Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
ATT00002.htm
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ATT00002.htm
Resource
win10v2004-20240508-en
General
-
Target
ATT00002.htm
-
Size
1KB
-
MD5
c6ffd5e30c210beed8e465f7865dc030
-
SHA1
7653fd173c02d87ac725383258a893b286317e0c
-
SHA256
21b81ada0e45deae7c822592d9a228bc8adc93c2c7c908595b837632c2c7a0fe
-
SHA512
b2350ca4fc3d807b56e45325f750e3bdf57de7dcfd3df78e6257d59faa0c849f82c18ab58e40c1dc9b5134318bbd704cdfd398cd9939857195545d713ad8543b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d3c2b96ecdc4e33b6f53d886a5b8618bc0db788a5ceed0543424b3851833e924000000000e800000000200002000000036de52f4b74a7a3670bd315c60f465f1da9aba93df68b4fadf32c943cb9deab42000000057389a68ff2359091c396645caebb7c08b6f64a1d2859e7b7ff42785dc8eba4d400000007f48b0944259618a2600c0483a99d54fbb0013a6249f61cc85aac8507b46a93b0a299f8e2d6e6d102ca3d0d7169a0b1f72b129e8306edd6a35d61433944d741e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4AEA2B61-161A-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ba691f27aada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422310633" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28 PID 3016 wrote to memory of 2700 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ATT00002.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50da80a2ff0f5ac3828ef04a856d5ef16
SHA1fedf64b1242af7882f9edb29862860b9f084c636
SHA2565ce74267d29f9fe39c7cbfcf14c361847828f950bc34ce625031f9e52ce693c8
SHA5129c7441f70c05911abcddaf073d7290866dfffbeea66725ce245b97576e8bca92ff7534a8de5dd2e4e73a6762a0f6ca79768ff63b47b0f0504c7a5fa10c4e6158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5182c6500bc22c7f28fab04e0478bed00
SHA1cc8f9a50db03a88ae68236bbbbc38a6b10f1573b
SHA256bbd8cd1a063b55081f8cf007c2437b889df2cdcc956a056feee8e2c502166c63
SHA51231348f7a41af3f5c25ab875100351462b45a16d6db1e5ceb82b373ebf7072c27314a649c5db360d0cfd600c03e360c71bfa76c80619111638566729cb78e651c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c15bbf287a7b708c11cb490dabaea445
SHA1a94ddd99039b71d407ced1817c1a1c67f60232ff
SHA256f3ee62b71334df83f330d3a4758bda84364cba41cc49229ee44bf2e699f70d33
SHA51279c38bdba1b9c87dd691a0ce110d33bdd8b52f68da3ceac4202df58e790fc6ab861e32a8de840232f510ce7610482edcdf02eecb9f6f6fa56568d7b99375b9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59374a01b1a0e74dec35788623f402fa3
SHA11f390b0aa178b9a7277f898066ad2b8cddfb21fe
SHA2569929eed37d5fca3534b9ca01db05992c6eb79f4a36419d8e9ad395e950aa4362
SHA512f9e2b11082967b2bc5f3dc2afdf2c6ff4adf269268bc4508c6ec511a1a0bc286dd296a2ada1da5a40052959db9777d735e5fa30ea12c5f394ab51f2222ea23c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5683749ec48476d0bd843fb2bc0123d63
SHA15e0d0f2a77d05e8742cc1819a5df8032178994ad
SHA2563ccd905762e084dc248efc81580eacfd1eabe3602ecf1ae1a0555519ba9cdfbb
SHA512bf90da52bb3efe34cc5e60a9d5374946afe6791cd0f03045f925f7f46981593641d346a4c8b12dbacd05a8f05a2134f94c29ddf1e7205c284879687d0ca2c642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ed37cd7163653b1c97cc1d5a2663e8c
SHA1893ae037df159fb84db6b37307563d9304f85c72
SHA256b4d4fbf3eab35c404f9bca1cf6d459a50a47d8f8723be1fe50f04e8b175d32b0
SHA512d53d8e54a129b91bae131b06fbb95d253fdc9723736610afe103f59ea653de73293727f6c2868f18b987e859ad11ac3349800c626b69513c90a2c001c94d20ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5380bd00049c1910a931622d4b0bab070
SHA1d012e55664a57f454f62cc366f4bb0b2d2b51f8e
SHA2565864fa767d512bf0fe4510e465d0715082dc204228d40f6d92ca3e51ec374950
SHA5127ef57154a01b305d57c2ba51eb7be08da27a2a7d69f0fe78aa3f28508ebdfd43e5f63ca0217af7b43c065b333336de05574b179f26ade7f53a24e2fc5130f274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e0421c09c5380cf330e48b49dfe4534
SHA1f82a7009c25853bcbb2a3b296ad91d5680107afe
SHA256c94640f4fc74341c9e732cbecd38ff31c4a991f4092120a23b757b416b25f35e
