Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
e1fd248a454d0954673827ba5f0e8102.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1fd248a454d0954673827ba5f0e8102.html
Resource
win10v2004-20240226-en
General
-
Target
e1fd248a454d0954673827ba5f0e8102.html
-
Size
2KB
-
MD5
e1fd248a454d0954673827ba5f0e8102
-
SHA1
c8d6a56124b1e728f486ae8d274a3979f92b9383
-
SHA256
91f65dc2b31aabdd12a057ad7fde6c55415ebde23d4e2f4993df77b9fb09baeb
-
SHA512
c18ed7e5e664439c92cf99b7ce737cbfade007445d4896fcd208506555cf1aa6b1aa995f089abdbfdf6efa2135ba515f54013c680aadd9ebe1cf2251348dcd42
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af6000000000200000000001066000000010000200000000d721b5e0c8fd393bc15fd486a9959e25c377644010360d44db6e28fb50d9e16000000000e80000000020000200000001735de259aabe21ef5711c8e98d9359a1b3ca05c48d81d37d6b2aaf45bb1380290000000e5104338f91bf2647e86804e92322921f8cc4c6ad7b2f67cdeeffe9ae4d4ccac6cedce5c850caf4bd6dbb1034f9b0f824213e634cdbdb6f120489fc70db1c8f9469622d1f95125c3e3075e887e3bb45aa4d5df9f03fc65fea062668aab7e58479bf04dbcbf0dcdd3c0bba595115f51d6e618fee0fbb4a7b8a9c1871a0add1babf953873cecc65881758986003c1a013f4000000054f9cbcdfacf33ef5bbc36f8f0361c260ed9ea5c49507b8cbaac1d1ae113858d043373ffc36b520cfa04134d22f7bf9536f7d8adbddd3be0357433e3260d6c07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af60000000002000000000010660000000100002000000052c5644bce16427713974cff41ab05ae5c2a0249cfce628c114de9c038765dc5000000000e8000000002000020000000934952824c9c7a8437daacaed7f2135e9c5040cf7e6dc5aa39f5ccb99f75104d20000000367b313859184f127e9cc06ec5baecea5278d1461907590e932cee668a0e57b64000000090e303d0e2602c1552b4913bc84941c5bd5e7fdf744868d758ec235407da30bf23d08ca810112311371a84255d75d09e4f77b7e4085ca900788280fb2d757e02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417714823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBC72131-EC4D-11EE-9443-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70928ca05a80da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2128 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1040 iexplore.exe 1040 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2128 1040 iexplore.exe 28 PID 1040 wrote to memory of 2128 1040 iexplore.exe 28 PID 1040 wrote to memory of 2128 1040 iexplore.exe 28 PID 1040 wrote to memory of 2128 1040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1fd248a454d0954673827ba5f0e8102.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b78a2f7f7b978633a3cd8d5cdc144d
SHA115f63284105e5f6779178ab7a3c9e7790b824469
SHA25611f6231ee283bce7eed95e312b3e37ed02bc8f79d1efa3ce131b2d9105e8aec9
SHA512ecd3e8f8f7474452dbc8e82b34cdd2a875296660a804727bec9a9ae553cf6bb1672623d73eec05b7945ada53b40091b932a3f0984eba7c8c98d60664f53e5799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a30dffbdcd49079acfa343326f07f0
SHA197a56a6280f6bc1c68e2aa5f47f8321fcd83c484
SHA256196020985c1b3aec9fd97c61ca8a5e481bf2e0465d1c5e11ea3674508cc8b239
SHA5123a868d147d3e43f97004e3cd04ea433e7733f76ace742da7e800f3d10a9da537c103739332a1b2812b068a550e9da08f24df99e5ecb78555840ed6c611d93726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56524650a18c03f8fb2269e4a1f546b15
SHA13c8c62517b986cd527441da7a3f7f617b3c5910c
SHA2563d6e117f2343fc687b4411b39cf0c980689aa412b74e0f826cdc60eb85247e4c
