c7ae5e64b3b512f3d270066a09f1ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416607853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{762603B1-E23C-11EE-9E38-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00ae64e4976da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009954f4cc9fa11c5bd58b26f3d854a6fd7a3d63df13c52270b454cfe8b2ed8d92000000000e8000000002000020000000af42ce6e933e6eaccfefe9cdbf733ab317312f12e8ac38f2de649837cc5ef8d820000000e85b62678cdbc8931c64b3813b5f7d13bad49c971663aa84726bdb13f6006e9640000000c04cceda9755c89152ea81282b1eab8050d33c7dbdbdd0b42ba5f6b848cf3f8991b11af2fb2c56326a83f53ebb4dabcc4040b93bab8593a7a6f828196af13c34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28 PID 2160 wrote to memory of 2068 2160 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c97b48b882b02e7f022f41653189d372.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD59deec3f8342b8c64f7b7166f8188e993
SHA119ea9219e10af05a41ba7ff43ad59b2cc659d39f
SHA2567cdc9d8cd400d369f6951ff1b3c6287f57373c5d6b9bf8466785573a503348ed
SHA5127fd3fd2612a68f343b7727d171b6d8458363a2a0cf4724ccc5c7659ca868acc74b44cb83f2d198851db4cb4732cebf139701547092a95f22e78a8052dfc3ff98
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD51e309774c7f6a058c8edd89f7b6763a9
SHA1a9854203173a229f17a732e699e96a116267af0f
SHA2563aa9cfdeceee70a43d64b9ecd5e6d1454d32f237422420b91d7f4d3c911b8353
SHA512200703719fb60b5373ef35e310d3925f319a40257be2d3fa5e77d2a1dc614e24487336f273d82997d08de1cf00b0f1cf079b59aa8e879e83cf9fc17264976163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51361da0a3dd602a59c94a10d22274097
SHA1a98ffbe21594ab268fdd8f341772de1dc639163b
SHA2564e7fcd950ad3640d4653600c9f85090614f017ea91c5ead44cd9ed23170647fc
SHA51282c94971b7b013ec95fe61fa9b5f14e912a324e659f396ceec7b6e785eaeca21b5459b5ad839c74cb80ded949f72296eab21cb755409eb31b9c5710dd00b7b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59868f29a8863387ef93054370b1f00c4
SHA1bab1856cc0a266c478df5acc84cdc9b726e61b1f
SHA25678f83720f67ef1f952ff156c66fc18c7fc5c761a654101fc30ba1071e1f24c3a
SHA5129db6c1d211682da88d56459e1112a3b973661d853c098a8314fc666fc93babf63084e285ba92e017785048e128b3c38b07864d3639f9e07394a8a18378083d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe39150c5cdffc19c2e5251fdcff2e77
SHA1e5c325fda5326e1d42651c9972487619897f1848
SHA256fe7762f1457f44e2f7f0c629cc3bb21d3532d5c4cb9de4cb35a5db1f731de1ae
SHA51287dc6eabae147c5eb52637722e251ec93f009c440aeba06d99a1c6670847af1190e9da3eed22a0e2065b62cdd6b0afad5f143dc0c4f34c6a6fd0a8a9e1ec44bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cc58b0d75590eaedec1660a20770c14
SHA1d7446ec98054908696a17f097fa18fb6cf3b60c5
SHA256c93ce18a83ed64ae636201e5cec3041f603b2b788f17dc8b64b6a2965842c947
SHA512657b23808bdceaca2bf7e160150e1dce491241a319d24dcaae349adbbd8c0a26eae7e612581bc0a8aa39227337d56cd9c8212474ae3b37ecdfa50e325d3a628e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c2651eea3169603dfa86eb1ba4e1278
