Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
d3956eafee7d72e3e419752fa3aa84bd.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d3956eafee7d72e3e419752fa3aa84bd.html
Resource
win10v2004-20240226-en
General
-
Target
d3956eafee7d72e3e419752fa3aa84bd.html
-
Size
47KB
-
MD5
d3956eafee7d72e3e419752fa3aa84bd
-
SHA1
a1619ab51c76b987647109e3751e26d6e4a3d727
-
SHA256
195db17d6b8f6d6a86cb9770a640714e2426ba579c182b1bff1cfda98b93c302
-
SHA512
963fdc9944b86c4217e84824c6574ed85f340d566c0678df22a82bedf3e828699482617932f28946e262b522c370c6fc734460e271caf478e6133c57e4541e86
-
SSDEEP
768:gzgMNFIbFZrxjIAJacIWCLQjafSasDM7jCCvM32XcVkW/oeZzEG0FxqXg6ox+xM0:gzgMNFIbFZrxjIIQLQefSasDM7dM32Xy
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416929076" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b8f04d3579da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000005c356673e98e96350469d5b510d940303702bcb418b39763b6b7ec03179d5f3000000000e8000000002000020000000c15c3881167256a48a145a67a43ff01252890b5f77fba493435cd95a2e07561220000000c96a42c6359a5d8fc49a45f4c0e5ab24259ec5653ed0a68efbbe3598d305e15f4000000050752c45b67fbff6011e9b464c65d021b61b46f523ec344daadb1689fd0184f9408d0e3bd0929850c1c6edd86bbbef5fbf0a6380f7229114b18651a36cadd745 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{605D5D01-E528-11EE-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2116 2204 iexplore.exe 28 PID 2204 wrote to memory of 2116 2204 iexplore.exe 28 PID 2204 wrote to memory of 2116 2204 iexplore.exe 28 PID 2204 wrote to memory of 2116 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3956eafee7d72e3e419752fa3aa84bd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d85409393ef8bae1f32e218a63a74c09
SHA1f5980198f57428a7eeb8e9fbd019cecab9fd6e94
SHA256b93b4ac3c2148c93493ee4d83d585aaff805f60ee03fdd39d1ea25bb8f830b1a
SHA512d7fc2b1427f3e9a9779b83f5c2e79bf49cf1ab261919bb90dd761ca11d0522a2288cbb9979d41767491dba777b80adacf1543040a3a6315b58b1b4f6b985a894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc1f45359ef4065fc0efa6699f3b31c
SHA130ca70c238eb39b30df2ccf5de41eb136687d8ae
SHA2562683b11eee14da26d576f9e92aa72bd41bc9139aeb975549a0fd7083c25b5148
SHA51234b006c11653d71edd1554e58ebf1798cace8023c82e1fc6f2f2d39f9be11bab11b5de71c5b06663cd74ee5a8ca3832a1c7cfe8763f1061e39bf56373cc21004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567725515dc87b884e15149ed86f0d949
SHA14c0405a82fa51c3d21e658262967d0f160a302ea
SHA256c2314d45347d187131da5151c5ff4c4591e5d44af67d897aa7573cf4e9d3df7a
SHA51239013f6d71cb338c94ad1c566b1ea07014a02d1e3f2e64550f6c2da5053ee805e007690b0f32c26d59384ffe5e96d0f54ec698e307111dcf46eef35fcdf97b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5852f3b5822ed1ea6d042425ee083cb08
SHA1f28232562ae7422751f6b3ff620c6e43c0ee587c
SHA2565f941112b1802cc18ce8c48eb10be3d2f8a0206def257463ae3b9b44d0c59c01
SHA5127fd6d32c643152583f2333df8832a427f60b9ceb210e917733a709a3f9ae66582bf82ee3a3ccf8c0e52bc17fa9bebb786b459abdb557d9800411c90e3f15a9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5243dc9bcd9251d5b8793142f31affab5
SHA1fe8d1bc234ddf2967e2d359bd04062eb6681c779
SHA256d95665c4df88181ce0015c8a921672015006cbfae82700df891983794eda89a8
SHA5129cd3c7673989a9270cf925f21f392bc206ca4323ede82b291dafe0ef6a95ace7254b474b100461cf58e0069b088a2d309e1a507530fd30abf006139d26a8acb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5279ceb9c4d7c48e0e06dfdf6707668b9
SHA1c04907aa64452ba121f56c0b41b0659c3dc0eb09
SHA256254c34bba393b66916ee53ca3095b2c7c9347276eca778a2ff38210e4b57b20f
SHA51274909912a180267585eaea8660525c9b506bcc43541a2921e001f12ca987bdcf4d38856700e197a1c35b12e0ed4c7abb0dc7c3ff2fd752d91aa3798da8d36656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506d0ac2cf1bfc4bd1253180b77f57b18
SHA19b589431a53aa5da0a9d9f2da591bebb2030f1a4
SHA256051eec668878495ff08bca9f43ebd9dbc6bf5476232fbc2b9e4f24afc53556f6
