Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
heifconvertor.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
heifconvertor.html
Resource
win10v2004-20240508-en
General
-
Target
heifconvertor.html
-
Size
1KB
-
MD5
714ba7f6dea232918e5245bcd3c7d273
-
SHA1
a27ef7e9d457b630b312889550a7d2de3b696b77
-
SHA256
a9f8237dac5a0351cc08961ba4b3f1a327576700ff84cebd7a8b70436d7e0e7b
-
SHA512
00b874bf35352b79ee554e566d7d383342eec7773840db77389019272d9c47066496caa09b7c209dfa5f3dc4296551d2b0c380297f7e49fa8096b6c5c65d7627
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002ae0e5910526904794c03cf0f7175d9900000000020000000000106600000001000020000000486fc38e63e554142d15dde64b26058a87e4cf40c53ee3e0d87926b203712ffe000000000e8000000002000020000000b41da4e21c453e4cd357099e6f3ba5f3b007d5820e14891fd5470c9782064160200000002ff1a36cad1e47546f6efaa32f71b787d175904fbc46a18da23864e6e17ab57040000000b0bd9eb3db4ab2d6fac0dba09bf415f3a7dc2ce906863ceef9eb38dc84650316282321ae8328a69c5be34f725986c0d2779c774526bc482099577be30e843e33 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422541319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f8623a40acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6544D031-1833-11EF-9960-CAFA5A0A62FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2828 2172 iexplore.exe 28 PID 2172 wrote to memory of 2828 2172 iexplore.exe 28 PID 2172 wrote to memory of 2828 2172 iexplore.exe 28 PID 2172 wrote to memory of 2828 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\heifconvertor.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd333fd9d6ea92c6e098edecc1b542ea
SHA15cea58adb21f31b6414b719c54cf1e15e680589d
SHA2565ddbbd9509db6e3958546de1967bb9aeb041097db7e671bd13ce47480f4ad5a9
SHA5128b46a609e8762d75adf43ab76df06cf6a0909210d5a81c3c5eb4ef0b87afe36256ad99093180519d21f8eeb15d7eff0d1d883150f5ca878c703b92b26d8b6393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591c8e313739bfb0606eab6c8cb9e5cf1
SHA17a6c3d5c249cd9e2df5857e758660624bab97235
SHA25619abbd49298a545e8f6b5ece03327ab5c5d66d76561175245fd3a5899f654b5f
SHA512885163f182da015d835d625693952ff6157b4b51528666c6dcc5228f943bbf1cdf84a1ea83d0c2bcd58b7191abdd31b422247887ebeb82d8e5fa5346cb4e7206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507b38075cd8205a83fb0a77739e8bc4a
SHA11aef42abe4bc5115a3d477446ffcab697f824d2f
SHA2566aa277647c826f7c504ea68e161f5e88f40167867b7cae674abda837713732cc
SHA5129d29ffe49bf8839a4d1fb4ac68f9d439b70dc9d930c011a59cde1168b94d84285f9524970ed3d074a777efe6290125dd877497fdfe46387d754f67b9b76e3b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b98e29e588576600774ddeb0b54d7845
SHA101f5b7974d01a41de18b948a13aa5f73d16a0f18
SHA25674d732de3b95444baee096ddad4923e8b6fbd617e0d322e10990b0c7b2cda3b4
SHA5121d9884f8a5e0b1cd1e5feb09e389ade618bd7e651037fa29765def8235cd2ef8bc1b1e298e722fda892c44aaa13969436e7906eee3ed4fee6c6751c0fe540697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bc862990bc09bfae2fa4062927c8db9
SHA101893805748cb4b598f660e6fb9bfbd796361726
SHA256f059bbb008979a25cd541388b1b7374b506b35b29a27272bd3dd02cd9b0a7a79
SHA5121a2f8b4f1839379ff3d26450c7aeccefd29a1de5f7782eb438c569be576ed99cdf274a33b9bcae1954fbf8061215a048ee1bfb9d9c0759a9d18ec3481df8666e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb93db6e3bb6144bf67fa7cf65b353d8
SHA19144838657b1acb967808cdfe33951fcf0cc63c8
SHA256c3ce6ca27b431d09a0d9961c40a184b33e87379c776d64df6b401c73710d6735
SHA512e14c5b6e489bcc14711d57c57c86778cde1b67bc266c800405bd6308283f8d89859e497d03cd86b340fd7be8004d77e0096822f8f41981c0aa624c128d3e8846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54373e82d258f81460b061f4d045775cc
SHA19be7986e8288bc40ea7c468347985a47db18ba0e
SHA2560f48830bd50706471eb82561c8367aa93f2fb9e08274a118822fc66a910aa0b9
SHA51205c6849f886470758e22a8eb2aabede4d6166e1ce1907459b4be1d9c918e98fefe1ed576c6f9bf0a0f663a55070109c3fe0b0a992c5add94e90d07aa765be728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0989cc8512b4b794ec09d1d7bcdf0d
