Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
cd38613603677eeeb2cb03b90aca3b55.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd38613603677eeeb2cb03b90aca3b55.html
Resource
win10v2004-20240226-en
General
-
Target
cd38613603677eeeb2cb03b90aca3b55.html
-
Size
3KB
-
MD5
cd38613603677eeeb2cb03b90aca3b55
-
SHA1
96a320f1cd2e72d33798d1d5708bebd6b88041da
-
SHA256
7dd35450a6e939bbce4df6f9d3325f59afee9f98fcd68c2d18bc66336d69672e
-
SHA512
497389cbd3b1742a4c80d2988db7528bdccb91cb559035c339153ebdcef55aeb1464fbc3e290e474a8534b6a2fbb27c591fac75da4894d69be4255c2a901cb2c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54683991-E355-11EE-AB41-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000a659407b9cb6973f7e02d360d8090c653eaa1207db4289913bd587509861ac05000000000e80000000020000200000007e4b9f6aed7520914a9b6db0a18031b3025c7e5679e8ec2e2ddd084d2e886c422000000019339c335927dfe1110c43d81af436c4b07771e5254827b9ec14575fab46c28f400000000cc69176560264a62db50b4d79af9ccf1abfbbce7c766decd6af623766f963b02687269b2cddf7a882d5ebfe67b781b3ae051a8ccf5c428307c82537944bed53 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416728480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5069ef286277da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1664 2276 iexplore.exe 28 PID 2276 wrote to memory of 1664 2276 iexplore.exe 28 PID 2276 wrote to memory of 1664 2276 iexplore.exe 28 PID 2276 wrote to memory of 1664 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cd38613603677eeeb2cb03b90aca3b55.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9b9d609df20ae02c587bfc06dcfe8e1
SHA1d5b2bc57f5115ee34ccdb3c2ddd0847d766e5349
SHA256a94b95a887bd3a3c9c5a3c062fcf40b8eea8eade27c579a65bf1cc49598529e2
SHA5120af5a02cbc7637e18d38fefe043a3bc1c21104018a86354210ad8c86d34b23a26c126af3773fec6757b03c8fa56648ccd119683b0fa5adec585b16229e20080b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f99bbe681141f1a7e4da87fbb9aff17
SHA1519b28698fecff0af4bfff18ea884c7821b666f9
SHA2563e08a977ecd93e41729e4c995aad81052913082ff2fc80712d54e42a5d3be119
SHA512d088df9f7fcb209c2b3e0c8691e50779bf0dbc4a1208bd75d1d22b3f38722e40c32ccfd748c18a5033b542660a3235d4dbbd5e99664d9dfa40aa3d49130f6d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeb964f93137bace3acda19acea9df5d
SHA10a8dba971f438a3ee63a397b0ff68a9d7bab97ce
SHA2563a942e15a890b3c6303adbf624c058fc02c3c5cb5a89f17720bf023e056ca40b
SHA5123f0a1fdbb7b46e71f46387d7dea913f2eb36b68731ef69e1b0aec7a9398b46bfed5c55967f17e8c8ab671afc0895fa374d61bdec52cfa7e2b0afba969948d7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5881d5b0968ac688615869feead574f7b
SHA19b5f78ffe321e88c882e01de029bd04e6bbd93f2
SHA2561d13d980b71854cd78c679797b95c1e0f5fbeb698188bb3ba86f9caf0026b27a
SHA512fcc52a207ac5656c28366c61533c14a358eb50f8bad8ce6c3c038146c24768825e8575e7f25317ae46bcdca22e7f496a8badbb5be3760df8a17af783e6359bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd86db41384cce5ff8b3ec9b3fe2a2e6
SHA1081dff7a1ffe07260e35ef387f32c02295f607c9
SHA256fc09874cb20c3239bff8ecfa3d50c679d1d5e36714f2cf97f17206dc4cfa5953
SHA5127065165e47826ca59eea8a64169a925ed94e6a9e4d069dc1bfac20f24d8d4774b1475cf8622f448fb2c162610dd30f71ec07016779bebef1f372787bc56f0eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce3b44a0082ce9a7befb58b3fbc4b8c3
SHA1bce3f4510dd640125823066725d5095c0261e2ac
SHA2568b73d99ae1366b557e15916ac42e254bf2c942cd884295b00b565b7d1bc2cf5f
SHA5128b641a3de6e19bda44b1f35ad6115bc78f5ff3bc2359ac9bced600029ca4e2cd570ea7f72e1b0eb3ea7fee7da741a0280be7b37e9dd86d1a30b229b8fd52908f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55940ca40e7d0dcea5bedf8b46e0e2182
SHA19b34918bb1b456b9f1f1e198be2af4bde9c3692c
SHA25606d3760249ec769e20cd410b298b11805136cffbe2a740d1422feba02c93c9b1
