Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
xxhash.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
xxhash.html
Resource
win10v2004-20240426-en
General
-
Target
xxhash.html
-
Size
286B
-
MD5
bd355771e5ba1f0ec2fd710faaea7fdc
-
SHA1
e524e80774c18be10e5faba1794e0c92fa774a21
-
SHA256
c1c9af4a1f78ed3e8aff81344acd183b96cc3f5e6803c7ada8e1893974996c39
-
SHA512
a1842a8f0c3c44924d18ec26c02216ef64be2926890975b36be557a8019cbbaa313864beca56019fa63a29424d6e4f1e234378e053a0e8660bd6c1cbebc100cd
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ccd40b44acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000a8ca23864a64b4caf4068ee961eb4dc00000000020000000000106600000001000020000000d098f4c455460eda54452db792dc7823c3f2b0a3f175f74955f88bfc95e7f3f0000000000e800000000200002000000095af51b76bb4efae595d6abd7c2f6e8a86376313c97d42a47a70ac3eb6d3aaec20000000d7d27a31fa8af7d974472731cb8c98d9bfbde2aa0a3eccaec860011376357f2c400000003396a88bda9e2d760bffd7003a49283e4fc89ce0b7936f30dee1894a1d4c8e0672c7e0780018a7fec55770b5766e8e5afbb1974be272af2076a23b13da8a3774 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422542958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{375F96B1-1837-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2508 2188 iexplore.exe 28 PID 2188 wrote to memory of 2508 2188 iexplore.exe 28 PID 2188 wrote to memory of 2508 2188 iexplore.exe 28 PID 2188 wrote to memory of 2508 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\xxhash.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5602fbcdafa0f4505a8ffe820b8ec5847
SHA17ef24d0cd1f245a24d630e08c5dab40d1eea83b5
SHA25662f00606740121792773ebfd6d7abe0c9f36c3f796d4910c181c0a877dff3904
SHA5124c36d52a0737781e6ca760edcd2d2bd0b7f8d1049616d8b25617736dcffa3accad226ab2244ca552512cc1e787102538aa1cc9c600591b7bcc9483b6ced7d686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d3b25b5b82e1fa13de7e1c4227c9b0b
SHA10c12d4daf83c53fdd249a359139c98c024d29af3
SHA256a683c92f0a6f7be4b89100a17334c3f73178f7d5eb53173f5102f5287f81c12b
SHA5124ddacb760dfc7dcd6867bb8ccbf77813ebea1d298ab823b8cb1665dfa7eeea4dcfe7dda0187d76c35a65638ec390f325aefec86abf78f622c2e4ac01bf2203d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cfc1dbf66a9120da39c73f512dbab00
SHA1fd8fe122e0f71c37eb95834ff5c33198919a7b9d
SHA2561f3bd21463d6cf2feb004f354dc2cf11d5a3d21a8cde9f727c84cac36dc24534
SHA51213f81c0a4ebbb6657952df40ce25ee9794086fbf7c5e21c2a4f032f40511ef2562983cea367012831b5133a2cc15c1257c97d1dd9d74dc0080c372dc142a199d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50612dc12e09fbc1061cd9974fd919053
SHA18eddd400c139e0cf630760fa26c9264694afc912
SHA256207e6458d4f9688825924d314ebb78d07468b168c8418ee4bb1d24defd624352
SHA512fa73f52f6966c19d9fb864e522e65cfb368da1aabc2e9e31946dcd4b2dce9fcf3661925108d569114d1e8230ef92d4d9bc7ba194a6f9717bea21e23235e60755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f9077a1ec211c7e425cf06409f4aa3d
SHA18f62bfac6649379d3a4f8d32263d90df8b8fc7b4
SHA25641fd7e1f97cd2fc9ebfd965c1450bf60246e49e5b72b6b41f4bf5db5277320dc
SHA5121a4063221bf4f2200b2214dce0bcb481819d6a13a1080db133e87ef76f5caeb48badf098d0309f57eb58a01b91ab87d2029dd244876f384ccdd6db9b7656c820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5143e5c5f1e4a91674279f45dc5ce55e1
SHA1e1ecd4868cecb89d78f02ceac2c877aaeffcab47
SHA256640732f969f4519b9053de96080330876389619a4b320e742986eaf119513ec0
SHA5121cb8c63ec15b3de91e2d8a7152adc6dee66ba5738e16d182f2b9c69c67ec51a67ff082844e47720918d58e6817879ba96ad8666e412c87116eb837e536347334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc43fc3f0c01c8944ea8476552c5472
SHA1fb06f4133969f66436c2d2ada078048c5204c2fe