SHA512ff9d945be2b72558ff13cbb2e95b91e68abfcf360a2654d3864fc0b056ee2b1926138e07d0d487664ba84f3bf6421ff3c808ba661f4e7630e55f6c7d11e2d66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840efccd10e51db8810fa13f0ae068cd
SHA196f94a651b789f5bc4d46ada730af1d4be3c08af
SHA2562e7b6c093b0d4cba024af8ae59e4c825f502a6f7359ca0948062bf2f727e86e8
SHA512b70bdc67d5c5e9ed39ec9642de3f74b940c0948ce90bc48bca1367b3d890384469765f2cbf6ae65f6aa14ac8b5d621d585fef7def15235797173908f25e33bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53162ff0bc26d6eaa79f4d8612b1e71b8
SHA1890efa14ea930b0d2cd16ae7b5f30c82d1ba0d96
SHA2565f9e0b3759b65c87f010ad0af444b04ce9b48a1eda0e455324e4f0b73bed3c2c
SHA512e5d4644f763d4fc9ecca600c3bb885f7706e0cc19f81fb89f0075a0409a393f01a3fba5ee1da11e2c602c82128b01bff4942128b65e9ca741c0a350c61a6bb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8aebdc481994ad2ba6985a9d4d7d4aa
SHA140e98f028702c3c6d5b418502df2e0f4e15c6e0b
SHA2569141ff6a592f7f5ee003ed6005fccabcc14d30e501e5434ee23f711033a551c8
SHA512ee522eaf565fc64c7c58df325f8dc9c34048fcd0ee19066544bdda1761b49155ddd8dfdc77b48ef7ac7fcf0351753ba544d63dac0ad126616f973cd6f3ff8b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbb6083a14ebdee027e55ce731f4aff9
SHA191e702d512fd9e5315f3fb39ecabdc8fe234c7a6
SHA256432dee7ad1a9725187f2dcf36936c96395f0691e70baffe966a43b9936a94ddc
SHA512065467aa424bba27786ebf1580fa2248334ba19b3fa2d165e9fa69d079aebd469aa8c4edbf613131850a569c1ab294e13fb25feb0e3d8b8c2c458fe5400f30f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b38da5b1fb291f8ee9b4225394a926d5
SHA140302c1312f09dd75501d355aa287e88dd7c5ff0
SHA256363b401ac72c5fbe4382aac25baaf111fa09b60248043af67fa1fd83476deed6
SHA51272f09d82f2a216da485b5adc18da42b129c7ee7ed036faf89cbccc468bf4eb67289b3cacb96121d6b756e9e3aa1e2e9fe6cb1700d266fa959bdec6ac3450a6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503567d072a0b878c7b2d576f3f7bc6bd
SHA1c5525656b8f258a41debdf9d198c5dabb7c418f1
SHA2562901c650ec17418f04d491f30c28c91dfdfcf02c4ff4723617d6d05ab9d0128a
SHA51245543a1ce7c57701d6ca2eb755d69301cad7bb1a1c6de6fc30f0a39d8fb817d3872dffe5c6277a03bbd97cda10490aa4920b5b7b6a73d02d57ba896e7b677d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb4acd88dc6c1d10baae9f4a4fcfb95
SHA1303ff83f317d6d31e7d3ec369dcce11f6b9141a8
SHA256a355aeb360188aa9d18a98d647eea761e4ad14ab31a66c8a2d4917c967b1e265
SHA512078d72d6fe0534161a795d75a9667d4fc47aa054956ece47ed7405fa4d000c334077553d83244d2352660957c9c211a9a3340cfe77f6386366f281b32ab5ca33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5248ffde96ea5288f8b80cc7563f97649
SHA16ecedbc21f4ede5bbb66fb6e302d93d5ef0b729b
SHA2568a8754bdea635a1449b84b9ac764d1b0d57487301b166bde9ff0763a46ceef26
SHA51233926a54b4b084cf64ed809956b37f3635e31bbf12b99256305920c7851c1602d444c5ebec5bb5e9b5cc10485a1dbfc673c081c1deda73238d0756c8c30f1e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d708987f6c5f05affedf99b43ee1863
SHA1b9597caa966d2a471f52ca56b1f66d5d757d41bc
SHA256f127ae994174250d47792b58c81eb13245939cf599db1ea2f2c72a77ecf36e6c
SHA512d5a3e650082ef7161e4292acb2c02431eadc661a183753ffc5daa86e5202db1ee1076bd333299174c80a29e94bb5bfa57e6ddb24df63cadbe5c95e3f6e5a848d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae835d7f117d791636ef191e063f5c9a
SHA1b36ae345d6764680fa9e48e57e23f38176f5a9cb
SHA256dccdc8bffec3f06af1f6b37536da64f04e3f187027b5ced1305a930c636c24d2
SHA5128be33aae405eac076a37567f4bccf6e540cee1ff32f3e618f92b7d1356300b8db5e5fce0e661e6506a142c1356cc25c2ca85b162d6f85a4ea750caa2d2910494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52737bd5f8e075482e4d72bce4d529e
SHA1098426fbce1e9046a84d89c69f6041f29e8e0382
SHA256bf436b15ea3a3c6247a75b5c27a3337f80d39cdac2d2d95f58e9e03a7e657811
SHA512997604a4d2003d9481eb6d9cde4743583f61a950a01f2e73cf492690152667044ecfef7d7200e70381e2d1664a8cc2443fce2c31617049d30edc352fab70b866
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63