SHA14ef6f8f83434a6f45ec5bea8dcae080dc4b9f1a3
SHA2560bfca53de31506f3d3ca9674226919042a741755dd9ea8b53e9ef171c4fce71f
SHA51285fcf516adc42c094954719da3f172e45e25a7559646fc79f3078cac21d0d3b451c070a8f876a68e153c2423e915df7501444f6bdae345c95e5da792817f5ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584dbc3e0824f57d2e4b1379a6cf9b679
SHA1ea4506555770cdb8a369e2bbe0b7f92bfc4ee8f6
SHA25642629623c41fa8b847a1878d968fd7123ce3f9ab96e8f1d0614e11f2a715469b
SHA512f9eb7634ac922c28e50b3853021d36da6c86daf4e6a37c13850d1958409dc9dfd162d4f2202c2dc5197a1c293349435657f31e816173d7d8813838ee60341795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a654102168c7124989647c4aacf3d41
SHA132f78e0caa01eec591de9196aa793c27ae0087db
SHA25667dbb88bdae0b3271b69ad40dce3d286b22908138c2088ee19ff8fc3ea98129a
SHA5124668ee34f639e3075d24b99e7bc0ed0520012d4436848b7413c2d8d85483b498d57e539f72043259b75ef46e9e0897b995a07cf50d253a65404f6972eb4729bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513736abf36c177a97a26cb2c7ce1bccd
SHA10a6c13fb8387d30f40d65c2f4f70017db88b939e
SHA2566b4c5f278044432bad909b29d57b44c90d2ed0dd3e0bc90a6b2da3e60ea72407
SHA512c7a118aeaf5b2156c566a781c9abeb7d955560b729f19bc5488ff6c1fd664f2d9337bd6e2ae0ec7d803336769430f2b666a7698949a4c8c01b71e4558f5f93ad
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JB8Q1DZR\platform_gapi.iframes.style.common[1].js
Filesize54KB
MD5ea9dd251399dd23cfaaa58cd75d83802
SHA1fc80615d89aced96d1c7d9e4226b1b39986be9a9
SHA256e924fdde63edcafd0ae3c3f223cd2ac30c8cd2f71fc6da9267566a6a3a285ec3
SHA5121d0640ba21d600a7a7f6d1eca0d7c7d22aff87d074c97bb9f3ab44ee9f6dafc0db075a2a39ff04c0e721b2f046aadb8ce1e860a73e9f0b1123d70e6fb59246f4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\rpc_shindig_random[1].js
Filesize14KB
MD52dc32078d76673468f1bdd9d1c2dd676
SHA19a7689ab544a8c1293a2ee933599db3a93363ea8
SHA256c55692e11f1fe9662e3d8c2d4c832982f3986ec48d944de471345829fe66ef80
SHA5129253714d8ad6f995c26ad97fe82177fb5dd8baaccf1df414ac97ef45236a7cb62bcef548db637b51314fea5d9ec4f2c2c3d4ac0d6701bc86107128c61ff1d6fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\1005847222-postmessagerelay[1].js
Filesize11KB
MD5fc4f777baf3abc58239cbc8efe48c659
SHA132a32fb5bf485fa53a8256d24db6460e8eb1ccef
SHA256fd632e2d64132d33c6becc1c4f1d35b828eddac1bf48c4cdfb326b53b161885f
SHA512d223db5d31692f3f5289d6a8999aff916ffe12e16b5f4baf69716f31423de520c1056966152c906d34f8ba0f27cafa529dbaf0e0e503fff03d30bf656ce4b6d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\cb=gapi[2].js
Filesize132KB
MD5c23494121f5468488a8e79a6268f4648
SHA11fc2646c75df1b8528667487997ab1f5b308133b
SHA256100700c4795780ff97f999795e8477954da09fcb92a1131cd17216203914c425
SHA512956f396bef9df5a542ae410256686e2259e1ae67402615f937c2f2c004ff2f3de5f5767200661c0ce204fed9b32b1a8707c26a566da1d3aa120d428901c39769
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63