Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
pt-br.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
pt-br.html
Resource
win10v2004-20240226-en
General
-
Target
pt-br.html
-
Size
130KB
-
MD5
60d40e528f949e29283a9dd84aadff72
-
SHA1
398dc6c706896e6fabfaffff25f5b94aeef85698
-
SHA256
67d77750ed3c4bc93e15acf1efa928be0207c4dd57052a4d9197e67b9c07252f
-
SHA512
43a279a97f7ad86b7fc5d29f6e7a4a36905aa3adc5b2a02dc3c7c753a35567e40d516fe6f96a222878fa15526d7966564368b8c1428fdbc1ea5325c842f89f04
-
SSDEEP
3072:jSTl6gUXGYZDtn8igKC3z5UbM6ZS6Apr251fS0JB:k6HXGE8igKC3z5UbM6ZS6LSmB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000012134316504269249fd459b244efe4961b9839b8c01f4ac0062cd261689b559c000000000e8000000002000020000000daf3ebd7165f343d2f67ffffb2840957dd1deb48b97fe61efaf1f8ab5ade9d1720000000d6eb8ebc43e50ffe11121803586d7cc58e9ff12b9d19bb389142a3b5707a55ec400000004d03db10ebb120693ae09fd4d7357829133a54c19f098287b1b1b1a749f3f75671671573871939b5aef968be0b15805142ff841c91c7d22f2e45db045726f9ff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0eb432d258ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5475FA51-F618-11EE-9511-66DD11CD6629} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 1152 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2236 1152 iexplore.exe 28 PID 1152 wrote to memory of 2236 1152 iexplore.exe 28 PID 1152 wrote to memory of 2236 1152 iexplore.exe 28 PID 1152 wrote to memory of 2236 1152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\pt-br.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5586b905281b7bd6bac15dda06239d506
SHA12bf02760655783839bded95b0b39bef02b570ce7
SHA256bcfa5e40c323ea5e24fd7dbd55fdfe9c9c7641c9bc8f842eecb0609a677dfbef
SHA512c1f2b8cff5df4634cead615a3c593f651db50af6f588c65f158f268507d3e8bfed1355c8188971c08fdf0feaff3b8ce67d7ece7523fb967e57db65d4f01bf83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_E5921C7B3B158DA63CEFD6B7485ABB54
Filesize471B
MD5e4b0bc9e486d98b004749ee2eef2e4ff
SHA1f7b06e7ba19ed3eaa7672eb7e8aaf30a585a00ea
SHA2564dbbc4b283c95011388e878728683f87d8e86bae836b216a42a9cf762f97d647
SHA5126456f66df491b9775ef43c452f9d9654a0546f2357820f77f201d10e7ca630e06c069c47a081c23248ead7203388a2c6375a01e39d16e7c6cbec523a972255fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6d9cd554871a3f81c9e0fe6f2fd836a
SHA138b2d6cb73d64a57f4f954ceed4b1e461031f474
SHA25696a872c178b14652de3fda1c4616bd5ece821a433d4955fe5646b132d47a9cae
SHA512345b8f25cbb2b251baed053ed0673f49f559311995a9d435cc5c20fbf3d598c1efd7e3a1c2b79776fe8e527237cf6273133330361c86ed8dae67a7e420f6846d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967067b473dc982873bd9f778f196922
SHA1c52c3f330dbdd3d7a70d15bcfaa286f2fe37334f
SHA2563afa1667ccf2a5adbaea80ec628b4befed9e3283adeec73f70e28b268aad0656
SHA5120bb86553d52a93fa41ed1abe7db905b227b16684c0c1af98f1aa671ce2b564693e5e322dd7420fe7187b3fb88e364b72c3a818d06e985413b1e600997c4352a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d36cd063c443118b13c4e123bf26d3
SHA12ca9b3b32360ea18bc75e375d39960a53f4e1417
SHA2560a023f0d170e253c678a148031c5d871293f4bd254547fc40cd37081f7e42443
SHA5120211f8d5249be944e2b19d2b56358b1d0570e85275be2593e4c0ba077b0f3af135e2c3c1fb276a606875cb6d113e74c3cc88d2e4dc2a69d3cb4468dcdbba20f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8812157b8cf153269dc9cfc5a9a7917
SHA1f1297dd503ff83600ab5add417140beb50ff4d24
SHA256a33090d08429d447600011abfb6466efd4d122f032fdce91ba88ad1be10b9461