SHA51223362cf16d0df0b061abd6248596e482b1042b332c65e682264aa6851cde49695ccc52a36446bdb512593146484b15b0457edcd72067e420823f0bbb2789f5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c6cb8a834b4197c4b9c4443aff935a1
SHA1fe40109413c6d202bc1f4bf8b8b3fa70cc5ff03b
SHA256d15352007a529c4c684873533e1e648762c2a3406d1047c8f5a01defcf9f623a
SHA512290c6aafa13f8d9e7792528c33576c04d3d834afd85138620a367351afee43d63c352fb0302f824072849f7f875bb62e66c58cf7235d5b7700ea330b47dd7851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a5dbdbca844af465ad30406d9afa26
SHA19ad3f6e86275c0b871342add3e1dfaa0ca6e869d
SHA25604e161274ca9b8e2fb644aa5b106863176c17c612f0337a876f1f6b2401b37d3
SHA512ddc928d009bc6d9f40431a999792413c3612c38d6add755890c93947887dd5b097a1904c37cfebef7d95a1721dde05f23b51c4562a1dbc2e88e9fd5c2db30a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116007564b47b63b01b24947e087035c
SHA14a033f1ce56534dd02757f08240f9c9d7d66a3a6
SHA256a81e4abce986654701441b779e1b841f5c5e9d916da7656ceb8bdc922f2c7a6e
SHA5120af3414f66e1bb1e440b28ba74b53ff1cf069caea000b71447b4f5e463258bf534682fa90978946f065d45bbf9ae44786d53c86ae238c707ae9eb57ad0ea7ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53045d9e803bd81f3a0625cf9f86113be
SHA1c20ba3b4c437d4045bbceb571e764bf8a8230ca6
SHA256ed1a8e2dd8484acde9a562dbba54ee70d35f969420c3f95f42de0a0aaeb7698b
SHA512e0c3f32c2caf67785650953496847c7e9d4a6df65390919a0d5f4b58a0d035ae1dab349a0757af4485f7bc21dd091e61f6639590585d191fa8c2b021d61f728c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57042ebda3d4b3bb192bd26d93a6f62
SHA12d1a9fcc3c1d6103c9b2d399cd90714d59fc3e33
SHA2560cb3d1cc2e2aa4b9b607a00ce9f9bf8c11d44f1aac64f410433bbd8a8e4ff414
SHA512dcbe45e1d1ee6396bba3af114daca87f1bca3b451c4c68848805c86d083f33749425d5afb3d99ddca5ac0c9334e043d6cb5f538fda0565d10dee6a3df401976d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556fdd7ba5543fd3a21b6fe857b922ae4
SHA169585220a29591b05cc5a14e7d592c8b94720355
SHA256c60e6cda59b6355de61b40a1e851ee644b68cc5d1fd8cb6d8b8f97af7c5b3ba8
SHA5125ab7fb007e000867d5cdd086592ab91286522ffe1657f8626c1b021beb597f2212311082fac7da0e4f80dc1e854d6a5caadfa16089527623ad9e5ac5ebaade9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eecb0638f6994ba55446f80f9724c411
SHA1f6ba5761e2e3c053c2c46a4cccd0e1c59fdff2f1
SHA256ebaabd50d3ce58b195d4f3add1e160aa092068b1d2426e514a5ca2757e35036d
SHA5122370c4375ef65835db3e4ef8d79b4de9b5454b14275790b978ef195f6212b35f8506181e5e6cf2199791c0a8df4b9bcb92c98b08eca9789483dc30f11fdeb826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2b1c07312ab0bed7a96e2090663908e
SHA1b6aff7184ff605ae3472d433647f6cdca610613f
SHA25641eea8965e8976074dac4f3850e93794e4175c065edcb118d1bd049dfdc38af2
SHA512cf66383caac27c42f94d9992499f6eb95586d884a5db89bf5e137d80db2f8fd077e1bafd908d8f36d76622683135e5c4046c5ec7439b9183d628cf6147d16eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd4d55645959a1aee6bc4c38ba7efc1a
SHA1175c7511bbb279455ed5914686d182d0dafe30e8
SHA256ded8a512aa186766e331543273222cadae78311a2900bd59c4987195e1d39a14
SHA5121e5acb9c6a0ed2dfbb2c7e42332cbdef51b15590ec80011ab67655cf469505d3165280b17a3be5f4ede510e977585d20e24e7fec14f3cd73654f48e106a1f91e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a71dda040148072fd1c4d79c94648020
SHA137dfbbf80c2617626f6fba52b740b3a1187de64b
SHA256a563c47f85590554ada187b1a05c8d300043d12d65781fc1d421b434a8c492ef
SHA512ad6274bc07f64064dfe510747000491b1daf198bd2869d536921d0b6dbc1cbc6cb6830bea2b5c488250762ba5d7cc01d9fa796e33c40c5a76e30fc481b522cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3707035a08d922f4e793deff042706
SHA194e04948cc105ce09ee19ea3f6cacc713d0c01ac
SHA25676288805207dd206e3b8eb678e9b1f3febc3604c07e231d42f772403dc738b8e
SHA51299a48e80eeb0817b53352a10d9c0c995e8bd3074723c80b4df00913fb96dac44d1105afb277a73e0e0a0ed576089eba8ff96e23bea053ac38ad1f600b1b93a24
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63