Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
exploit.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
exploit.html
Resource
win10v2004-20240412-en
General
-
Target
exploit.html
-
Size
82KB
-
MD5
d5479b22ced00963113b6bf487ec2df4
-
SHA1
325e78e306b8fca16634281c4444bec95fbebda0
-
SHA256
7ef723e7400e714a70ec437e9fe072347fa93fac03e4be7ae0176c60638a7a4e
-
SHA512
f0a41af10691b078e4708d9eb770a092ca342483e2535b3daf4bb2f259d8efe4d47068af84500fe23e427535cb4ae622655292ad9cdde7a8b896ca7492aafacc
-
SSDEEP
1536:VN886nBkC3IGl9psZ/FClHbysK+LY9Q+FdYRuavDSA6:Z
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000004acd6d8dd8070864ec5edb5524743c28840d4af0a816cd668bda29304886dd8e000000000e8000000002000020000000542dface31a504f703a6abe7012d8bd048bdb98835168e7d6f5e3b4b43f66f40200000006554fa3c5cf454d43d97e2d3f8a82657bd707d755560864b4c3f303c94b7b0c9400000003b79e357b2f04ef9aa8496e2bc4464af6f43d3ce9061055c784b1dee2a9ea37a0474d31140ef0528a66c9764142c566c4b593f2a7cbcb84791a269c616f5a12b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419687416" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000a2db07e63a0d3dc19107e3cfef954fe161cb15901967e399220505f282acb6e3000000000e8000000002000020000000cf804e06284f3bbc51de91bcc40ef0b9cb2d5a0fed9213a4daf8c7e172ae9fec90000000dfcb666a9d9e6f70ad53709789cab07c74f5cc25b654ca587d13a9636d6b8eda0638fbfef5a436675a124a0644c384d354f8fd414eda581bae6da38d0cdfde09b0f134534fc20972db07d32e95b6de7ae9c42875abca986deef077361eefc598d46c5c8575d9e2b95b4f6797977d578c5f1a06c1cff5b373206fd5b78088b79c0521120a21aea66a4bce078e74736a5140000000511a8a788902d01bbf137ff0488e1a846e71bf1c43ade184f4f952d0abbd90aef26a20d8e9d73e57b2305328385a2ae7c2821f821bc8d33f9f1259796e05bdca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2FE5361-FE3E-11EE-B7A3-EEF45767FDFF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d9b07f4b92da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1416 1968 iexplore.exe 28 PID 1968 wrote to memory of 1416 1968 iexplore.exe 28 PID 1968 wrote to memory of 1416 1968 iexplore.exe 28 PID 1968 wrote to memory of 1416 1968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\exploit.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59367778af25ce61608a18b23933a89cb
SHA1f7b02068ad23041166d6908284eb8bea651a1307
SHA2564079e4b1aec44d6537def9ea8fcb5ec1737b199c1f7808b5c04beb7819c17cbc
SHA51241478d5efb75eeb96629037bd121bd500cf138a267a5df7f4d22c78a3949fe658705acc4de92a1847682db2e6e47268e4d619af2aa6dc9cf2dc308e756a9d7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de5c38727666d7e65faf4ec9b32eee7
SHA1219bed917ccb2b4064301f7f44be50f3c19c3379
SHA2569b4722233e50d4a25140d7fcb6033f41b6202a6e54608cc96d3443cb8cbade24
SHA512e81430e841ed0bc5bebcbee1eeffc8eddde69933238fb075cc92e223999efd6f18c57e1cce6d9a299a36250cfa42e26b25741d51944d26d2b85e0e0a12d2ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f87d131b53a42339c2c4d723c58f45c4
SHA16f219418960e1ebff1d8b8074f5fd17fc20ce2de
SHA25652a2aeeccce7cd1eb821b8b9e1cb49fb8dedc4ec2272280cac331e4d076ba2d3
SHA512f4f4b661ec5a628a84c224b7411a8ca29241c49347c42613ff5a22ecd5f04f7834d7903d79974ea3753f3bb4ba9c0dd130fe909b7b04e916a80c66974f9a5f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560bda2b9e5a02592769061cd3c7f0c30
SHA1e97c242e8be2075f5e641153cba5ff93909a35dd
SHA256e6403463510e4297077669617a0045ea76be9bbfe992a3e0bf3c5d263ed65c17
SHA51260c87f7a1bc074bb42c6cbed73d58334d7f03cef482214331a477564a1cc1ba06a5d74994f378995b43558ea374e15a04775270074d8777249d5cb70e0841e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81bddcee25be136a9c24d1c95c8f6ad
SHA11d7d4993d2359ad88582ac258e31376449917a4f
SHA256b224de39985f1e493d7aca433f21580b82d6d4215336113ba0b0d89c12ccbe0c
SHA5128943cfbaea22503e2365fc914731a4a100f68467395beeefaa9770423d4e85f9a73b2903b314b0985a686bc95e53f7027a27e8995d21988ef8436260a8fb8970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e44e618d0bbed097df64307ea8f25b3
SHA105e7ac61dcd724fe337b5e2d0370a2cb0f49c6ca
