Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
cc2fbae2347a841b28ac796b53115b5c.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc2fbae2347a841b28ac796b53115b5c.html
Resource
win10v2004-20231215-en
General
-
Target
cc2fbae2347a841b28ac796b53115b5c.html
-
Size
14KB
-
MD5
cc2fbae2347a841b28ac796b53115b5c
-
SHA1
a95efcab4dff7a71910cddad88738f1193d9cff3
-
SHA256
454290e6fd95739ba4567d3cf4e9f3eb5420a330cf1749f85ac9d32504727a20
-
SHA512
8d770e57d6a927452b530bbac83453ec335ff49d5493ca6b1f50cadb8673cbdc7cdce9fe140e46677b8b6cc31667fb6438142701ff41b3e4818d2805ea282c82
-
SSDEEP
192:+yEioELD/ZmXg8oWllefMJkZQ3wf1vHmlKt6DvE:aioWD/ZmXg8SZQimlXrE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C10021F1-E2FE-11EE-B991-7EEA931DE775} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000146eaaaed5a1ed15e22d7adcdb5e551077677d7e41a76da91ea99411c22d2413000000000e8000000002000020000000df787e900aedaa19c47b113093b5ea8abdce2af8519d0d57d5b1ea58ad4b7f1c20000000bdb38f88d2b9656cffeded2eb2ca4cd479ef9b8a6ec585536a1c117ddd75b10d40000000237d239c512e0bbeadc801468a2b693d21e55c71aaedded074779ac1a2de7e65e8c3376d2ca6ce4fd3d06b8288681c372c8e34c3f7e34a94d9b9983fda324546 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416691301" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001588950b77da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2956 2164 iexplore.exe 28 PID 2164 wrote to memory of 2956 2164 iexplore.exe 28 PID 2164 wrote to memory of 2956 2164 iexplore.exe 28 PID 2164 wrote to memory of 2956 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cc2fbae2347a841b28ac796b53115b5c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0c419e90fdf07513b93fd9679a8dd56
SHA17625e96640f9d5572be417c3fa3d26b112e22f36
SHA2562de4c99aa974812a0e149ace5c659d454e5e51fcbaa95a697610774f6bfe2136
SHA5121c2434af9af87fd4fc688d1f41ba5eb0d5b82f181420c43238af27f1919de662000a653f62716fe11b40fc401999bb0c57ab6e4cda74c3a06bcf683ddda9ddeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5b1b6c01f738f3af24fadfe134d162c
SHA16e02af68f73df569243455eb683fe06792f096ac
SHA2567fcb8a86de1ab16f28107e0369bc5a4e86b30df55cbd2803abf25b57dbbc7185
SHA512a0df62ac162e9f82c6b5af23351a957618a7701db737d48c1dacce5b5942f6cbf263342547f477d608530641fc0b3b327984e42e30d3d68eb0c574bd92c053cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4bd8f748f1d51034e019f23f3c74ec9
SHA1f55ff291b92226705543ee9afadef1fff423a56a
SHA256144424076b9070ed8ec092c2576277d7642bb1372a5b64261806660b89ab47e2
SHA512f25d3602e355a1a4fcac505129581ff27027c377275e8b5fbc677c3480ae79dae4a38b9f434716d158b1394fc79ebb18893a89340800d1051ea628f66859c07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585a53623f365bfef9cc73c55716cdc50
SHA142a014ad598492c7831ee3b22d6567841bc5ad82
SHA25628f503c990533fd2e0d1fd3e6e222296a8a4e4f9ba50bb3e2384c915c6992a73
SHA512dc9185934569e1f747e8cb5712ff95bac2a13eb21e3854b71fca63cc7b4824763be0fc9225ee0f66c78704f2a34a98dac3286357e970f77393579246518a8711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5507d8ede0c1826171c7e679b58cfd751
SHA129cc59153df7ccc478b4823ea32e1500c35d5a2f
SHA2567fffa631cfff9a2531f0d5f3b5dcbb16e80d055e726816ab5f455b1242947cc1
SHA512b454c765b2f7e6f67b8861e2cc30dda2c5d4247b711c8659fd518f864738de830916820d27123562b64c1769ad1fc2f534e3d30a6a07424078e887553de72b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2d1eccb73a7e3cb79e8015f46ac035c
SHA19d1d89cbccd2c9630e09e615ab8a2731b8ae5895
SHA25608d62188b0c3bdfb8f54d47e22b2435ae7fa251ccdfff67dbd4d0a62d392213f
SHA5128617362269491a034d192f145073799415448283a311ead825eb709dfcf03e0caf90f187aa0091050d8dc965b2b1af23500723145194587107e1a6bc061f9782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519de52873f78aecafd3a58bd0ac81bb9
SHA17b67aa98b01bc61c23f2df64c3d496b15714919c
SHA256075b30ebcf7a25ebe6ec6083922d5d5831f0bfd6cb118aa09f461b24ad8f5b9c
SHA51243ae7737cf05d4a2efceafb3ae7b49a2cc2a616004c81ce54720a9247486a926f093a618bfed01f1cc9e003d09fe7ac41fe93f62090cc63ed601676b1b0e6697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8af2854e804dfa9ac56776feef742c
SHA18a1198ee8443e1fa744dc9a303f12ec2c04ddae7
SHA256097eabcb19260195ebdb78c2827350b63459aa0c733809bf095f104b69d8d37e
SHA51279c01d74cadca2479cd1c93ed29c4d55e169e3adcb6ef9bae4f5d0fcc853537c8b51e29fa016687f4ce97aebaa81b19c5033b1f37e42ea8c30bae8f1e8149e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65bf6766ea63c39f0c607316ea53e83
SHA1719e6c889c00fc4abf197137a8aeb90d781357a7
SHA2568cad51f57e10f77a50148a4f0f1e1e5fa92d63f27724a8adc0acfac6171e093b
SHA512e68d39189652fba10bb3627c2e8471d7d8d1e3db12aa83aca87b87d75cec01d0110cc1761bb0b344181adc7e332da3e502c0ab70bf5cc3d3961090485a512c0d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63