Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
fb36fbb393b0397b384b86810c868013
-
SHA1
65d387930ce28f086a3f64a6a6abdab7cb9e08df
-
SHA256
072ac5ac8c16eb13c34c9ddcd945fac92441e66cd3c7cf1ae0f5c540e3f367f7
-
SHA512
6eb88a454ddd4985f2e3df06e05dedd15aa897d135888e1774de5974f461058dcc263cb15cec4be402e43b60b64436ac24a38bc203c988f2646e70e229fdabaa
-
SSDEEP
3072:StuA2dYfuwpjjyfkMY+BES09JXAnyrZalI+YQ:StjfGsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422089470" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B79D891-1417-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 1684 328 iexplore.exe 28 PID 328 wrote to memory of 1684 328 iexplore.exe 28 PID 328 wrote to memory of 1684 328 iexplore.exe 28 PID 328 wrote to memory of 1684 328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524617ce71adc2d60db7d82c3aa4f168a
SHA1b5075bba0ed6290b1f5f40275cbd5f79dfdaa16f
SHA256410241e2497b6cfdc769912219f1b1f0e3201a05fa6d04132fac968598de6d14
SHA512adda95e63b918cbf89674711b87014878097cc9ae9f8089523f6580d38282559b97724a88caef00048f26bc864c4fa0f7bd1134aefeb08b4adfd67e05a9b6348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5975d9b4ecc049a91453d4546b7a6d393
SHA18074fa4d53fb2972d6de78ce0bc7a51fed77f770
SHA256b57f97d3c99fae429d2dd26133a6fbf64177b50a90dd1f37c9712296ac857906
SHA512b4176f9cc264a48960ae2d5448180d9371b950a824fd2222e8d2f5920d15c53555bb7eda0f96e76063a89cb97f4460320ef292193e3d5c4b12cb71314ede9404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e86cd1b6d5de02b16c2cf0e2348f775
SHA17ada2f4121c1cde48ec6471bd5f00cd24f1e5848
SHA256111c3665bc86945076ea00717ff3cc2ab04e2a2fd804e77c8a531607eb84bc1a
SHA51246588a58501103ae2251211ce7aef525ef4ce7675c87ab363cb3e3802087a20742d9563c417f57f8987879c92e3fece6463b8f86cd1eb57cb05d06a70c1a4c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e13937939e63f80fbf4909fe15d6de07
SHA1f5bacc772ee68af9d2feca3944b9f1aca504612b
SHA256cd21a6b33e0419537cfb56c561862d0913316545eaa6618c0aa2018770f90ae6
SHA512c5190288055a4f682d1bb49e9b8487696134c5733251082fa4098f1755ebf83aab1266f7bc2090130b8e29d5c136de7b2cc432394d95710d97e4ebc9a6957491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5151f86fbd6050f9bd4ae2006d85be7f6
SHA1bf6cd4cc4ec6ab593bc3114d4c289eca4b298200
SHA25639e093d0018d1e2ae6234554a331b49d7f972e12644c81f298d7073e87a148f3
SHA512c8d5a25a29ec73bad4552fea4217655884a9efc1db5cedb2457a798da200be1f0518c92a6f9fc3d85ce3f537f06ce6545429db905ff46be1ff04a0cb9425ab13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5371e6d3e52ad620c1fbc743b93a4a309
SHA124854f12c2a5c86687d53c7258742c4b87a5381d
SHA256d5a0f856f2465127816bd06b5a86a097fa00824c584850e3173c2e1879d1a632
SHA51286ef822ec53b685e75c24cc445900501f1f33a5d4657a4643f89bca1fa707a9f26bc3fdde39f3dca37ffb745709639eb7f427863828582e061de223258006235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a771e2cdd1055bd3209496748abeef9
SHA11edb5ed2b3b03ed89fee36945d86d382c35321f4
SHA25622690fb4e109c03c416d1c8a57f2e75b96afee1fb3d3934dd3a49679f403b571
SHA512eeb6bbab41b20bcb3e734b1b8548e9fb621d9309edc017416e2f20c1c1a421e601b18cacdf49b265b1b26c153971f51e2d156e2bc0c565f01ac2b7c41a5ade59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caca0639fdf11ec14bd4888238323eff
SHA19f7ea51e0ff2610087db8cbed409790fd42ce1b6
SHA256b74c6ba43cdbb8bd03e1a4eb6e45646bd18bef181ec6a46416f479726f54cafd
SHA512ee576da78e54ff6564e8428ccc9675ae14587c453ebca4eed5c0348ea415c78aa89fc5bee904e6ba60ed8875f9aa25c82a362c2ac9dd051c2f6e51e67b6b6350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512785d4faf28b4906c04c3dec36c1fab
SHA1bf93c8e185eed4c5f01d367966ce3d8ddff78dfe
SHA256e9719947df77a0750c6519533023414f353a338328c984ce1e1f4dae39531ce1
SHA5120867e03084065be31ddf6a848264da3e67f95cffa747528f5065ede4f51146510d2980017c0f888a21174e514d9a39da2f2df4ca86dda98c6e39a520b565e991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a966bafe8bf1994bea076c0e328c5b01
SHA18bd6926f332b999bcb6cd698da6db0d0d5d1e759
SHA256c499eb876f54c05bc5479e1decf7e54fd2751fcbf40ed2316c0927b6cdcbfe90
SHA512dcf8f1a7a4f548ebbf2303468487c08c7d429dddcf36425a56c9488ed2f5e677e485ca3ab4811e961afdd2a6a366ee2b7f0dad48a963bc70dc52a162eb311b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b23a698ac3e5a31f2adb0fa676421ea
SHA1525e3c724bbaf4cd135f6297a8f28d92f9f11cb8
SHA25645e0f27d17434c1d42d76b5e156f58be7a2cb031b7fc986225261cc5a7ae0813
SHA512c648617ad80d380e8af2ca6650b7ad76c2ccbf496350da051527b6f9da00f611bfc3a87c4a3c1cef5050ff33049228199995278ebf278615055c7165f89cd9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc499e4cb503e04e28e3aa9bedb991a1
SHA1c7a99e6147a120350cec29a05e19ba28c2c57725
SHA256fe6f2b90424909df4e0628977f8194dbd4b9012129872c20504b91447d7dd937
SHA51267559456c13c88a0deae736c79865553eb097ee60fe78eaa7d74c5d9e2f988f91f1e434e54b0f74e274231135928ce2de0c0b0e0b34aa9312c1390fee2f26df3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a