Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
Infoemail_Bradesco.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Infoemail_Bradesco.html
Resource
win10v2004-20240419-en
General
-
Target
Infoemail_Bradesco.html
-
Size
51KB
-
MD5
fe44ca2d718d61934ba5bf95322df7ce
-
SHA1
3fd67d6de3055f427b7fe6064b1177e021d9c4de
-
SHA256
a5d6f93c1438ac15f33ac72cc7bb5e66794394b84818cd1a8ff59ad7fe7f3669
-
SHA512
76c009265ed359ff94b44df7ca10d12950e8ad24cf839619ea207d67e6e81beb9541815daac509815162cfc3d09282c34cbf8bb8dfae601e7f7af5c4eb0386b1
-
SSDEEP
768:TaI6c0M9Hh/ek7gk+eeaDDelH6VqQQe0Wo6rlsR98K2ViKjR:TaINB/37bnPkaK2ViKt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000001cd3e644dfdf2f55b567ae3ebf668a4b0ffdd27709c4badf1e3684f8ff3dbdd6000000000e8000000002000020000000653f169339c9f094db544aba421b5a8588d9800ac96f58f2ce54db82de5e4f29200000003afd1f97c08a06eafe69802695a85c0c490aa5c91b8a40375b4cbb211fe7aa0e400000009ec6def7310286bb90f3c68f9d18f7fdefbc38631424e1780ef6aa8c6a15b58a557631cabe91bb7104ed7036c93cc6c39090128996299cc3b9879c84e7e0b7c3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60597ea8079bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2F61CF1-06FA-11EF-995F-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420647850" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2484 2292 iexplore.exe 28 PID 2292 wrote to memory of 2484 2292 iexplore.exe 28 PID 2292 wrote to memory of 2484 2292 iexplore.exe 28 PID 2292 wrote to memory of 2484 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Infoemail_Bradesco.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c7ae36cd2c0855f7a56b3c96961f4d8
SHA122c1cd96ea55035ae45b7c5f1e644316d970f302
SHA256497ad52419a99b420f6216b90bfe4a28ee29957d622c9c07b4a2333c52fa9125
SHA51287e6a896fcf2cad4ee2b9f92a6d006487d79ace437d70a36b4fb6cd279bf7537f727b2a034db7249bb1d27e145abf3ea5a1242a5872897854a35bb9b2709b4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f24ac176f2a092285a87faf9b2639a
SHA1917e7c6566281eaf40fb2be5527b040fa7a91e87
SHA2566705db18f8b377a0a90669882c0b9b0e9c6d23d0a2ac57777527c3c1778d2021
SHA512cca6014116fc69aabbeaec9268d5a9de6152a18e56f5c71dcff4fa215526f2a7f761563576a28123ff6ca01d5e0c6bde192304ff6b6cfd5f56d0516717c14e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce59020f8397bd7190866ff25643a90
SHA1d778246bf93718db0a05067c4f5b46b911520c8b
SHA256b12c282ddc336957f49d79d9136e8fe9568ef10ca796d30eb5b53cd6dab66232
SHA512b1e4370ce9d3da8f5b66e95a936e35e083961583d23ee5f710ea2ef559c01ee8a3f6430b74ecd1283a327a441baf93b84861eefdde640d2bedd845b3515474dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f682c5fe85e32f582066be63b4aaa98
SHA1dcfea8ca7c8438670d9e3ad1aef78a2a7366bf81
SHA2563b29da717bf2e688a3902b106724edee3a6364204e3950ab3d536b2cac572b10
SHA512696b0e9d5500ef46c5056e25253a34d077b2be92c29df6632f7a0850d028464d202e19bc8b4119d63278b60b80c48a95ee2f1b84ea2b4aad4a9e3ef5ddb50942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1351e69a343bed742c07689244578e
SHA1187594d7a53827a4f2bf03f3ef239e709d0e2e62
SHA256812142d357b1291e5654855636719fabecb2f77270029d63e1342498419edf86
SHA51204e56a9d4d43ce5509b0a8cea65f0603dc32a19b52384dd51dd728aeff471d0f923934580aa6b1f95b609b8a19cdfa6992ec1bed39caba09bf7e67430ebf872a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59796658760e10e9bb94b23fddf33f02f
SHA1d7b4acf74867766c894eda2d7137b453ba0a10f8
SHA25658fc03cabed7bf77fddb01d85a5a747fa5b924811b78028f2fa256766ea3cd18
SHA512b6b8eeebaca83538acb274ed4eb8f5f84200ae2f5eb4c213e8db6ab2ca403bf6ff17845167b8f03515bf29f577ea0632a4ad224fac0ef8e2af9e15e7cace62a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a06b80bdb9d309706beb53c350a31da
SHA1e19b866c15d5d533b4e2fed9ac85442fc06c852a
SHA2560ab95e69d6f1b39f35a9e4798452ef50ed6cb439d1a2fde56125b38295915daa
