Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
d65ed63359c26477d36afa6abad60ea1.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d65ed63359c26477d36afa6abad60ea1.html
Resource
win10v2004-20240226-en
General
-
Target
d65ed63359c26477d36afa6abad60ea1.html
-
Size
3.5MB
-
MD5
d65ed63359c26477d36afa6abad60ea1
-
SHA1
1036fa4d6e90d62086c90f6b41e3685d744d6f8b
-
SHA256
fa01d7a6f2be5332b17f1a5010b675e880187c4a21c685b9a180be395e11b917
-
SHA512
cc1a19a95698e688086a4ccce91cf6c97aaecdbe6745c3465cb4791f17f5d2f5ec48729749b4aefde4a45321370c94d641d08edd12fc97045b01331020ad03a7
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nyf:jvpjte4tT6sf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417021178" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e1dcb20b7ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0437DD1-E5FE-11EE-9001-CA5596DD87F4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000066211a3b5c99563b6e37dbdf0cb6876615355257a369e7374c933875e344be38000000000e80000000020000200000007d2fdc4fe9474c6e6b40aaa11434ee2f19df2d96c739ce6a623a506563544ce0200000000bcf621cc00b736b0025938ba0d5ce4fdb1da9434ecdeef33eb38ed37b0751b640000000191b25e28fe358baf7ca0011a854142eb6b59abe912bbdc00a243daefc2552a76e08d1c9fd1e561a527a67aeced09bf79d5d3adbfcdf6f711c4f89b64a89a5fb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2496 2316 iexplore.exe 28 PID 2316 wrote to memory of 2496 2316 iexplore.exe 28 PID 2316 wrote to memory of 2496 2316 iexplore.exe 28 PID 2316 wrote to memory of 2496 2316 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d65ed63359c26477d36afa6abad60ea1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53c6efc984803e7896de96d350d13d87b
SHA1da2e1ff5f8eb25852f513bf98494f04339aea124
SHA256e7e4ac1b31d266fc6705ea4921ce02618ec024b8fe734693371ff992808ff326
SHA512cf27bca140f6bc9c64be119f403ab0083835fbc699658b81d60b94deeca469a58b74edab72c258b58888e229d2dcf22712872046600f8eeef789eedace6c71df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560a9dd5c42921413c51bc19ca1221dfe
SHA15c68911a49e438966c6b28f57d6bb8cd304e9540
SHA256d6b5b5a3ff545c487bec3351eb230babde3df83d5d2ea620629176b1c89839d5
SHA5126b06de30c1719fae3c28b4e4a0524ded4166aaa3a680a6b2e42bc2923992cdbcf0799fbdfcde1e2aea9972c3480c35808af4e7fe9fe3a510fa9c4862104a7c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccab59bcfdbc275a86b1af41bce52559
SHA1b6199529d0953dbec47ae9f439532041c1d537a7
SHA2564bd0fb8cbcfc5bad0aab4950ce5bf23504ba88445235ead5f26de0b1a7513551
SHA512de961aa15fb1583af2ef620a58201d6ff891935b2a11c8f6d0658988728635ef97de9a68b562e35b50cab0ca0a6e63b77d23d61567a821256e381e3770878cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5245d821f2c4456076b582235dfd63210
SHA1380f814f5540bfb6e27b7544baa96eefdaa40fa1
SHA256e49d8db7f205e8cff9fc42b25c33f87108f90e92dbc1fa75d64bafd5ecaae0ba
SHA5128e82c270e4a788f92818a51760426b46d2e67b5b2de2e2fa609509156f46b84848e62a769b05a13265e062099945656141e2c84e371b8d50dda3485a9d5372e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ce4fa7dcea2d44ba474904ba2170a29
SHA18a961db5eba574e14c389ab2b9357af71a9d7112
SHA25621527d5246ce2204a8379aded204ed9302a902906944aa443a41c9d01ba8fa43
SHA512eaa64a4824ad0df5e2e9d87174f36b1e3c4a0e58e98691f49b842e5142844fbef33d1c2f701fc317a42a012815d04d7d4e3ca2a746717864501922037b3776a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1cd44b55654a3be3480ce736e07164a
SHA113015825054fb9c3df6a44b8d51ec0ec0e119015
SHA2568678ebaf5df231aa9a20bc0c2c29f0c73c8ac1620dc2bbd70a5f98a9837dfdcc
SHA5128c89be1323194b2ba18a3b0078c195fe73b3fcf95518c97ba775d8b7190238d07272be0c2e3a4de9b9a908d59d0d65a46518362695c20d434e38b66d8b07b96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5040cb09efe40c76d154e9deeb57c1ebd
SHA1250aee1760dde5c60e61d8d8e83c470d190411b7
SHA256b5b39bc56882c16b40b648be567d5e4adba70708d00c6dd4e72c9cb74d5eada6
SHA51251d25266c9f645550eb3928d9a6bda1bbee64122cbe988507567ac47c17eb1f95d6ebfe8abd13aaeb8659a41457d613ea4803c384ed5dbd47cf50e19a2aa189d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cca0ad97ba774308fb184f0a07b8711
SHA11ef0e3d6ad526087e04739138847ad66276a1a4e
SHA256c4cbfa7577f57a6a44df56bd7b202aecfebef16f7fa4a6b05f9c15b4aa86cfc7
SHA512fd82f43affab8f892905f94a65d4879f6dcab7fdd41a681d5c08847edae1c728341120e8a6b5065d0c3c581f38415ba72a15c5d2acbef39465d94c2f213d21f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f3a4734341f6efd4d4d29edc36d26cf
SHA11884c73f9c0f49ff79434506b90106f897abd31b
SHA256db91eb9da2867a30e155ebf3cb0599a8c03c5828196be604a845afa648665308
SHA5127d82c7546a267874f7a1231d299993e75da86cea5d3e4d6c8fa5a64872495d983324fd8ac8c6bb392876aa7610941379838c27456a0b17cf247211c6aff20bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f611f9483f5287e31228e54a3e50a861
SHA1e52eadd51952ca2bd33caafa40b66eb927334fec
SHA2562dbbe0ccd9c37f5ccddfee25674f3bff9eb83d40a41b0193758924970c9426fd
SHA512fcd5922c371b0a420f350d54aee86c14791f742b55cbcff7cbf7aeb9245753f4d7044ad1366130cff21760da797a257f732a25aed921f45585752c6726e34c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fa59d6daa23993354031d28ffe62b68
SHA19aab5b1ea17a9ee8cc1af9ad0c561eff4830b802
SHA2563fd2709ecc070bf531a5fccbe680b2f0a49e1f16162ef16f0478e78c61032028
SHA5123b11fd3791cbda2aee691b5774019f02d858d968281cbab9f87f637179637a1090cf2788fdd1057bf45fbe90224b53a8e3f877f39bdd4589ea89d281fa8b8448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5375f09acb837eabae4765184bdd2e10a
SHA1c57dce34557897af9fab828cce7633f3e760f4e4
SHA256d9efda1544fc73dd0ce433fd7c039136bb0c5ac1b88f28c0892fed3919439b9b
SHA512936f19d94c8a713bce30a206bbe95cd491b83d06a952e7b2caafe43da2a8183870e1fe0df19f3a3e723a525d53d989861b7fc515fd890cc95a35d21b4c53e761
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\673IEUYT\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\902LKC6A\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\beacon.min[1].js
Filesize19KB
MD5dd1d068fdb5fe90b6c05a5b3940e088c
SHA10d96f9df8772633a9df4c81cf323a4ef8998ba59
SHA2566153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101
SHA5127aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63