SHA25615b4c1e87834b57341111e904502d08f64382041f88e43a5be1bde6f3fb721e1
SHA5129a8c4effcaa6694006e08c66c79f10378fda09c2934902f3d90698cd61ff092e37328b37e3b96c47b7ae4f3ac539e9f5abfebfba9a4380948bce0b352d53b161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6b52f16c189bfce65237fcd6527634b
SHA17eee8dfd9e66afbc3cc752320d59b7995b836081
SHA2564b3f75237e0eef8cb78be5d62c2e41a530a9489cd1a6572adf7abb3937808751
SHA51264df631973c78e596d135bc4a73c2f41fef6bf3e65c4153e7def53c1dd2df05cb332c3618c997d65388472dd133c3de87dbbba03cf2d6b2710a533fe6f06bd61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a1e16da27f77699fcda45a779cee92
SHA1e0dff1876db35b985fe78b7251b419ab6d70d926
SHA256145bb157852c49b8754c8bfca5b7c5a22d9baab09441f25d9d3604b1173a3f39
SHA512ae12364556253daaefcd83c8543dfa5f1fb7b7abab8afb1c544e74d50859fb5ffea6becca3c1a32cb6795af8df1c59650658c5f6bc95df8bd2ac606738a0409a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5522f52a820cc84fb561bce10e702bc42
SHA1f6aff6589ec2a34be41b5cf4c2fd4e6d5ae9a199
SHA256c902ca7fdd44707161049aad7ef7acf83104bf7d60b051dc15f1a11e92af7112
SHA5125c8a0fd9d810ec980efc6147f46e04abbf9f9f248b28bff25088504cfec72b1c75f7c4f4e20b5ae44b0e77525c51cc732ca5982984235f0a38fd3922d5bd7d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d03934309f722ac8c9c04debdcaf8237
SHA19427149a06b5931166c85caee882b7894c9fb695
SHA256585f5148ced51480b5f2e659155b70968826c3a0b31e9e46722cd069e15308f9
SHA512655a9e99500cbbec505e267fc93308aacbc43e0f9dcc64e044d994b6b5f8dda92040eb3d2dc3d30680232b5acba6a721b19f44c7d9c10111dd82fbdcdcf4e452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536e0526070342a545cab916aaa7616b6
SHA1ea8c79b7da5577f77c4f3071a640768e80082210
SHA2568050ce2b992778e999fa872590fea7c117ba1422e10cc63a09200581bdb3047f
SHA5125e6e6d62b1b45e636baaec377f462653deb69ed9f795136f454cce6edc5de11a5e2e9b3654ddcb7c20c9ce0966a8d86372e4e24180849063c2c5e89af4220a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da520c0fe73ca3cb74731f79d829d518
SHA15d4a6697838861e5e1adb7df7445ac197f29a675
SHA2563ea2b1898df6eeff77a304eea21a425a7ef17b0d600922611dce7b2f4dca1092
SHA51215863b5d63f4d18cc163cd17fb615be544e5add56cd2fd2b39c553658a6faacbd9f84ecbd07002eea68643e64ed1027579cfb7abbaa7973ea6ebc3cd3319468f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e72456ce75604bb918bbdcb1c597411e
SHA1847c174f2b1b728711abcfbf902bce8a13162730
SHA256edaf49cb67290d212da4ea0883964f1f1c42c89add856ca07f9e84aaee0b8d3c
SHA512277181a1fd35ecb232f2c2be7d0581d4b9f8b3bd0a01fa56f8e70bd06918a312359c573c98d5e8ad84dec96079e11241aea1773e1dc7f9ecf35a48afc838e04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564a03e0ed404b9cf7de456174ce1a2db
SHA18e0848cc49bf10f1f67573faece5800e6bf405d2
SHA2566864eabf61005f85ba5068d514dc9ab82b67c58fdacc0e40dcc897fbeac974bd
SHA512a8513683042495805ab8b62e51e88e52568c72a76643ecb47c7e3cf65b892c87b4af2626dd36893bd2c156fca0b746ac59bfbd93f82470982970c4806e125e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a63e1e253b403217c0f0de14c7b46f3f
SHA1e7d7c4b832b00e18c160543e5ea9a5f4fac62e52
SHA2563c227907f551cd7c84956d81f4a75455fe6ff5cb365fefe877863fc6dfe45fe3
SHA512765bb6b5333c922b81dce264bd085370d269229065c585da10f4fd0c83c909da812227b80fda3af437528ebc402b6eb799aa1de46e19c56d6046f666636d3995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a41376b6395b8bb8b3ef02c37d2fd790
SHA11bfac22587d8b5a9e4fbebcdee6dd32b94212712
SHA256f3e07ca5f915f2748375ef7ed4c28b8b033180f3093417cafda5bb488662d737
SHA5126a9b5727739329923a4358446688a1b53f092723742ae5ee317b1e387d440d641cf6288687ffa0ac096d682bff2b14a5acad592aacde2ff0523fb8accdf74e0b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a