Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1560s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
General
-
Target
.html
-
Size
13KB
-
MD5
62802506e4dfa0300f19adde46e0d1b4
-
SHA1
acc2148fa784d9489c497dc6bfd2ebf225d65ed0
-
SHA256
204d9a25fd7e6f21bd0f9eceabe255b03e2b4c06e363b614c56a324d6ea2d6d0
-
SHA512
fb430bccc5d9cf091397da5e4eef2bf23ebbf0274f3767d844906b19e84ead2a64994b3d705e97ba38a5a81c1985e6e8edafd398967333d2e83d8b40e9315a32
-
SSDEEP
192:PNxyShvK9moqTJkNr723X86MFsI/M0eyWN:yShi9boJkNHRZM0AN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421586560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E575E71-0F84-11EF-8178-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000003608d60f20595387dcb63c0ff672cb8145915bdbb786d5ae6ab963d8a99e53ca000000000e80000000020000200000004fbb719fa2a4d0b4c2f670773116c446f4f089c6306aed19a478d4e553354c6d2000000016ea37053ca1c8555f0f1e20780dfcf6b0106409ebbbbf1d0cabb939d5403771400000000989f5695f99d251e757baa3a77292ba0ecc9a48f93da0f3bf0085f7bc7e09fac36865e7bf2f095666c4dc8e08ac06ada300aaaee11400a4540e5c23a4a78ad1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b4d94291a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2780 2784 iexplore.exe 28 PID 2784 wrote to memory of 2780 2784 iexplore.exe 28 PID 2784 wrote to memory of 2780 2784 iexplore.exe 28 PID 2784 wrote to memory of 2780 2784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b115c8837d3a132b13ed54705949696
SHA1bcd0aa9ecdfa0f5f273b45b86dde109a3c042627
SHA256c0850e3354f05f327521523397f5f777cb1d97cb96d9ebd966ad7fca1f2aaacb
SHA512ef24d954213a87dbbf5c8709dba902e6f4dfc2dbff47f5e2164e151aefb0c55390401cc044525b499a88d287cf3f773449698c9a09d210e2e7495e030a7789af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507d3f5121b2cd2b07620cbc9a54e76c7
SHA1f383780d2299272061f2d18137e4d177a310f837
SHA256d69489adf1e14fc8e24d8e190246caf7c74920cab56392370301641fd03311d0
SHA5128d16eb277d71db1b6c714bbc5961b8d175599086fdb37a4136fa149c1c908750aab47af5091a4331133af733df927d76b9125f88aec916e9ec58f08a4c837b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcac257d2bce8b95d2fee78a8eff668e
SHA1ddda5b9fc361b7fa7ea105432eef18f68eeb46b8
SHA256f455268bb9d1fc5ca5a5a4833f0f7a4d96a2ba8b7266a452458e2370a557c462
SHA51247dc95c0afe76efd30b8f42b5fa43ab495e996f36f981239be73696f4ce73069ee4e9129918f3cfb70df34c8fb56f4ab1d8dace81679f9ce19688ec3f584fbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbea8d87dcdd38e06f15f2459b8f086a
SHA144a8b38394787484c61025f246303de290499738
SHA25667e89d5e4cf7cda6e7425d6654d305521ef84dd4b06d894f4306d254fde9f8c2
SHA512d44f6f972499e6f0f1f9653614f3292c9f352c7488d53754e744449f2c74cfa2db00d01cb199dd5c97ee4969215b55b18494c85a2b041d11195d5d550afe7f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c09e358c4e96df4eb7975f33da9e1e4d
SHA12a391501f116fd1bd6b4ac27471ad70a55e23475
SHA2569c0e78b9ea819ed315235abf6018fe465acc5f69f7657cc6cff417302d6d6a42
SHA51227f4cc6eccaee5f0d37c0690ec4ff17296a89f8500a089c1b6f28ef541aa56322119abfd6d4d285f26df194e60866d6874bf4b98bd475dcd3168d1727714426e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2cdb6495c847e7078266594df28dfa0
SHA156db95a42295d90ed0968857b25bbafb004b1d4e
SHA25637db11a3e94142368070183f1081c021187c7185e55c0056adb75278359294b5
SHA512c88327168dda5d7f4fa83f9f81923a2379ddd9386f786357f7cb51ea6d0bbfecc94d9aab5728cf80645577d760ac3f86c5244eb0471fcaf22d1419174b3eb3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c667a487ea8b960101448fcde36da3
SHA15707e01755434083adf7d7d2ab829a916e7798f2
SHA256865ea749bb0024807cac0dd9494153433994c96d4126a88e2475b419e14d54c4
SHA51258ac2666392f2d98a9fdcfd43ac4158f1c8f6701bce47f78b4c978e7ee717ad2d33873fd253d3914bde2480389e6013c370c00bc3401e6d767e016cecd13f476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb55204bb5b6a4c527b3b5dbe3a4f4c6
SHA18802a0d67931aae89a609b67bfe20bff740edc5d
SHA256be93c89fdf07b22eb7db788d7b234a233732aa561f8a01137b08b15821839925