SHA512687e97d6d4087e1ddd0299c788f15fc1a64bcd0929faf61670a10c4ab7aff60c786e103a71d2b07b74d847cbacd644b8def109cee72fcb5b30cb37b0e83ac317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cc2093238a1396ba44c60ef5aa27c2b
SHA1c708e5662019d3fad6bcd9983e4624a295e07d7f
SHA25634b1cabf6de349df46b6d2cc11a866112bff6344e7f59086fcddd3786c71efd9
SHA512fa28256df552d13f2e62c51f23a48d76a981363d4e31ddad4239e3455f2e5beb6bb159d3835c5d2cbc1e80fe4b7035bfb8f000faccdbf9da396af1f685842e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55187d47696e897d827de7b16759a1401
SHA1528d96eadf5d720ba91121d9a1850cb34c2362d9
SHA25650f21c726462764b9803cf1adeec64e240ada7d899625028dabc5e9b30b18a5a
SHA512e6b1148ab0d024e60346f55ee67efea5e3ec42fe47376411aca6aa940b35cf6ed07b250f9eb174f0acfc2f99e3ede3f68ca1ca839f287a79b6abde3b48da4d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5393d44c3426f9d51c465a3d85192692b
SHA10eaa71747567c93cf205b436c925f6c2a416419c
SHA256061b5f904992e71709b40f03214b64f5d1d1d8b935452e49cf2fe2ae52702e7a
SHA512e925659d994e627d16045c8dbcaf86a79af8dc2472a8762258ad9060bfc27fa7dea791b99106c84559b8b5454eedeedb83d092c174f6a28935589cfcf4b731dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572cb359ba0c9f2f8207640d4dc226d11
SHA1fccf5c2d7e6e3190e8263022fcc3a1593040fc49
SHA256ea1c42875b943e7ad64220aa801f886f70e5ee2c462657d07024b8fff7cdd7d5
SHA512fdc8efc65cb37c24d6a9e643af8c6e9db7d912d386ff157663ab5419f305829fbcfc662c37a36e31d22271dbd12ec0cfa7f7c15bb01ccf7fa7e32f42fd1598b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571a80f971024403f44ae252f73739f21
SHA10db7e8fcd256a2b33374e1dfaeb0e461b1196552
SHA256fcacb8feff5bbb592250cd26185d41d3cd66a1bb8297771f81692cb5dc634b4b
SHA512a4296540645f66f3cdbf59ba00b0656b61369995f33a2c361d92dc10b13dec955594152026b0aa84491952e5b01bc744dbe6b723074d8be39880bd504a7cd94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD5cdc51e57f092a87f63531015e7b8ace8
SHA12ce7a961ea1234b02ad8450396a9eb7de9e18b2d
SHA256bb59c4d09ccf2c2d7d3da0d29cfd45799897aed7393b117b63acf1125c754539
SHA5121afea0ffd47d3239638cd657bf97685df027cfb8a4b8f7b17eeaaa5df199ae67124c488970e2af8c431ca8f94fb96af375b6d35ddc01692c219122331d1b404c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD5322b7f77a5f5ecedb575bfa0d2e12f76
SHA1030025ee14c522832b1c98e08b9c9c704704d63f
SHA256a3b1aeab48204969952707383b1a9e4c1d6b209ed454d71bd3f33e0d145889a7
SHA512568510b8c0751535b67f9748eff94fdd31bcaa04609036b88583a754c84c9787a8dbdb6b939a0597f8582f04d6087dd32344957213220fe368e707e4c5dfdea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_E5921C7B3B158DA63CEFD6B7485ABB54
Filesize396B
MD5e54f42900bd190c237db6741561a116b
SHA10984610a6607bba881ace354e8372170d8c13aea
SHA256f26a11f5851f6e2ea3da71fa2a6c31c87e7de5a9ae31c147be26c4c1448d50a3
SHA5129fd4dd5aa9f6ff31b3689d31542abdbab5f50407e3d2f6ad0ab8186084b6bbaaef861ee0c607dbd8cb69e2332e6ddce518889f5da2874a2d6f722797d31ac589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_E5921C7B3B158DA63CEFD6B7485ABB54
Filesize396B
MD58a275faf1108da2e2c4bfb957e2ace4e
SHA1897116af1e3bc1e9a7a8bddb4e629d8e83db3e90
SHA256fecd8fd0cb7826b3eef38232cc796417eee7fa3c877f5a7f3f69c3a9b7cf8003
SHA51204ec1aaef98bd491f51d9b46130b13620464f6d10cb57f6d2b3c118c94ca1f390ace668a1da01ccdce5335cc1e36b3f65c84598c53c94c482695aaf51dee94e4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
16KB
MD545bc52dec5f7e2194475bac885e88db3
SHA1284e9211c700b8ec20dc95ee259ea7fa5a7a8f9c
SHA2564b5526981d8d2af67e6e9c95c382ade404d69fbb639045e509a0d9f84c581a1d
SHA51204a719f83db356dd0c89b86c278b922ab4b9585b1d7fd3a05c8aa3eec605d93748206e57c28dc3c17cf075e9cb7cb81cadd596df83cdfb2c8d0fa54ad913d7d3