Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
d5e1be98da9fe1978e7b7c2213122c95.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5e1be98da9fe1978e7b7c2213122c95.html
Resource
win10v2004-20240226-en
General
-
Target
d5e1be98da9fe1978e7b7c2213122c95.html
-
Size
8KB
-
MD5
d5e1be98da9fe1978e7b7c2213122c95
-
SHA1
46bf7570f4df26891c061f979ce561b9814731b3
-
SHA256
c2abc510641b3027f5ce3c46c3fb399b8bf00d6b26a1669d01ca2c90e6fe886c
-
SHA512
71d8b671a6e534214b2f860e3ffc9810f2c9f06203996a421a7033c8f78aeb4ebdb3cc9e570364c04cb87ca3fc7a5303dbaa175e5e3a8c2c82be1449251cb524
-
SSDEEP
96:xC+PBApWhd1uq4jCJjWhd0qHzPHmJqioo44434p72iA3XvFkvFlLd5AOs+:ofo3+4p72iA3X9k99dH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fffacc0240230f40b575ac5982df49bd0000000002000000000010660000000100002000000071e4c2beebe77a63baa13bcd9a4bc79bc9e8a17d32dc117e086c39a65ef236f8000000000e8000000002000020000000460649a64749c089ca1e3a73e7901c1288886f2b52a7046962f5df65f748b5ed20000000da307f36ec0d9aa34d79eef66e388d4d037cbd7901dc885f0989e52f70579e3540000000518eb6e940cfc782e6c06981674e4392308c9be2a4077b078096812ccc5e0791ac47f0e37736235415017f70b551341f0d8f198916bdbe0665821b75f8c91bef iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fffacc0240230f40b575ac5982df49bd00000000020000000000106600000001000020000000e56f2ac86745a7c99ae432ffb786033231d3b208b09a26fd6fc99f4d824405cd000000000e800000000200002000000021dee6346d312c77d2d528eea1596bc5a7173f92c6a41bbc0538f2dfa49c20ce90000000bcc799c83bd88909bae65a9e41f8bb3d10bf7bb2ac45da076e13fb00a8e6b6bbbe2525b932e690f070a64ccc55288ea0fe9e71b45584293b8a6f9a419bc824ac986d68e5e021de9d24e11db654de4ebe24c8b65fcfc5479824de45d95c4fc274c578ac48af9734850d6e4dd696a0068055c5f5ac673a070b9e391fcb970e8b59d69760142f8a76d789c7795ee59ab18d40000000a521a9afcf357269f3379b369bcdc21fc0c055d3f9314c19607af97fa701cc030e8ce468725a7094cf568bf56ed7627395bba32c960c46dddfe49b369a7d8a09 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D7ED271-E5DB-11EE-877D-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417006005" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909ee958e879da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 320 iexplore.exe 320 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 320 wrote to memory of 2524 320 iexplore.exe 28 PID 320 wrote to memory of 2524 320 iexplore.exe 28 PID 320 wrote to memory of 2524 320 iexplore.exe 28 PID 320 wrote to memory of 2524 320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5e1be98da9fe1978e7b7c2213122c95.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a4642d2942260095947abe4086eaa3f
SHA14802f64f1422c3d18a8b7c8c3391c9b97bfee984
SHA2569f25e68663193eb10a780e805f209321aafc6ab31a9393793a88a6353113c713
SHA5122af8a26899b619f0ffd20e0c17ebdc8b68b5669c2761bc87370c024b8819ea55a53dfc2f904803dccf095d0968999b25e01bb81d031eed80bcdc6ad6f12db85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534bca97b18af372a4df2fa750efe8a59
SHA1789eef4e6bc99953e4c38e7cb66f4c65297f3b20
SHA25612dbf2e75f91dc4029581f67f771acb4a41be845eff75cd18b39b7a152b885f3
SHA512774aa2f4df2172d86dc91398f103ec899f6cf632e776d809e240301a5e973e9b81de0eb68e60e4a594abb1a4831c0255277a15275e3dfe9cde182d4039be8e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ca93799c4a7df40c153ffee10117b41
SHA1dcbd7a597d8b75a89c4d03685c1c8b34b625014a
