Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
d458672d6c6d73a3b67b49b092798fcd.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d458672d6c6d73a3b67b49b092798fcd.html
Resource
win10v2004-20240226-en
General
-
Target
d458672d6c6d73a3b67b49b092798fcd.html
-
Size
3KB
-
MD5
d458672d6c6d73a3b67b49b092798fcd
-
SHA1
bb162e8bfd1233d9084f697543dd7819ebfb71d9
-
SHA256
dd11db7fde593a546542e6240b7e4e920c250870a219cd8f3d67ba44763176ca
-
SHA512
dab39dae2d4e541152e8852ad6e7a161aaed139f6322e0a25017f0de148c8ec67746d629b1fb5e84cd966c8a6f7badf47d94129f5fb5fbd2abcc8379a8c30733
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b175136c79da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D05FB01-E55F-11EE-BC03-E626464F593A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000aee85d5b9f64ba0466adcde6765c01d9ac4f3098c14e0ae43f70dcf2e48efaf0000000000e8000000002000020000000a985da8662705adb14fc7bf56da1ec74c44d8257c41f408242abcdff4d10c2ce20000000cdf991d6dcdcd01b013f6fd48aede3d53b68778575b217bac0fa708fe148d5f8400000002ede36a50f7cb0053d41389f9cac5ba5d8914437b649fef82dc7b14ca1caef9b7e6229c6ac617beb4a82a6fa444728ae7aeff02208153546ac788f04126f5ae3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416952642" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2556 1644 iexplore.exe 28 PID 1644 wrote to memory of 2556 1644 iexplore.exe 28 PID 1644 wrote to memory of 2556 1644 iexplore.exe 28 PID 1644 wrote to memory of 2556 1644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d458672d6c6d73a3b67b49b092798fcd.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f025d91cf190106a745af2995f9e81e
SHA12fd8280a1ef1d8dca14955f9788fc171a6b988f0
SHA2562efbeb41f18187f7d7d7f515520b904b2d391a02d68f3f8a939608e976731a6b
SHA512f6be9e15234f573e49e23f1fa352b69f3dd655450062b02f3e64a55ded8fb5b012dda66046d61bbbf07676f59cd3ab7c80762dd5f0857ac63f3f38c5dc60a164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50511eadce726f5ca897c0d7560972920
SHA1b9be2877b8a6118280ec551cb013ab34fb26dbcd
SHA2560e3bceb4a9ec205c7b42defd982a70274e365304a9a1194daf79c5637970deea
SHA5124e7fed6411d2ab4e40557d27b4e3c17f8797897ee821aad602fda3f34e7c2cd08adf530d6c91e916ffe4198ead261536703641b213b6c0891803432ebe9755c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e81b7fdd5138da9bc4ae9c639c05be4
SHA1d46bb317c296871d81cb05d04c606c27c8d35dc6
SHA25607bab55e8f3f258f75805fc5d529ebcab0b9cff64b1aadf842fa9dcb8ead6ab7
SHA5126708e00637b3c2404c0fa2c479b1786976edb13f0e77df23f2f109f1283503ed8cc1d5655cc65987fa954f31443ea4b57c7e52402dae989a8215f9edccda60c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6064b30e4b95520e62990e027a8bed7
SHA1ddc2009be4c39dbe259f1a00b1a452de237004e9
SHA2561e68cae3ad205c5a6748f01ecc153b0b0fb43d845054e1d5d3d130be075f3760
SHA512f4e2ee21f5b154c13cfac327bd5827a48c951ee83e88194d56d2c8a583fbe5c7467ea4d58c253a27e602f54efddc924330315167ff7a150a63b19d672c5a0ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312c3889c005e3ea2619fc0f16dce3c6
SHA1ad9b143e42bd6eb134d31e626bdb25f0bbdfb558
SHA25624539cb1de948cea582b2b96038c8d8384243ad50a8670d9c71d638f589ec125
SHA512b30e0e31709f0e0d9c25d09d04c04680190bb76540438b6b13f432fd2e99d71f75cc488acf6d8dad485f5c91b6e95fad0d165497b824b20aabcfcdb44573a08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f85e90e5070de5db82f12e826ec42bd
SHA1a426919aedbb4f3ea5497766438efcf776621777
SHA25668af0ea790164d2763202839dcb08802777609fb82b4a6848820b8d4397076c7
SHA5129024c7e814552dac68ec0ccacd999a77edf96048c6e63e5224f1c0d52c923c8351b652f949f645a847374892b306c8590b01e6496da1fdd91e4c5873d76370c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513bf0352e5e0024e3b10ed16f187c2e9
SHA14b599f8a3bc82b1dc79c21f92c4df7f453496037
SHA256be8a1057f6227981a2ac9c3f0ac32a27008ecd5e8e08e0bc1cb371bc45fa0fdb
SHA5124deb354bfa6833cbfaa29c51005397952878481803b14f56b20b293bf12b648e4e1335fd3af7b9e0839890dc420b732419e28b419820269f1f15149ec0a28a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a787bd3556f583d1ccfb4ba6826b182
SHA1a37ec5023b56416143829f28a323c98046b1992e
SHA256fffc7aef2270c96e97c1ef50d1b50e9c0f7eddb47824a90520c1b2a14d19bf2d
SHA5129d8d9dd0d677c4173c23e7d1f45acd3dc543c488b50f79778a60660fcd90d88594a6be44029490168a18daf7d3fcc5efb2614e5ab818afdf7c4027c30587bffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c483e5266c677669332b9eb195e17dcb
SHA10678111cc817c5a2f12fb3a73c8c94aef6f7b0d2
SHA2568b02a9bd505e18819b5596e3ecc52c6d3c98c21ea49c21cb22be8fcdd0c1e51c
SHA512480bffd35dc2f98b018d09f762fde664d6f6f562e4e5f189c9b2de2bf0ba963712814f6f31fd74b686c6a6f560b937cbb1a720da2894a313634a5675d85b869e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d6d3b0c3ce5d70692e5ad778dca9375
SHA12daaa0266e1276aa3a9af23398962ae3ee883b8e
SHA2569acb07d4afc121061bf3e965b04e4b581cae6c948b6561a6fb445a9a9bedb78e
SHA512f9793321432e75cafa0f64834749fe217a3446d891f138254f479c9d7b88e6d3efb6cfb771bec234241b11cba909b8f76cd0648b2473a234c4167d2a119fa566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883230f3359ef2a0d3475a5090bbf248
SHA1685ff7c5795e5ed49d6697e32ce2ee403687fcce
SHA256407eb970fca555c09bf7908dcf208f80f6876521d14f90ff2be33f0239cd2d4c
SHA5120b2e6e38af3233ed902bb30008c16d29184790e8ecf2cebf6d35b1d3f603a3482a3dd9be7f0c558ce23fcb1c9515c77e2f8daad9cbc51ad3d41985e100432c11
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63