SHA512a6a88ef25f3cd277ea6c80bdeb6dbf27ce451f4677555661f2d57143314a6593ae73d45e5a79384b8fb348534f26713e50b949b109d37f1109e7baad02a10e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562471802f02d36ab1b9531608182d33d
SHA1cdb9984ae21ee48a4f07cd53aa4741da8a22aefb
SHA256a2dea04bcdcc9a1bb42e0893bd6cfeb788d9b56f8de6a54e45ab579370ede493
SHA512b65e17817ff2607d69fc920bfed8d13f16e0174d49ffff3692a0a9c2ee8e0c7afe4918472dfe6c8ba99e6acd6525fda6328c78d3f8cff492c49ac7ad339a1bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef50c3f11e617b2adb8d52850c066adb
SHA1578e7f60aa49ef1bb787ff05837b878654b8574f
SHA2565da438eb8c03f0fa140948db77c7c8f4474aa0d9d6935d74fca91acf0f14a0a1
SHA512b37f959252475be95664c53034ae8240d0268aed1cf5e6a1c815d5adde138278ca68a5e8b1213e8aeb8cdfa9dac2ba9f1bfa3769ee815e10f6509f32d44c4394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d255c1075fa9e438a771448eb3a78c0
SHA1fd5a29002328842f4e90a09c2797331558656aac
SHA2566f036906f9cc61d9270317b9bb7b48fef2427f5027d2ecafef51f0a51e7fe7f3
SHA5121dba715e9a6cc091294bfff09d9f8930cd977b7282799e007c058417200703e7686bfd63824ea181297a20df4ff93ebf0377b4649685e2a54095fe4bd6a83cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e51c7e925cc4900219e5c12e31687cea
SHA10bf7a524177bde3ed7906f82389072f8c376ebeb
SHA256fc2155808f4d018ec1d9ae4b46b6ec70a57b9c75a959c0c08a7c69914b14cbe6
SHA51291153dfd52dfe306eff2c2cd71f7c464b63293c21e9e6a7535e145be03b07cb5e6ac8e7b38b5f74d0275b5cdeb0ddbac0f37ebb31b78d9ae6bc045b91b560e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6417686343d9765ab15c89c4cfeb02
SHA14f642822e1bf48ac3a12ef65790b3bd41d3e8ab9
SHA256ffd2b82d91fbedbdb95aa8a225a5388f263cd24cc5dfc8c67563a6d45292725e
SHA5120e441e483d7d5f6b4cd7f3fe18ce3d9620f3e42373ca4729f2bbe05a99a302aca1e1f2c2709aa732a3896320f0d59d212cb45e4c5a3f7b7ddd54e4cf54c4f91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585f2fa11a16d74649125a3ac3f63bfe6
SHA152aeba7c31f73942759f624a676d0860e24886b6
SHA256f77f049dc4bad3dd626ccb47facdd2b62b6038f20725862d993f563e944059c0
SHA5120f8f3eea52aa6144dcbd71e8726cb52c336e9b3a3f783f83ebea5f5320c66fb0f7e4d7de3ecae846897323d477f8e0f0df62971ef9f71fa092ac900d5e8ceb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e178067cf0221fab6eeb9b97e162f949
SHA11f72ab6ad555559f4a851b0069cb4be3b5d63ae9
SHA256865e205e348f161583914a96ee36ecfc3c8c53c103192aaa410f37e1eea3b991
SHA5128c1cfa829ff679ee1f912fe801c2b0075f1029668677a68b2c09fda6db9ba2fd3a3095738545c3066fa6ae79af2b4f9a217a1f2abdc18dd68f55659c95e73e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dab8b825a8c0f2cb3a2213e3387a9dcd
SHA147ecfd9f1fb6715b6f7c74b86e943bb95533cdbd
SHA25648c48f5b19ddd6177da6fbd27ceb16236a33ee9c6b32bd08f70565a3e6da15ec
SHA5122199905ebbe45ab82fdadef6a582bfeb58b36cac06326444a62a05148da5f7357115f6029feb4c39a9e0a5673b8be10dc7a7569d7eca65b07f2af617e698c493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae73c960c9fc233e487c5094d2f247d1
SHA1b9c651239446b9a158908dd17094dfc554395074
SHA2565c9dd076de53fd6cb4ddbfb2e630ceddf7f47f2fec36baaadbedcc6cf2fb0885
SHA5123466cb731e67fd05296eb3b3197a5318084e28b6626ce929cc64c41cfcd5d3d27dc49dd5c9334d8c99b29561c99c5917465f2e0154e56a2915ddc77ea25b5b65
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a