SHA256f58f99ba26eea7153b323c4beb11db6b854f13964121d1f7fd5ae8f815711f61
SHA512adf19154e0a72ba17e77e80720c27dad1bbbfff71bc8aa603d5b13477287691e31ac2142f049466b6b2e20a65a031bfa3e35207640298ec4fb7784b3ea7860db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b48e5b087279eefcfb23333b7784f49
SHA1256b18bb6971d7ed0f5564426774401002b41758
SHA256e271d797c93d4ebd037116b8f7506d59bc5a984d0be64b1e65c2d68de60c3a3a
SHA5128f5eb8c726da881454da7fff05de020a193e6af3c782d0e2e26080494b0101cf37893dc26fad58c4ac91c9d8bfbdfff67a8f058089a8bbeece1a7808f88374fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5350ce0e5abab1531e4844a98204f9738
SHA18e41f7b6ecd11ecd8d5da55cada6eadb966b4203
SHA256395815f011ec8977fae50ade6cc6624bcd4ab53417272dd1f4bad9f8c434df84
SHA512281e90914e1cd7d524d8765c043eb6b775714b43759539b2a129af2cd04abd289da393ab09792cc31f4c33abd592905ca25aec0d6a010b000502566c112127ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6b97695bf5252304d9c17de7388997
SHA175141ceaaadc3190482f718e46c6d327c6371dbf
SHA2567b525691415542e6ee7db7ba9ad3f117969915b05cfdc0d51d7c4e3605df6a01
SHA5124a142a129b78936a5b75b7c73699d9b20f4aae540f958ffd9e8f70a555812eec0de866c6af8ec1ac718c7a2ea25cb2d510043a5c57ac72b95981a155cb14879f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b27d8968078001bb6380b5c91865996c
SHA1823ca09289df4a4361e533e441aef6aab1eb4923
SHA256c40b4a729d374862ac3d66e3fefddfde393219dd31eeffc6b8b9b33a59eb27e8
SHA512ef1eaa5c595809446ce9d185c9c8e5570f97c93eff192bec93fe4ca8cdc8da1772a663595e87bb598fa78466a7ff588960a522537c2dcfebe32c0cc6857174cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea67067333d70e5d998b64f153636e38
SHA1c0a08d4407d91e4382ca3bf26d44f985d2a39167
SHA25680a517a33d2f41e6dc4d2ab871639234642316dbb6a82dc0718bc8f27c257daa
SHA5126c9e28c0f3d84038b3c289f73f0b95f9864be953a48f5374c964c3f2f3c3d0f82fc1d821dc008b686af22e6added5abe3ebc51f9f1d112fca4049532d42eead5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597cbb7cf72bf96bf20eb7d26808d3715
SHA1f93f6a6fe3c25fa308d373fc29beaad10dfaed65
SHA2564e5c1e4816c38aa4d3964b58cbde62154af13655a11a1a40d2a11b8f004baee8
SHA5128b6e3cbc1423165029d40a02a81d40e484e5e901e8658410e0677215eae5e75fb629e18fe12928784b3709d6b42a78cebeab8456b6f89ba076e7d17da433be0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5648fae8de508a920679774c941db8d29
SHA14766428c035848ed64008d270bd8f99c5a07d1c1
SHA2566175be4cc2ef8d6c7190fec3d89b5b5a469da7ae6385a8a7f51195d1432a93b7
SHA512ba3c2b7981b3b3a46630d12cbe9078446078471a79a765c2a5e2a2024cdfa0d9999dcbff09f682e363d0b3d341aa27b4b900526cd42c3cedbf74b40d5df2f64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df0abae9bca99f1092f9d1b19cd3397
SHA1d38e0aebe1ef08eedea480fce5aec395dccd6bc4
SHA256099d369a2b25d4224ea07fa7a1a326bb51cbce454274007ca009ce28706904f4
SHA512dd0606ddffd4b936fab61ba661f0ad4ec00c6b04dd5b1b07d3e1fdda9c5c8e7166d7d486438db6c9a4048e0a88ca20e77da760124e8049b75f4f2a04b35ed0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fece7e22b0a2e5420a7881d58a08c1af
SHA18648e58d8509d05f437eba5fe7744f34daae6279
SHA256fa6fd1a115b4218344d97a58149d2d5b321e3fbba7bf86d17ec571639c0e93c5
SHA512cdfd8668ddaa8762b3ff61b80fa46b07b237ca97d3e3afb7fa1b63cb638ce7b305178e59b523385421138c1171dd035eb5c6cd81b431c1fcb1b885d7a28931d3
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63