SHA12a7e357e618d3eb9cdd9b1eb3b8608cd1512b15c
SHA2569d6f286f27774f91296c72dd08c71f9b30c78bbe3d93f934c164a49c7ca0ec7c
SHA5122bb39e865ed2b0f25740ce4ae2886b7b6356cfb5bd40b836a9092a0bf234f7851ff884403771670a65367fb27ccd5646c50d7b032f0e664821ba4e3987241b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c8577a0b19bf4560f1f68e5ff9f3fea
SHA14224c45025d360e0e4109753c850c6b94efdd531
SHA256379c985408815ed35b443e3175ff9c92cf5becedb25e905249270dc17114e3c0
SHA5124638b163b424f10cfeb1549c7b2b57bd1c81c130575933ef1126c54e2f6447e2f335db2de159c2eb7b774b1d791db1b0af3d7e685615f344883eaa7daef71258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5444fa51b580335c6481fe9feeeb95f2b
SHA1f6503eeee6a80277785842c12ae3b96a26175cfe
SHA256dc9aa226c55c3a39145ce7a029bbe46fdf09699a6eb4f6e2e3f4e8f975446d81
SHA512d3f9ac49d29a0be1398b413c2fb429180e18578df1d1b98fe09fdfb788a214bd48d4f26624c2d63fccf0bd965b7d170e7ed43c6d9c80a3b7a79ae19095b625a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebd0dff2ea8ee3f3894085ff7d9f3681
SHA11ba815f12c42820edb1a1a1383e00c79abe24dda
SHA2568fbcbcbabfd1dffb02c25ee5e87189b8d431a67de73e1d7624ff5dc72ae6bc38
SHA512d65435502900771f29871c798241dde7f7c3825f5cd30f1713c5596ce2e8937de73a51a21bdf94cb1100ed9fe75cf4f1e446793095ddc120064a9b721b56ffe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad7fff896fd743f51335a49cfa2699e0
SHA19f6b6bab53b9b1e52c177f02a4d399bc403d8f0d
SHA256d36ef4c8d8077204d0ffc0d06b87eda361279eaff82908abcf6f74634ecb6b27
SHA512a45db91a99d266f6bc68bc0b2e02127b3a0c34cfd8d640c34d404c82728bfaebc1ed89eda23e713b4aa8ba784fe5cfa4e61558684033b2533a59ad5499d93828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e26aa7e15a736bc0973406bc29d713e1
SHA1347e7108496cf54e85d5585d32809a782b14d503
SHA25667fa50d6c2bc760814305dd2798373b018954caf723dcddde76ba6ea589ac077
SHA512e2a3b89414076f4a79550883506467035a5bd531817387a5689911cf378d7a2822a35ad8a01218e468aee0b4501ebd92bc343404cfab0bc955e8035434067445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662b7f2f4734e6c3dcb9e7e3ec49cc90
SHA13cd192fe3c4121ff1d87b2e378f91a83e889c17b
SHA256c2ce11195badaaa56062975cb29a6063c3e93f8e7d9061753e84a55b2fa7b50f
SHA51280bf6d0e7de4b17a62450341e7f276433a141c1303fa24d4efa8d78afa6b6796c5c088ff83ffb6a018136b5eba9281e1b2a8d2b21cc0539fa99fadd34f595628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe761f9eefe206138d38e056cf27fe38
SHA15edef7ca9c9fe6b15d8a8e4c00441882aab9c18a
SHA25637b525fa4016b5a736fdf0349db133a2b3b6774435e20d5f609579f2afdb63cf
SHA512e9beefa749dd8ac2a18d66277f8f53eae6327125550be7d9391ce996d7596de596c7c65a91815c933552049a50c6b59bf59b6b7938ab545327a935c2a43bb916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9d49c716a9bcab45c679bb76a319ad8
SHA1da84be383fa0e86d40532355c3993199e780ac19
SHA256bad4770761f97a790e98106887ec04a2cee49dbb6ead36f4901d4597fbbe4c70
SHA5122ff235b6ec078280d70cebd7ee569c12fd3eca68c72cc4e3bdf7f189c8c680f0c2749b0a44e577da471f7425f0d8bf55ec3ed920f015b20173ad0693270909af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3882f8bba86d29ce3a09d49f92e1767
SHA1e25f6dcd84a3c7e2f71d812ab62be1d4fcf90067
SHA2568a810438efa33e867ab60a0e46a1b42ad843eeab6f63406286252ebbc1ef4c4b
SHA5125edaa0650804b034bc926be17453485d00ecb1ec7ddd376587dbe441aa85ae207d78619bbc7965af548311b3fb6ef7236ec25b363e5372cd9c902fa8dafeae83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579883467a59f6aa5ceb0565db0fde903
SHA15f3feb0b1a20fdf60ab0a4c1c21913132e7f321a
SHA256c3956b1edff3c6454248a0ce57becc0107d8ef31734c51c9992d49421a07d77b
SHA5122784d73a973ad9acb193b5ddae8a46e7459b02d9af2e8caff9b140a2247f2ccad31226275cdc4ba6df658d05026c8d0716808fd9a3456979c730a83fd67b0121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cca32078385a53333f4149d7f9682d4b
SHA140fc2870f88ffe66ca3bf0e2b04dbd39bd9445b4
SHA256dea3f095192eba54f908339b1693a1a3dba98e7ab046d689623fcc79b569bdb8
SHA5123245e47eba0562a5fb0ba6252be9d7bed08cf76c7df2c0ef6226fc50eec376a335b8a727cc933621fc73e18bd721fff10db023a2ebce0d2cfb679cb60e79692a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a