Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
�������������ݿ��ڴ�ռ��.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
�������������ݿ��ڴ�ռ��.html
Resource
win10v2004-20240419-en
General
-
Target
�������������ݿ��ڴ�ռ��.html
-
Size
187B
-
MD5
ed70ce90d39172c494e35272a366e4c3
-
SHA1
295b117c22663967110036215a390360c4f2ccc7
-
SHA256
abe39d6cc5ad85c3447561678421c1ce1fdce0292f592a101a178466dea2821a
-
SHA512
d3c9f0a13245be9fe9693419b548337dce5443a3d225f4d4e34d5ad5346844f9f16bb3615609c23b2c66f6a273e851f2bd796b71bf2a5262f4f8f705b2547881
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421290469" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000006c0febc78b0d02fbbb42fd6576df941b70f63ebff31f39ab305a28ff6cef8c80000000000e800000000200002000000018e80b641bbccf4e733043a0193f6934ec7532205a521aa67b29664296555e3320000000c81262e0beea2b48049b80773fc9a31b2c50da45ce6bf74d6b9fb6bb08bef01740000000cd27988a0671d46e3e9511e3724c83b19f950921d9b4cb6acf3476017127ba3d74bff49bc047af487bf5c7bfe60520f4d5331b80b8fb6ce21ed116b05d00a0ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A5A3721-0CD3-11EF-99B2-4A4123AE786E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02df1dedfa0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2156 1992 iexplore.exe 28 PID 1992 wrote to memory of 2156 1992 iexplore.exe 28 PID 1992 wrote to memory of 2156 1992 iexplore.exe 28 PID 1992 wrote to memory of 2156 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\�������������ݿ��ڴ�ռ��.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aebe0323157225890c365496085f840a
SHA1f54c4a182b23c4686a9c2587c57a007c867faf40
SHA256e759eddc9188587743fd72ff5ee161acf5d47f56c8f2b801c5d1def819945e7c
SHA512ef4b3295a7a7334e22ad50854ac61c39e3bf7f9330c2bfa8a795a555aadd1a438cd7f77f3d516f0f99072ef2613007da117efa310aa8c23528d7feaafd8da109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dba7d88530c8dc7d9b79587d6a84806
SHA11b7d306811e415a8bbdeb1010d21835017b9452d
SHA256e2ba240f6837568808ab5777158cec134ae72911e3dacbe710aa679b52143075
SHA512f12cb9d0854c5060b9a70006ca499400a47a3c08e2ebe962e58fa3d12a823c9c4a14ddf4fc3748f60ba44f9482610f06a569e3df99112a5ac3c754da126f7a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517324da5d173826d4dff949e05b80a62
SHA10c9565edea1834f7d6acabb515899b2f2fd65100
SHA256d21528b4074453c27c80f178f71ca876406777adc2bdaea08322edc5af51b113
SHA512c1a79a9b0abfb554628f15fb80f0099e481a7372dfeed410c4506be0de8d3827c9f1ecbd3d31578346a79fb46af8edba307c5e7ef2efbc2ff18a32c8ad4c03cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad6f29b6c059fbe0bd0fd45e6e5b1857
SHA1f731b1a9e78e6e364dbde9b2bdb0e4040950c510
SHA256745b5dc558a3aa83282024884748ffb61ed4fe878dca936ce56cb457f0b4982c
SHA512c115e13a825b87b9f10fa9cc834161e75da516ca6d86f8361e83c8414c05656cb548dcc0adf561c0efce570bc1321ee6fe6743fac7fac0bee0de8a30be0a1a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8ae0f861c33b067fc9de6faeb43cadb
SHA1dd0610bb5f74df4c0b5e9e792107ed44016b4fdf
SHA2568ad20a82fd36a1f5fa157be519a0792f902d2a0ae4a5903cbe8d57396cc506ee
SHA512904ee282dab2d611386775111302b8672edd0244355e67ea25fa909e05c31041a831b01f8d973504ddf1e28660bd0e59fd02932520f44994e30ac34527193f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504896edbf9c6cc76f571b0541fc04c56
SHA11d2e395ff425319ce47dd6045fd46b77735349ae
SHA256c2be47bc3231b294d71580a257a756f6c5cdd52ee14bc107b1410166f22552e4
SHA5122dc190319861b880bcd4d81210cfd6d4f80a7c0819accbcd813f1c257854cb7c34cdc18af084e308d36eba8074a3505af5244648575bd66e8b227a9b0fc54407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ec109d9c9327ee8a79d72fad70c8cbb
SHA10db0fa1633c8355edecfd1b32addd209b906f7be
SHA256a1968d1698666ae47d6fa5a826222e2c6d28bf64118382b7e306e050c2bef51c
SHA512321272b0e6ef5fcfb2a37995700eecd6d8b85701867df8739d86e09c318d5e7d18574fe35babd87fd0a1c029547fc18d518bce941cf655a5fe14003bafd8c460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5032e53adf56406a8355023c076e9031b
SHA107e02dd7a1a2487bb44c53ab6df8bbad8097d302
SHA256a7847dd22cd63bf87492671dc649ab2c286ab7762e161daf0c24c63f411cdefe