SHA512e80de044820896cbf5bd70a4144a0891622f94af517465b2a28c1ced40a905e344cd9050c89018d0c54a04956d5b93848b7385dc2d47980f28611d3a825b5394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e36bfdaf3fdcf0f7695f4913a6a96e1
SHA17355bb727df58605294a3dbe497f060170f714eb
SHA256aa9ad4513ef07acf2d34e4c2f0252cc1fef21b1448e1240b4fdc52d8ac168988
SHA512fc497897ebef6dd51cfe7f5c711321e828d272bb7e449cca81fa0c4657229c83bd379be0f8d567b68027f1aa0a321be76fc371ca5fe2fe1e9a348fefd465cca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5454ed3cb113bf271c9cf4657e72bcb54
SHA1248b775080abdb73391dcef932ef385840c6e242
SHA25640fe82b8415f728966fa9e5736d7b670080fa0279e68a7d1a6a129bb157d5541
SHA5123c7fcd64ec7bc7781d248bffda308e209176a621755c65c889b58bb608795676ad416d438bb890b7e0838c65f9a5b56b02b62b27d0dbd4a0e19dab8d420e31dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5628b0ce1ad81c2ff75bf1433537044a1
SHA10e6f9c87826b976ab670211b04cb0b8333fbb1e4
SHA256046a8046a300a6da9947888945aaa07650d8473c76fd0b6dd6baa55e8dc343df
SHA512a21ea511dd8abca554e49d1cbcdb3c89f688dbd26d0d2269d1cbb35674c14038027ff690b12eca519db91715c8080595040f017bcd4bf8a4abd399ef1163d275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7dd29531d215c830e33fd750a80dc6
SHA1bdf0e0a95212cd0c395e0f3b858df8d60e7e9e59
SHA25672e0509976d2541063f055d9ad584a886ef6303cd159e0aa44fe8a001b8c0217
SHA5128457e3bb5cc4b0ed0e043f4f58de51beb537d61b118f58614e7c25e127e4e3a4b181d44a3a2dc754d2e7e08edbbf577a362a86f6c237024bcf424a40a28dd9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd7dfcf5148b14a05d5c0a4d2effa80f
SHA1d0372b92c5fef5f2a486d588fbc96c946c883139
SHA2561b482f3e26b1b181ad545d6c2ef69d59af77dff7c7bf9256189f5ab4caa94d4a
SHA5126d7cd1636d79b83bad571565308448ae0d8498d524965915da4b594078adba42e8dd742536c1bdabe162c71f3225053a5b9e940495f4f7e550c83d9f76ccc945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3e2006e0d8b799d9cb4a0bf3b528cea
SHA111ae814a4ffa24c55e78fd00432181df85cf13f2
SHA25699db543b298138e4c2ee0a57a8a7d29a6c6eb8de74e8cee8820b84d6a115bf33
SHA5128321a259698a1799a871c5bec9b729367616670408cc9d3bf3d5bed797adfde4b4d466648fe57e6edf2192d83b424af525658afa6b4951d91c4baf89882b61bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f1392640c3aabb149c85207173fd04d
SHA1aae6ef1ac9a1a52d90dbe50e11adb996d39f529b
SHA256d1da9ac1151052c89a9fe2399628250b566d6c73d85240af242dd3a8d0bcdd07
SHA51218e9890b0ac0d38a371763fcfb324786cd258bb26a0bc368c47287b37ba0cc374dd751c4b45aebe40c4c1f89018278db751c849a2a1f409bf4e2cd0729146024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560b78cb06e7923c92d8852c7b91fd896
SHA1eae23f8ff31250abc159f0b26115ef0b43630821
SHA256612a20dd309b323db89f4c7d9ace656464dbd78dbab1d49f6c265afb442bd5ba
SHA51278064cce1e21f6f7c4a58397f225fd8e85fdbc0d73dbf52cb4d6f3e74055f90ea9de8017af68a8bba2e46972fa6393560e1d6b3a2aa88a67f688693ff8249a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd94b77ef8d8fd54d58a59da608d7c26
SHA146a39dc7873735174ffe0927a46d9121b0c8ffd7
SHA256f84aa19bd2f9cf5eb153471e86e7e9f07bf369e11fd52ad45194c80f9e0cbb9f
SHA512a400f17b840801d0eb168a89b92d9fafd58decda350894738a1d32c118a36568b807367e25501dc2d4a7e68007e5f06265cda86f6184a4eca2954ad1495c8431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d669735ac53052136cf3fbd00c024bb2
SHA108775a3467faa674220eed72d65b921fec698ea3
SHA2562eb47f068e00c7af00c77bc2e3204dbb812ecd33098dfabd048d8370c9a782c2
SHA5128d085b436949a56a630ef7d87da33e87bcb33b555f5c27d9668641a5ab2b47f030d14c59e5b6aaab5e12b63cd6bf7ab2ec0a85194bb12ab0381e0525faac0beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55db215fef2748370d09db69766264b20
SHA1663737ce0e95cd08d759748645562d181b9559b9
SHA2566d9cfc2614ab9b4354f4566951b7064937b668b343c89c47907094dd02af644e
SHA512468d78fd4c5c7dd5b8e591307a88ef8cea8fe2e28a5c45a1d8dd9772b5cecc08dc9ce7b9d71891130c31120301b21c68c9ac31606c86482fad176f47cb3107be
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a