Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
e188b046b7c1ab953290ce00dae6fb51.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e188b046b7c1ab953290ce00dae6fb51.html
Resource
win10v2004-20231215-en
General
-
Target
e188b046b7c1ab953290ce00dae6fb51.html
-
Size
4KB
-
MD5
e188b046b7c1ab953290ce00dae6fb51
-
SHA1
46ad98599f6128b365183c919422414c63c80a53
-
SHA256
e35eaf7f9d1797d3d1f8b4df4a638698c37f733b776a5bee0396b25fab2ae47f
-
SHA512
3c4090a1ae80e7536800eb50cbeb6c347f21ddde879d627629059524590dfb1ff8deabfd6e806d15c7bf158018de24b2271e7a0bec8668c7824cdd5296d6c609
-
SSDEEP
96:3V9xuUhl0vD+an4Yxtrc82qhuztye7o2TpBVoGCtUz:3DxuUh6t4Yx5c4SdoCo7Sz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000a1f9c87cd0b6ceb51ca2fa038a8d6b04333bc22ba807f0e95110b00ae582f857000000000e8000000002000020000000400c571361cfe1a56fe300faacfe0185f028061ec291bdb59cd397694db86e3490000000cbb2f81356500fe5071613f8eba9e0111508b56002ff34c504a511590368d14666728c60ac44fb757b4df8a183f2931da113a305b63548d1a8f21ee56f9174ab65d654f5da0b9abae3c2595317ddb3b8917ad3386eb74211a57bb4059aab024ae76be62b37ccfa2b6e0d9a1f000d274bfdddfa6befda3b826edd5a9cbb5546a0e0cd6dcb35e8b6700200f0a39500b03640000000c8bbd8d2331210d362491ac049db96468404c72ad559afc93950cdb2317839a98947436b28860c3e00f689a30911eeabbe9ced5027343e64314947d059b469dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C973811-EC2B-11EE-86DB-FA8378BF1C4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08f3c543880da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000a16e5d30f0858736100e167d1bea17c6ecc88ba24fd14c320abce98a12cb6134000000000e800000000200002000000021cbf16d33a7ef02c5d7a3920cca7b0bccc8b9d2bf0bc57d3d79d8bb6e330e2120000000c599eb6b581b81cb5c017bcf2f7088201e2c51bfe0af36088115d6bcb0193872400000007c9d0649c8cc9897ce7c8ef93d1dfabc4a91f83822991eee922e406222a290ccd8e8849a05f84c8005ce9f1ae9ab73d7e33b12af83a91c1b90daacda922d4cb7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417700071" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2544 2016 iexplore.exe 28 PID 2016 wrote to memory of 2544 2016 iexplore.exe 28 PID 2016 wrote to memory of 2544 2016 iexplore.exe 28 PID 2016 wrote to memory of 2544 2016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e188b046b7c1ab953290ce00dae6fb51.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea328e6faa6f5f8b0bf5d235a67ada96
SHA14c072b2ef509c2fbc589e64c7faa796535cb9e8e
SHA256d439d46b59b68f1591f92bf4a6479fe7f0068413868b6a52a5cdbad2ed974af2
SHA512f05f6545d29654da5d0961e6ba7215481fed05d03974424c9af7a8ab6bc787f81ab01e79d327936f2a8c71fbd8db8568439fdf8654d1a3a54cba8e4c7f5d4eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59616f9bfd56f13e0a0573d8b1d799d27
SHA10e354579830f8df5fea686f30411239924bac015
SHA2564902c7b7ae32eee143edb1228832acff9afdcb27ec1b93f78fd275dac56c8f46
SHA51288bb977c38e03f60d1b629ae6c49d105f4675986011cc3e5833c222cad2d221347e141c49ceba8e58c3a3b18ff03391619ea1cd7497fcd1a640c9a6031c792d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7a1ef289a58893b16fa54b345092967
SHA1e61b780fa58133631a18f28125a5f0f2d370b4a8
SHA2569d70e768a88c46179322ea28e30cb1e51094749009ed4096ab2efd87bcd91f0b
SHA512b62af7c7d91851912d38b35a4426a8ead8c171028714168bd09b53da6aaba8c57689f5b1390bcf2fc850be5f8e105235881d9cc9e9e7cb975b0162aadd4d893f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511d638e0b88ffabb5300a88c753f382f
SHA121f836b74a2d7dad3642ebcf74c27ed25f670dca
SHA2563b1e1d0ba808f90e3b5bfc58f267608ac3fecbc194164d0b80765a87c021c6a4
SHA5122dc9552a53a50cb1168d72c07d10d815d588c107aab4109263d7ed281c79fb62bcec198df30f3ca290e9fd1790c6dc977a84cdbaea2875fd449601a9d849fe33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533c0595758c96a932c50666550da8cbb
SHA1f14d7ac863c6c51432f9105aedaa3d6436517009
SHA2569b4b62a55f6a4836c0225fe645bc4a511f661632118cb9f46e90afa1a1eb4e3c
SHA51298df7b1685e97045ac2fd5f93a0b245fc9770e242f460c486357d5bbd1d7774bd2bcf1a337430ca038b63fe4a02fcac23ffc8ba4d5716fcd8493f0e44aaa5a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ada7abac5cf00d311c7a08bb3b94a33
SHA17cb68a98504e5ee465593c4e360372a8b31c1575
SHA256cc8ab8800f996d2f87e5aee98351d78b4766e4899c36d8d97d27f581576e273e
SHA51287258b077ea6db3f6793495e112e7342bb6b38f9477266cf9dab471ff6a7ccdfd6c31b59ba0ac75367e7562c2052af55300c2ec2ad5a36c61fdde76805486c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5978f65a97623e68d3193e802c0dee7f8
SHA1d224e2fcf5e1d3a8924ff3d77c4c0f0997178624
SHA2563c0fa2929d6f46e191b6a59ef6f1ccef4ad2323e01174ca03a9173ed86e7c87e
SHA512418e7324b516cb47870e59e946bf099f2ca3d415bae0e09acc3634029a0f7ebc8c33f30f6c062357c335e95b1aae1656789ad1642b96a6588458b74896f3bc48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbb3738fac8cd8f11e570b1f02d2c9b9
SHA1409a7831f1da479b109d1d319fdac22e52e2f199
SHA256348b84023e7bc99405df74f96afc763c564ee5c4dcf82599f994b252931f8ff3
SHA512780366b8e955f69c8c9930dc9057a586c650414337f3e0fc57bb4fba9fbb0aa5241abf59b30e9d469ecad64a9bb94934191fd9cdf6a3bdcc8c317cc80a59dde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531d32f4e8caf304c4d5b88e8ee7c8228
SHA1c938025b9d9b4df12dade68817e99414713786b1
SHA2563b2d3ac33e5b763ad5e69d48bbee59b05873ee5820c34dab48331b9959cf9d2f
SHA5129ce050fbb98088785072329f182bfe3c264f20a049fbde997c2bbf02561d0fa49a56b538d7231036e40322e24e52bb4d5553fb19590fd7eb588a5093e057efdf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\sale_form[1].js
Filesize761B
MD564f809e06446647e192fce8d1ec34e09
SHA15b7ced07da42e205067afa88615317a277a4a82c
SHA256f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3
SHA5125f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a