SHA512fe18f8714acdc0d47401cdccd0b721eb926e8e9116e784053d23ec7e8a0980ed242a6dd9d753796c6ecc265b1da3e459a3edb9b336d2d0ae05073a473c2c179b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5561b492584b0f30de8c7ab42b063677a
SHA1d3aa0f794c7f8c392e3d05727642b804e1712b70
SHA2567473b01b6118476e61ae82c7850396bbea57c75fafeca8aa75f0754753bb0e77
SHA5122fa4f2086c48850110abcbc8db0f8f75410e74cd74c64420f41b247aa08bae6315da2ed966c9daa3f33e67560f8efb08e60026c198d29ece6a68392ae65143f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb33d6708741dcf46a4a7b54a03d6b38
SHA18ed23c59d61749a15ed7733f29aa758a20a11644
SHA256d5adf0eb1c5e110a7728dfa9eefe9a7ad31565f050c1441e3ec46a8fc1c6ad14
SHA51259ab4889276fe53782dad172a1e0ee13df25be46ac802e3b6988211a12b77314fee91dec7fd4c4b8f672636ed0eea9d8c813e4282363d15021b51ccf0ed80fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e88cac0708be247574be42e60f1a67be
SHA1f5c3d550511c3342911b6e12c28474efb8dc4ad7
SHA256044d6d85aea7ef5fd200bbb83b8baae4511da00fc273640e557d91b9757a0e50
SHA512184c296af2ccab0bbd2986249afae8029da4da18ba07bbd03edf1f10a6208f57c7deaa26a7447085a85183a290384e66c15c2a49c01fd008d9338d22ac33884c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eda771347375296f0391db04fe205fb
SHA1893c3942592dcc8cdf20164fd981cbe5891e3973
SHA2565fc345a0e741903525802b83404e69e8b22feb41e21451a3a6e6ae41c7ce4dde
SHA5122dafbc36bc2e6d2ff2e94bf48db9fe30b68a092f23dd4f3face1bc876256dd1b94b64c7011716952d88a599fbf132f5278612b95f6e91be19c321ad35112b75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e09d9a660f3a354c87be5769a7e897
SHA16948508f8b16047a7fdc8d61d5a3912638e16826
SHA256175121e3dc8b03b5d20399771858080e0e226035efe44f8e81368b73e47db40a
SHA512ad3503bfe86e3693c319ac766c44a09ec4041a5b879e235f0cf492f416ce4fa8bcded485300c80fdeb8e686f3f761d1ad6bb73cb6b97df59fc22e3fa71847efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590ef394b837d199fb2a55be58a74cc89
SHA161e714df95c961b0c5893e4a20a892ac64543917
SHA2569bb9ab377eb057f8505c6311f110617bf544425acbc752bcf37d38caa496138d
SHA51235901e05b33ebb949a8322022dd54655d950138d9051ab55325cc8a9217eee9dec86c160130011702d0c844f9bc81bda1ecaed92aabd0490587407d7615524bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5691832aff15be50c826884c952be724c
SHA14005ab8118c4d89331e9be6e2a5df3f5c7a5d8e0
SHA2564a5af2631c475aa329e5c49bbda680d644f11b8bdce97eb001dbd31e317413db
SHA512daf22f1de8c6c42c5806636162acd290ded7170b3557ddf61716156026dad10d6ab0b12c4c53fdc8949ea6479b3b1ed603dffc8881a0ced98c5b79556eaf87f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d35899c5402a249930ea208bec3e93ac
SHA16344b82e8933e6d9cec825c6e8035a7aec6a618d
SHA2561d66cc7c1963f8bb327243d2ad6130b9211c77bec4f2b435c121f2bfe0083c83
SHA5120493a25a51cc2d926a77168c218207ffad747401c6945c8a2d0cb7c591b0345fea1ad540b638d17fc5fa522eb688d07813a3a4f772b50d01dfc5372bf3ca9aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f474a6d2312719bb226cd1600dc4c413
SHA16d30a3c052f199fb9c29da94a9b742cbcb03b7e4
SHA256198a3401acd2aa8881ac60bec4fb21b04f2dddc5cbb55a15bf03ec4cd3c94aa5
SHA512d01d3062b899536e084defbfd6f487d093a2febfbd6a9f7dc03f4b95ce528e05c4710088c7be03219aac1a48a77f84ca9641f79ab255cadb29a29b7db5650da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503e3a0ac043a557202e7e399560f2c40
SHA1dbd32337256dbc27a312d80b5f06dd806902db41
SHA256b2052e9a6c9927b10d654d6cd12ffb5c3a9efb948743af9a15e9a4cfa408d636
SHA51262440e61a730a827053c9d44946d5ef10a171750d3a4e4afcd732edfb12f7be54468875c7265581f885c8221c66824eebe949f52b15a14ae506bdad64bf1a13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51635715eaabb5161c67caccce22e0937
SHA1694731bb0dd666b3f9e1f35eb304acf111d81e16
SHA256513898525dc893966cd7353c4717dd54c72e73e2f683acb0e52c81cfab96d081
SHA51224d46bdc69e6a9d5e61612586647deaf50acf9331dcf4fa7d59bdd07adef6b7a0caa9af3f86e9a5aee06312be222a70296cd2c1723f835b0713060fc4cd1f11e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a