Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
fn.vbslq_s16.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fn.vbslq_s16.html
Resource
win10v2004-20240419-en
General
-
Target
fn.vbslq_s16.html
-
Size
4KB
-
MD5
051f53e651859f79a2ac91e81e86922f
-
SHA1
3b5293bccb0d5aebe9524dd424cd57cccb9b2c05
-
SHA256
e46e06ac9ea04ef8951452cd47aed8ea16b1e3b785abbde56c6b1132931b98c3
-
SHA512
83146accddd1cffc3bc49b7f92f75a88b2dda5690f5c7bc5bd75c3b178c49a6f57158f3a073a9bad39adf3587a139678a4fa1d47939b462f64173c5b4cdde26e
-
SSDEEP
96:TGOt7VB7oNtqK7PXUO0Eo2yz1sHlOKSoc8dW0i6HGCXuBA5S:aiozMOfkTC1uBp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208358e6a69ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000008612d86c4a126858f7f875f869094efb82d5a920683e5916ba6b78c764f85287000000000e80000000020000200000004194800685e105af17cba061b0d153691582cfb87253e178ac4476ded95309ae200000003e96e858116b4cadcfcb8b6049f8cd1d26207ad5960d1145a55e38736dbec319400000004a761523d1f7f7ec826a635f4c933a03d48df27d8dd11b7b816b5a61f18b6f534dc1bc9f617405b7a411b323fc3a1457096f0a32b1756504e459cb6565be166f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420606294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11B57E61-069A-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fn.vbslq_s16.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d8681c0bd85ffd92cc3343ee7741eb3
SHA1a9c46a850e47274ea8d708df26a520c493bbfc50
SHA2565af9394d4377e3847a791265c2cf224dd53a911472a4339adafe5ef1334abea0
SHA5121af22230d7da48c99cd8c8766a92b2e5236442f874769ecc7bb7b040b1d34d338fdbced7128242db750baee0ed70ea46217e63b912cdb76312e7fb2bdc8306bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552082da43392e40fd72dc406578b678a
SHA18f94e1db356bc475795997b1dcd41b8caf4e8e0b
SHA256107fad09f4bf684cc4847f7adb74d252933c2fc40f51ad91bdb35c04bb1c2bb7
SHA5126bebad6e71ca174d1f219f93711aed863d67603ba42298752cc6fabb43f14b4d12d05557ab75abf72bb810b9a4042511b6f05d231388e5163180948b185963fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b697175fd826c29e03eafae76015036b
SHA18e5d8da928bd81badb1d2a63cbb26ee35af8553f
SHA256326f2310829b59873c693e5e93c044ad4986ed2564088806a251e703483f3372
SHA5125020531f3ef44a1429b639d324fba1d0d06d481e3bfed9e1bc21bb74afbb2cbc532e98cbf957e8798675482f4fdc86a38db76e24015a4f8e8db1985f8657fa58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae67b6edc2fdbb41ee1e6e7d06d55e5d
SHA102709935dc0e01845ba51fbf44c3c2e145edd798
SHA256148e025632d32bf3fc835fb1f5a77957a8ec8b55ef6c0a96519ef4c9c4d0d630
SHA512d6f17b43a145fc6ec100f9f10a2f8c249c3c6fd26d480f065247881015a9d32e0aa0c84dc1382504f7f0bb55c3fe256fa9ad20c150457c9521ec754133c1ab91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efced828e83071e32fb669a9ddcc66ab
SHA1625e9e24e3475bc4f2d81627df72324e7e4a82af
SHA25658060b06e65f94afa627e3368d66eda272e8a8cbfa051f736986ec31b257fe8f
SHA512266d806ebcfdcedb31940c588dcd03ac7d274754e98a3b8fdcce6331ed837fa96c4f57b126f17567eaa80cc70102de8e8dc4031b197d09b17a7ba7d747328371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f05dfc05824c05ef34817448b32c95d4
SHA1cca0c2d5516caf89432b103c70ebe4148735116e
SHA256f92a2b25476abcc05772054b133fd41f28616e1f0fa6b1968cdd6d7ecea9984d
SHA512f0575692ad044a5f3808dd143916681e770b608e840d4f5127ebf1b816017aa9cb58f43c31ff9ddbf71c59302468b73987448cbe21ac9a0c50657d3517605025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bbe32f4a64cdbad4e37dd3c85f304bd
SHA1f2cdc244a6bb0d519119211b3c6dbcf8ff3a8ad2
SHA256e4801035177295d5fdb71f3a25ad728d4706ef9cdc8155f5d0cfe9d11fbc34aa
SHA512a8d678792286a3a6cf0bf6d1f65f4794d203194de58a46a590e474e11e966b89ec58d2f1c6a01334a2b2fe376eb4d8fadde2c4a6143478ba3dbeb2008907171b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ffeae953ad71e0629d6729244e36e89
SHA1ad75772ca5ae5143f54f03f89f4d07e473d0d0b8
SHA2565a619fe0d0fa6e8cf6b94309eddbdf3b2822b1c04675322e8e2b7b007187698d