SHA512b397dad85bcabc8190dad9381156de3232e826cf89a0f68a85ffa616d47ee6df4947ce9963d59e128aedb07d910ef8cdd68ce48c711b11db058f75f34d80a69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510c2c467e96ffe5747a4ecafe3ef2f7d
SHA195b80daa49b05f28bc852bbb97e442a4bfe94041
SHA2564f50b90d752d9cc591f42395714ec80010c7dbd02fdc994b4701825cd492d47b
SHA512a161f82b43f8bcab12917bfd839bc8ae11665debd4837e4b81bb71526d8a220e0fd4b8f5f21c3cdce702a4ad48797b28ba7c8fd3a80a66d91406884e90623ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504db8a3730a0f5ba37925270542332f6
SHA1573b73eb99b9371a8e5a9f559cc8d8aa26189045
SHA256d4872efbeb956d4e3abe494a198d734b9d3d23cd2697a549a1411ea7f68f3df4
SHA512afeca126d1307d57555ce56936de2d783c0d172f6fedfa58171434c66f6dd2ba9fa8755a6a784918d1d6f2c1aea49cf9a27d7430d8656230e64977292718f236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52590dd7fec20bce8d3dd3be1e863d6a6
SHA119597900fdc8c8f5828ae3cce3cd7e3ffd29d0cc
SHA256a6e01225e5a5f97e3c1d814441e3e1bd89573799ff9c92ddf50d15b16336fb1f
SHA512c8e64a3cfc3cb8d3627daf5a7c37e3d9c27596bca3a106b43ca6a48031953e329941a461b1e8992977f89e048e3954634269c5a985b32ef9be6f34afcbf6c46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55588dcfd0c11df3c5799ee24c644dba3
SHA1d3e8170598ce765bf7b80bc2fa50637f603fefea
SHA256f50cac6487efe6a016f89e0bef94b724b21bf2c8d7d768508d9effb3a9c38a0f
SHA512eb906b1a861e8013d67f226ce797ae9ef9c39e84b394156977035daed67d76f0485d6cf297afb8c38c3913bef50a077233c85fb00b5fe4f76a6f6f66de4c1767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e4bfc41c557a775fc67782a5d1fba3d
SHA14eab76806ae15d39e76a5bfdacc6692b57608b8d
SHA25678ef6c1c2b9f494fa05e5309e8b0eee92ac9bfda811ff07e4546e55ed21b2fc3
SHA5122ac9bb8c082e54943cf8064147abda00d8a442ca0740a06d5edc2e0b4e134d3b5b8ea8a13f657b29fbe010a006237f6d93dff0b1d35a04e6ccf84cf035bcf798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5781f2c4e50281c45b820f92a1cecaf0a
SHA1d674dab96eab54be3450324b4f9f1dfa8c1b5ff8
SHA2566eebe1e6d792b893f1a320ebf985d4d494206f1e5fc5ef190013b6a88fb51368
SHA51247fb7bc9a1fc3b61a0167c4d2e7f4d39582416da162cbd54ef7089dfaaa25e3474d91bcac29a80408addb78970366852a8053699104e6a5c9c7ace123995bab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5375af4af987f95b8165adc3c5ef06de8
SHA11ea3067c3eea7b4a5361579ba08d29ca49394a01
SHA256e5520556fe0b72a709e00953381b96c446131dfabb47ec88bfd61c651bbdb7d1
SHA5127051ac2698f17cd8b088eb0f42052fd8f7864d16e631dc0612d43cbb333b0e4688235e01f9fd4f4f7d98865c1d721c74f11bf0b11cd039261b02425b50855cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fe3f56048c5abf4b841f7349d50204a
SHA15a13c49f033b5cbee4368145baa779af7b47e799
SHA256509c157aed594fdba09f4f18c712e2c01fbe2af242d5b1a82828d6c6f75d3347
SHA512484f92bc88b6b1c75f9b7f8c1e97c27a6b4c01158213444db243fe9ce073d9d253cf1d50d6805c6773d0213789d21112b9bf5ba3321faaac9b935cabaf222cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f31583baa3680b764c7ed858bc07a50
SHA124ca364ee536d425fd3bb660886e4317a73e2682
SHA2565ab0ecf1c5ce4b4314e27f2d5a1648c9c906c885adf2883d1b6c24a838690439
SHA5124142af34b8d21adcf7cbe9102b7b18eb28bcd2671d9c418cee62c1b7cd30176ab5a51a69fa3a2505224e6893d24e329a7615afcc5e50ac175f5c2a336036fb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbca5e51697d696f1b24728d21f3fd69
SHA1f2c97e5113fed584dfb327484cafb5d5ab63da88
SHA256cab8e6c0c52bf6a90b2d0d334264dcf879ba70612aaffb8d6254b76ef22cdd1d
SHA512de6b9136c8aa76d463243780e6fe179ce0f61f1c0d84ad8c557a3d4d72eeb42019d3e8e8d352bdae5cf067d3fe00d95884dda888ef8c5c572344990725cfc844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582f194b90e68ad744d99f3a0e6a3f01c
SHA1322e531670244fc9344e4b22dbf1ba874c448f1d
SHA25654b5206057566e8383879377a1cc7a28d023ce41ca790dd5370be43583802a5a
SHA5124f66843a26b9eb6f79398041e41e3d4bc000b8c430d0c5a583bb522317d821393bceecce9730568ea97428a35298236a083ee33c08e73edb2677fab33c637f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5142bf2b486bc82dccb4f8ea209c412d9
SHA12f2e53e238ecfc7519dadecc36ebcb4858b72764
SHA25613e5ab931a90d3fc7cf73754f2aea6a21796bbee8cbdb931d1c78a02f911f585
SHA5127635cf3676dad61b091e4e096e55a2265dc48492febf64ae74e9604827b4c482b7fe9239c5ccff71184fe27034af339de43d2a78738549fd49d95065c21ee73f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a