SHA512c5e47000cc86f21c6747ca8ae30f902e246d7b3d02e8ba3bb483af81e624a659aa2c1fbfead5ed64f05956b042083d1b52e4f6f58259641c67cedd34a28deaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8fdd10e9b98c22594171c6fb71c552
SHA1934a03c5341a87bf03dd552a7fd070ea847e3b04
SHA2560d385f7fbfc4dcff71fe930a4757ba3133f2584a75a4ff30690eaf27746efcf5
SHA51214ff6225c290a49f234ca899a17509be4ac07d744b8f774c73ca0687d8117eab02322fd8d2ce2b655a7c1141e388a181a1d542cb8f6b563d3b5d0a34f1043b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545dcbada32c0541cb69e9773780e527d
SHA19b53a4f66c0c1c5a3b2741ce5c7f2d3d5e19a0e6
SHA25623f5907a69fe64024a76205e198460d71a859d675883de85f199edd316fa1be1
SHA512fc4f8f1ef656281a2908aebc387e8b26e2fff39334a9401b551c70178185428944a9f0e573bf04cfc7d11bb66d0de4fd34a80bdd4f99dfa5e10b1f863719e8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54160e4497e4afddaa6e6c9f6b55a31e6
SHA1fac9af5ddbd29c98bfa3300ec8e558e6e2b4ea51
SHA256b673f316359c74b1bb544b6d56688e75a3fadf99f4cccb67a06c88e13e13ae1d
SHA51217eb67eeec2f545552a50a17d3e90abab278736189f7b5834f5526ce248683b9309fa6c0db2124583827e89d262988e4b5ba08d9aadd81edb794b7f271dfebbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545fd8899b9cbf19c190e47ac1139e73c
SHA17f65b0bc753e56c10e90be63999283af9db02e83
SHA256821e4c730f0775569464eb5b176ee00cac804dc8b9cb521ce0ce84352fb749aa
SHA5120adaa873c077c7a29fdc4365b0c07088f00a6027602753246ba6e0633ae0929a50b4e7141609bcb86565cca31dd1fb3d4443021b683281f78f1ac585478bdd7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b41883499e6d82990e263467307ecbb
SHA1c07a46bbff9502173432056e6fb633fb9162fe21
SHA256ba9e9667f2d64f59919c47a557b8506712da396bcf652017afc29b84dce0cfa2
SHA5121e71fb35129abd2a5490b7429067cf41e71f71ca41319d56b778053de3e8dac39899e355e03f1277ec0cb008b34b34188bec65f38454f32b1e806a3eed9e72af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab508239437206d6f0d708f245b118c8
SHA1cbe6abf18113b9fb73a6ce25d79de71bc3284383
SHA256f965382e2b8ca86d71bef16b33545c9458aaebfac633160c3507d2035e3d9773
SHA512ba1699924d3ab09fb4a06d5d8ac327dffa0219b76013f21b63a276b06678055a72d73926fbfc1c0c20b8f1a8fee79877f7eca89931b44a0f1d2023f450eba569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d134dd9bd4f384a36b60184ad89a6c
SHA1536d9bc1dcf10b804f3f9503d985c285cb18b6fc
SHA256ffd455f3c4bfd3ad2364a8ae8394d4373d46a6e74d6ece0e1e72d322f2755206
SHA512f2aa681871a7fe9898ff149929d8e78f7f61ad0743db38adff0049ffa5c886a7293f4fa0303bf235631b26a76ed5dc0dbafaaad148bfc46707284e6e29f5b121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5c8785ccaf8570af03b2b25a28504bb
SHA10dfb161abff4d58be51db969ff4472be0b1b92ce
SHA2566a39041b43c2b7f58e064b742b7ca4b8033d74278554d72f617152c1a65549ad
SHA512a80b6915f515d419b0f4f2318b939cb40fee990f7e264fe06f63046cbf5e1c9c285935b747ddcf79b4b64340bdd122897f4225ece33621df3603fe3acbdc9a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dc3521101a8762d34ab5f28354daf7c
SHA146ee27500f2bf4de1e3229f51a9ddeae80115218
SHA256d5a9ac008a80bae948eb67eec06ec2b642b6676bad494e6ca65ea5ff78468834
SHA51278552afee025cbacc271a1b2bb343eb544d9d47f1d1570cb290b8ae171d78a488c8314245552a94ec54511749e1dc7e8fc0e1679759158797abb25e492ee8df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022d7088cbf1f491aaf4a400f67e30e7
SHA1fea628e0991b02457ad2d873f0c93d66f5fc453b
SHA2569148a458289dce6f46876621d3e2c18d1d4d2fc725045a34ab572ca966aa5e62
SHA51224d35cebe6d94d3d8b37ce28b5017755a1d91e855d016425ffc8e4fce530ff22e78ad519bca6ba9f8598225c406ed46eea908c60276b40b3cb1203a1f4814218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596dff2af20b1566da906e31c9359828c
SHA1fe5bfa5b158d20d98a7e15e40b18d96f0eb885e4
SHA256288ebe98c1930e17674ec667b5964863d816ac302707a915a526d829da24efa0
SHA512c4f0e338110412cffc26ecb26e33a35da852e3f2a8e9a37da75606d65a7f14277e8a72f201e3b1fef1a7ef6ccc60574dff3e90d5472967b02016860d742bbaa5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a