SHA512cbdbdbb44659746a8a69b6180c5294f0cf32013ddabfe320ea5c797b9284764835a01f79c52adc8ce09365a9dd665493e1b28f3d8a2b5b754c55a620ae05b3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b38950a895d9370350620411510af158
SHA17738ccfe6f589a6458af61d4307323258913fa98
SHA25667aeab35b862ab507ef99b9964970dc94fea2afc34b71506d7e1bab4ee65f3fa
SHA512d757130c0c269686a3dd54351d109d7c47b263ea76170dcfed63ac5fdd1e8a2e63abeb9a89cc85127c40c383c794f0412e4557253c5c16f227a195e614e77a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c451b408b4333b0332f572c8c7c1ee3d
SHA10a0693daa2894011eafa52515a98b871ae260f8a
SHA256a7f04d4a01a9f3cf39ff7b754b4e788e8a3c4c188e65b562479bd65e4a80403b
SHA512386d17d46eb4cda7642a637ff318bc3401314143177113a5f14f1f9da735e40f0e552d3b8e04f58fc76f5717e4a7c59d9764a67b232736313e1b21c8d43e8a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5713180419bdd2782608d3b6a1e8ab1f6
SHA11480c821cddf9006d44088d2b1a95f8e54a408e8
SHA25651f6a225536af03485872fdf8d67578ea0d2ae8da872d8944013b053c7c29a8e
SHA512816cbf1b46768ce011ebeeea1739f00cb89577f6ee75b7297570a4f5109a3c2ec5c7a452136d24216d53107ffd2495c6933ed78b2cd4409d885e6c6359185fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4eb82eed8b6798ce243101b41a53969
SHA10af86b0b5185ad37e01bacedd947eb4eb4a02425
SHA25651eccc9509b67b8f9da184b1fbb312b24ed333688e35a9c443e6504dc6d824a8
SHA5127f3818040f7d0517ccaed7d6708d00014cf3446034561c8ed2d7ca9633f7bcd3757097f4eef50c1abdf64d145f57d4a64705c903b5c61d27c9db0dccb7bd5c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aab090a8d74917789e69a0f5572aaca6
SHA1bc374af45daa5c2c6a84f50c8406d3f4ec105cf5
SHA25612955bcdc54406b18e5083a4a0636f54d2ec6aad9bd2ef1ff95fe6c98898d5d2
SHA51233bd54bda84cd4ece8409c56cbebfc2bc4d7b0e5567d4ae73581a93c09fc6666b21a7617cf75c529df4ac6ad96fc1d0a662e01f4b1ee938311aab99e57f13926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505fded4dc87151f7dc63b81848c65750
SHA19fb092be6d21b25b9f2c39b810efe404e0c5b4bc
SHA25638bc19e07716715f8aedb9f4c85961375801519021bf6a7b75cd179ebafcd09c
SHA5123226f5dac9663159f4fcf13b9b381168fb632837fc07f1dfa402bc67c6872f81c90ac3fdf8c3024cebcf6deec010a955d6cad6acb9ab1f1e141ae84ec877b586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52611869b4f2bf6a3806e5ee78d91db7e
SHA17cede7a656571306ee569624571bae5378f29ff1
SHA256d2029446bd072255ff91c3fc6b4e2c6c1ec914e39aaa512e421545995bab7550
SHA512c93e364b74c4705ca313153a95e6e1915e938fe9dea70b63a56787392911e1add3c02780543501b537dc4be4a8a8e25ca03c17a910a9d9c2e3e0ea3f0f6afd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e23f799f3526f7d3fda3d2c10e47fe40
SHA1de4d6479576650a5aaa5cea3195a418b6e3870d4
SHA2567ac34c2b57b67f647879e2c991f13822ec0d993ad8a1beba273ccee8b4a4e636
SHA512ada177a240586544846bb0e66430bf6e4ecb1272c702a7e5e04ca603b1d4b19dd8ff59a2753a96f7dd9d8872c5848cadb2d5750695dac1d5a7a4c864d7f072b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8bcd690720d602e1d35c0125332e803
SHA1da921a4a666e4a0c4cc8a865f19e19fadbe9cca0
SHA256dc2cc3ae2352706df692972adac3a7606ecc32866d2dd176a6854d39279276fa
SHA512d56e18fc1512747da191c7c621a23485b986bdc39810cc730d2d613c528b7a393e283e2fa3db4b6f6d3e424a0c3d7e516976b28678f7b2e8bdc38bda154c5ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571ee7891588e34be34d198655e481f9d
SHA13b4f95ce426e694723d7a6217b9509216637ea13
SHA2562b3ede5e244db5b87a78a55c5401f40c163fb05203102ce648f7df6c62eff36b
SHA51285c559ac48b50c81e5f55d6a3409205e4279e418439d13f0e1860d89210d01158ebbee90434f4055055b9d3e48b1968826daba742b32b4e3215b8944f2d561cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c99a73cf3e880d3ae3c5007e7a677fb8
SHA1cce7739fb4e21d13cb98bbf7fa627eccb3a760d7
SHA2566e83188579b50a6d85787a44e3bfc2e108957331867b02be9dc0823a25925913
SHA512c3adc8b5fa79615d8cacdb78f450d8866ee91cf2d15b2f656fcc63d9bd89bbfbee77b15149465c99783119d471e87e02c77460b2426e6e32690e52eeba23862c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a