SHA25680af152703ad063063b3d2488ebf429cedf3df136964060dd23971d9e124e19e
SHA512cb154cdc0eaf9bc3d887b84aeeb5b2149107a50d513fdaacc70ebaa5e2ed5b7f31c302c9fe1f2dcaed6e4adf534f3b7eca7a2503a57926709d6d4cfa08b52eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdb9bceaba96635d6239dd305ae64281
SHA10fd89a1f4063d6ac124c4260a65c293479a97018
SHA256662f7240c3afc283804a521ab868bb7794c57aee3dec6124a4e07dbdca6361be
SHA5125e6502bf6ed976c7e8a7dac1347520719b2a0afe84fa0e144865c47d55c23aeb37232bf38247cf4b9e331b81bcc3547f4ce5384b0a7fee8e255c20b9421fee11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3ea6b987520b0c335bbc87f1bb3a704
SHA1f2161486743ff43b9b3e3d28dd51168a70d58d22
SHA25683c9c8258de0775fc0f0ae87c74336182a8d55c537f5529f07f4615e71c83f23
SHA512d7e3cc32f971f71c95ae59f78eb1917f4f456f8fff74885fa6c3d5834b62e202158374f23477a8d2eff64f1b6e7915369b89bb0829bd3646be49de2875548771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac4bd3224151ab0b74de743dfe7c0eca
SHA187001fb2490e57dc4e9fd505c8fbb100fc3a5fae
SHA2560a393732bf65232ae579607a1dbdad822213db459523e89edaf761ea1ecf0fdf
SHA512667fb7298ab6fbedbf0163e1666322e4cf8692ca1efb979d3c2c480492bc4a552889a42ab1f0d59b6f49d1a9cad9d3d209a9a79d114942879b3b08b7a9973abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e4cd7b22d4deea07e4c50b27e93da9
SHA16d40828c0136c59bcd7a92ac015c0613bd369c15
SHA2560a59fa68062019332cd6057d485d23a4915f26b4cd167443169c8e67f1ca70f8
SHA5127ee71a59a14eb9caffb2605f4a18355f5b62aa3b4dfaf30eb9c8ecd3deb785287ef2a6c8cbfbb65ec08592549e001bdf4a17366d8ee1efa2b13ce5499645360c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5759b6037fa38bda756388a8421c39a18
SHA14930ca8d3ec133398ff5cec5f3de37aed58ecf4f
SHA25692832f6f7be7c3bf70bbf012a7bbab855e05c0ac3bf5cf4d8329d815169410ca
SHA5129e444da591ac6b6e709e0104712e3401ef76bdd2b1ff788304f180481ef61ab959fd972f72197c8543a626b9845eaef765dbb4bd9a491f7a7c5d1908b2d09aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15e7b9375dd603278cb59b03dc184db
SHA1ba61398611962ce907987ad1e4f9633e9fff769d
SHA2569f84e5bb0a5f679d03c5a51687b33230b3ad944f304b69e59421a2b9c4e3f923
SHA512f57f2e81c8d9e7ab1bf5d22ad648315998a96ce473c759563646b79fc749871272b1db7c9b4235cd65d5e49d292d922f6a9acd19192e5f6cc19b8d8ccd14481e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ad7bed6b0b61a305f0747330af61215
SHA1cd6e9f226a3e8da351ba6f83c4f0ae53cd24af64
SHA25669de54fae86028e2379a867154f6b1fdcb3b3df3f023924afb4c586964e7c7e7
SHA5123ace4492c61d6c9e2b96996b61435d72357c1ba08a42b2bc94c62104e84d8163741a9f82225a8ec9d84d17802e67fa165bc5cbcc29c182ab9f5389d6d1dd48f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553b2a6a557cc88af3a1d3068ca2720b4
SHA15e03c1ae0fd0654857cc524490d0ad4d87feb29d
SHA256a3cb32597100199ebf272d16d6817805985cd2ef15ec77650e98e8970a1d8349
SHA5120a13ceedd5761ff88d2a655749387632c736d4c9856c95c0c2a54291d39e9c3390a4882abd90af397b9ca95ffb9a97954b31d96105b96cac7d6960f379a64430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c773fe633ceb3e2ada27d1188e785648
SHA1c0eab8f351310eb2e0af5cbf075f4fd0644af673
SHA256ada4ec8765c91e77fb84b57755e52859692bdffa6a20b89fc772d2e12edeaace
SHA5121e3436bf2725de23199d7147be884cd0b5e3244091cb0271e6ad3e396135671b9f6b057943a538ebe0e870a713ec05abf194f6c2a91909a6f7201c553a549035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b0a9bbf232453c2b15e2d0304fa2153
SHA13a5f161e7cedfea7a97581fed7282d2a0c81c5cb
SHA25653f20693822b587b71b3d06721bfbe2890f8f3d1269aeb744b1606df5fc3ddf0
SHA512bdbea6249d4818dcb84a9d89625452b84d825e77a6628a9942ce6aea8fd7a1fe03f613c731136cd69cf389f3d4d9712c703c92129c2257fb71215c0f7b17d051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37e9a84af87667d44126a17c37a5e10
SHA1dfd774c2ca433786b24eaacf6f9bba1f6c5e4b00
SHA256ae589380ef1bdf527deec84486476544f284b5b93a0ac9c0172026d8997e2c9c
SHA51287564043f778c72eebb1f9d82889d22df69988c9d54fb3890693e2b98f2917a874b4ec81b4d2499d45a548a4ed1b0690b8128c0509da61f7848e749dd33432b7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a