Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240508-en
General
-
Target
.html
-
Size
163B
-
MD5
f1fb042c62910c34be16ad91cbbd71fa
-
SHA1
5bc7aceba9a8704ef4b1d427d7d08b140afcd866
-
SHA256
9278d16ed2fdcd5dc651615b0b8adc6b55fb667a9d106a9891b861d4561d9a24
-
SHA512
d4b2f435a14e915ec8c36364ef6be6dd810883b5c9c8e337573a114d36257186fae92ead623ac5ef7812b0ff2cc4973842e994f2f7fcd510d3c5a9c5c33a369b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ba1680f6fc6f1743210a2f90ab8cc32c3523c397bacbc7d3aa7aa4eeaecb00a4000000000e8000000002000020000000927f24d79a263e781a62f5f21072d776c15f49157745ddeaa6342c7e72f44dd42000000056e6bfa4010a03c18c94141ad5ee2b4ae8495d41447ad53657a17dd74bf4179e40000000f6e3eacb57035b754b99430afe5dae93ba5f5e98ac1c43195af838a83be6e50bf6b7dc304c4ca04d92579015e0e3eb53037dcf953aea633c5fe9754e19c84d2c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421966839" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f067769806a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5B65DF1-12F9-11EF-878B-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1192 2020 iexplore.exe 28 PID 2020 wrote to memory of 1192 2020 iexplore.exe 28 PID 2020 wrote to memory of 1192 2020 iexplore.exe 28 PID 2020 wrote to memory of 1192 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c69afebe392f8ccf0c98f54018c2b0
SHA17adc683e1ee901cb84d23d49e21ae761acae6d98
SHA25600bc51a8a63a92571c87ba9d112eefee362df0dd4718f0c7139af2020cb4074d
SHA5120ec4a2d6e1533ec3a81196c5d093fe3353c4603d15fc59ff312a774e08aa5ef28c06bad508ebfcd0c72dac7d3b3cf56fa1e31f3128c74ff4c20deea3a8665554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3831ed17a6297b8f8df73519b6e08b1
SHA1c306a45de0aec44a947f3fc237c189773419ab8a
SHA2567dfd28d5f7ac5b3fa69c1d779c4af79276116dec2127679114a4c5e16bd12f16
SHA5127ce232ca9369f8a64f2e238717c6396db7d1d8cea8cb20d3ee5aa8cbd93fc9c32678f64a33f38e9906cf7f9960b5380afc840456506dc65761b8aabaf34d8cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576f020ed8938d4d33ebc0d636ae22f54
SHA1071ca5c01177173c7f61b1a8fc451f2632ec42a4
SHA2569b6f72708aeff160fb65d28680d02a9b24dc31fb748bb30bf4a0059e7ff546ad
SHA512169b87f7cb0a497a0c5f4eb333384612f12a4f30e140788e4c0930d91bcc2dda18f29336e9e11392455bdf1dc9eb52abc3eabebb15e176749ad40c5100a6ff6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a87ef51cbf02176c8166b82dca1670
SHA14285b93548e689c20a6f96c04b29a23234d96c86
SHA256a13856b2c559c4dd050dca4c61cceb8e163b6280d82faf27952c737e38a427e0
SHA51262f80d6bed9c6bf31c80e534a4cef5717608a18c934272fe5e4c7190d3cc1955d33213094d72367c8c304e04e486332ba656415b6646f01937bf5d8a4c67a53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f96f43f90c4b536b425c4e8a659e351
SHA1ef280cbe8f640d6c103e4c314859b5b5584e0b32
SHA2560186d2b1ea3bd2ca333d6f8ac48811f15b62cf0db3be2dcc1b5c25babdbfbf3b
SHA51286b3780772cb0e6873b35b3490fa0b2856f9751590860c543c9f574c1be487256051325eb399347c0e73d0f95eadb80532dc245dd9e9c45064a6595b01ac4d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aebcac57442229cd97b2c30295609af9
SHA1becee01c02110a5b3158ef45512c7031aae9e6e6
SHA256bee33cf342e9473c7965b9cb9af5e92e69ebd0cc7c38e6232edd2e5e62e9af0e
SHA512fb601c6c87c137d0eefbd546cd923b8a0ba6f4938b33f488e89fd2db317def3af923557467c74bf4fbe343b464ce0dac54f101a4f2fded8461834a904e1337d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5494de8ce40ab4edbc2953320f8fefe31
SHA1b7a80eb1d78c694198e30d4e9a6dc2561ba4442a
SHA256c1cb9b44df7b454858e9138b5b31d8d89d4edde38101e67fc1e19cf315a584ff
SHA51295478c132125cfd24d9597867346b1d569a0e653715f691fa201ab6927c696a9e18e411270d68ac4259c36d9ed25eb2b7e1938cdbdc4dee18e802bc73f797483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c876319b76434a2cad7bf01a5e79d88
SHA124f586d8fbe752bf5521a06a16e33145772277d9
SHA256c727e9fa13f34bb461f4c649b7a0a33170fa0200f0178c241f83ef8a26633b63
SHA512ef69b0f2bbfd84a9926097d84aa413275d96d220d2428f6d825bd4000ecd1227e30405fe611438f37143c89123d9c0a13a625d207e90ad882a8390b53bd48b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d763af6d4c1c0c44641b705a8efae899
SHA1226ca3787d9313978f6290ee141aa641af9a1777
SHA2565b47891e7e278eceb56aad030061e5ac0bfcc698468de133dcf9ef0273626944
SHA51231a3b978fa25bc6c8fea7c7c7ae5fcfdba516feb94626f1d0bc019c2573dbb26c6cec3eada3211256687cc245e28ede1788cd0f3974536a9cb6bbf80bf919682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c51f166bdc3abe008de0d51b60322957
SHA191de1fa1099a13c22e6625686451cac083f13648
SHA2560392e346301b0b14e2a388a702b304d50def683b6aa5ffdef4fdc8195ae4f129
SHA5120f1d5d2e52e7e34588cf36d17ac58b763b3d5df6d5eb7d926658b2eff6cc5bbd5a54315b748ee4b24d212ba98ea1a978cdbeaf3b1a5f8dbfc92ca895528a0d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d6100639cf3e52943b2c20b6a9af714
SHA18ae1135d1cd5f7b06405cbfaadab9a7e023d9c86
SHA2564c5eae83f2bfeea143ac466e74fe10879643b752cc7184fa544f2cf9a205a815
SHA5128c6f77b1b586e79f7d613dc7d59b5ba0b1b8e1b7aee79d1a8e4e932c8d66595fcff65c59902d257e90e6a146fd91cda6b0384993685819ac33d2988549c2748c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e49dfa60b01a4d948326f8609febf3d2
SHA147f88b7f748c4ba63424f214d7c23603f137779a
SHA256385a9ec75e7456b3a65f14d557efae816fa1897d46151228dda9e32c35f969b0
SHA512de110ce1150f6ddb0a61a712a89821a94c99bee80b391d1acf7c8fb8850ced038505cc06a2dae0f7945e9370a71bd14fd881a1c6da45de79ac13bb5e17f66812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd9f88763824efb97435bc8925668fd0
SHA1f9919299bf8a14b480f38b0a7d3a39ec0ccb0453
SHA2567d0710fb042be556f933e50b0f802465c7de9ec1a5d94c1d276d4e168427abf2
SHA512179646a636133139dabcb264574686e0bafe22b977e25e5c76d769d4d599dd10fb6aecfb57bf9f5f7d3ff3efb874ac3c1ba852a6429934dabb8a35035c91abc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539acdf3b02fe553ba402251940d28a50
SHA1521c3d310e0bdb2eb6d13a6b0f9d602db845b5e3
SHA256e667828ab5e3ce1074cb7af9204551834fd804d095b81f97197f3f71e03e5b7e
SHA51213d542262bbb5a51cf9de1d5c50217a8ba6f9de7c1773787fd11bc61b42c80d750c389bdbc65e9f1fed3233315a31c9fe2f4a4781c92dc1fbfca30e4cb3ea08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aac0159285c3c276ca1349d05114bbb
SHA17b13ac41e06ffc505765bd72d87524351983777c
SHA25650b417b2ba5cc049986dbb9fe6b4f7a518e919aba37d8cdde3da010f5cf77e43
SHA51297a17830d5755713f97c96ae12b3ed2cba9127085cdf35f7a27d6e5ba1e80d4a8890ccc33c68383a39ebe45ab04e52daa05b86c8eb90f718f741e90cda5606a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ebdd78aac6c0e0c71336eb19670a6ae
SHA1403d42757ba1fd00bedb7e71ab62a70162fa768b
SHA256d184c4e11da4035b1e0fe2398f5ebe9d78d5b0197e78a44b7fd865b0a50750f8
SHA5126c8ac1fb66a2b9ebf0144f1225da83846e624f5f3cb11360a6e39b17c1835634e0292534dedbc04d68a991a0f484224b93954c3d83f332f5e7cec10aaa8f94a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583c7baf5aa6782d53c6046756c1d0d4e
SHA15fe7233c62792a22074e0e28677711f60e842555
SHA256a2af0840d38e174c1bc9a0ce124feb5f79bb6ec6050b1efeaafaa7f73962f847
SHA51274d5e5392528456ccdbf04a277f5c93196f9fcfa62b447d752bdf1f01d0909a83237c80684b0093f422b57b27447cec1166936dfbeead33da11ad208613e3e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e81ef88297ed7ab59b1ceae2b16582fe
SHA15b55ceeeedd134e02584cff5648c83f8ecf35d18
SHA2561dc8236ecc790bd3a598c8bcce734f626f571a455d1376c4541c3007b2dc7d9f
SHA512c531c7cdc6be37efb9b9b32542a85ed677b76910c56344557146a6b516068cd5435b4a9f70eae7225ca620cd1270a12025a4a6426590c86a33f00891268e7e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be2d7e760f2ee957a653c9d04a6dd971
SHA14c039ba3128ff52fd0e5c746239eccf9c27b341b
SHA256949929c4200b4022d00535a21d2ffb76ed3619d2c3710693f7c34389d14b8863
SHA512227d0587647819c0e40d7f1a9fe6ce27ef25d5371c73381cfdda961252253bdf01b425050663aa8dfb53eb3beeae84bb7782b9c98fbb08561608388bc8026566
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a