Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
CurrentAccountSvc.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
CurrentAccountSvc.html
Resource
win10v2004-20240426-en
General
-
Target
CurrentAccountSvc.html
-
Size
4KB
-
MD5
06affad6813ae2b0158a9516eb0da01a
-
SHA1
aeaa5cd1741f510dd1d50e5139b7d5c30793ab73
-
SHA256
964b30047ddd727984321ab8700f8f4b9dc3677058a22ec7ceb200b81212ed0d
-
SHA512
277515f5dac60a43c30bed4d2adf8fe6c7ffd90757543a8f0660bd9d3354cf361f8e820069c2ffc7c4f1e447c4a8b5bba80d5d4d4e5a5e02fb4329ac18111125
-
SSDEEP
96:oSTJBHBJDJgJLJpcJhCJz+aCJzkvJd1JzUJcJzLJgLRdlj4Rr7BrloCFREyRUswr:oSFNVM9OAOUdDs4JARdlc3rlpnRC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000066f3ad55c9a8b0b0a81c8eedba4369edd6609dc59b2c394b04255c8ff95c80ab000000000e80000000020000200000006a1c4cb31acafed6aa53c02bdbe5d64e319dc181e46200b9476446654623ba1b20000000afa04722e5e49316458f2ce0756c7021cf00d6ef959f67fdb2eee94903866caf400000003a069cf43132f6a3fe44f6b7bb8a26df7b15d333e0ed98e50c73f29266eea32eff2361b970ab18546a86bf5c152d99f5d14abe8515c44c6f0bedbf23c2adc6ee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422975344" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9077bdc632b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F21F3591-1C25-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28 PID 3012 wrote to memory of 2080 3012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CurrentAccountSvc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db8ba3abdcfc462a46b7a658aa550ede
SHA18824472a3d1ce3cc58d2f07e3e01e8119e7e9f50
SHA256cfda2d8ee44155b7221fca846c4d3231d083b8f8e0573ccd93ffee5561fdb599
SHA5123b210fbf706df4c4dfbf8ff18d18eb20a81bcc6311de886f3a732f73431bf1d9ef0f0c0e23d1abf388137f5b41d07d6012eccc8db50e154fece1d9fad4b11dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f88606fae1fad1a22bfbec9a3603cd
SHA16d2181237c12777754286a0a8a0fc5b88603224b
SHA2563aba62212dac3e6ab26b699ef057944a27f0acdf791fdbdf5ee6f46d6e5fd0e3
SHA512d536d1da051c6bc21e5e6e2886d16f378f0a0c7bd100d6cb4d3a9125a403038c13dc1d811d8a6b3767143798482293411bdff73b1ab9dc91b8521d38e8ad5ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f9d49ae3630af601ffa5372487d0f05
SHA17d45bd505f32a996157bff17af7570efd30569b1
SHA2562e9db3232a5da518459cd1649e1062a670e8f98f17dc6dac2594a5f103154dfc
SHA512173a110d76de52a83ee6c98f8fcd1bb8427dc00ae5cb8eed10b6588972920b350397ea08fe60d0c97330f4b95958740f319535ca12a504213d7e596281cb5462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e63ac0cfee129afcff292c2c1e85e26
SHA11106c187d718f6e5981ab605020287527a565c57
SHA256f6df7ce549dff5c0265fb8a22566e4cf2108abc932cc90a42f54776dd4820a02
SHA51222d048d4ac8d09df6d5a6a11d205cffdd5e6d38e85f1b03ecf811d35f6caa85d8a54dcaff77ec76a056e6040a2ed5ea73a3e6238525136b3359d7c6e3501a742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542669a739681445a9e3790f89ddd5edd
SHA155274e402ab032d1e2f22781ffd374b94783a102
SHA256700d498cf1a5d1727f46ce97ab696ab9c1cbd5330686d4d6f6f519a346cb748d
SHA512ea0ccd5fbe2ceb9311448b8c29f42e0afffccec26ceeafd55a5c2ef25e3b172f5470765d37bbe5f84a5daa25eb5bf794d06d51fdcfd94e5a6c115b83dde0cde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5986ce133c3e232f3e9832d5a6b5052df
SHA1322756f845a1ee51d302e86cb18844e42a851cc7
SHA25620e3ddde82ff9b952893428369ce0082bbad68a674b423f214dbce4df2f60298
SHA5129fbbce8b638181a20f739251ad14a966b15586409a943530c90e1cc339d57eabf78a506843e109904757437356ca73fdb83ef916e5f87baa33c91e050ef1c3f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d41accfb16214a00f500e18bd70d2a0
SHA1d98bc9939ddd7f90750c3a9b03e42444561109c8
SHA256253b78ec75fc01034395ea06c08d290434f06c06f4e6708ccd768aa3717370bb
SHA512d316d76149adeefc8a420f3a1c5a12433c3225f4c4c02b29c7f79a8e8ef4ce944a7d28c44dcdcf2702ae88981f91b7338482b17a07f420da78852074752c7226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c8fad534b7decc23b3457896cb72cef
SHA17e7a37ff1f40a9c7c99d958af8d7155ffcf724c9
SHA2560e3fe8a733a2eb64136f566592342da95110016bbf96c2fe978d20d5dea5e18e
SHA512616462fa015131448337e948ffb416e8b9f7bd94690c537b70c006166a4594f3bc4bb30580bb401a2559e3195f64fe51980b65ee1c0165bdb325b0393e979b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d586ae62591712d406135ba7a64881b4
SHA1cf371518a39b8e29a1a51f3b3072b88b8942c92f
SHA2563ba0602470a55f5d3d66bf375ce93f3682c37fa569b914e99f7c00dfcb212d68
SHA5122f0baa6ee9bd3fdf277bbc761ccb835300175d834e63ba706b557804ab37c62d5c19bbb92c9a56ce82b7809f01733e0797a3cc23737cfcc5193d3ad8f7d915f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b833a8f0e8c269c1f8163d93ad9d231c
SHA1076dc0a7198d1bb5e90b6ad33e6bd1cbdc7a0d5b
SHA256c000954cfcd6d850a0e840ac0efce537b316a064d7449814b243af2ee9b16c9d
SHA5120d4d40c81452ac7a211a50b0ab48c9af7eced4675e9952418caee14103457ffad09b4a4da514c93d2eb37ad3ec03b80cfddfca29037d29da5998ecbb3179f818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebd6d33717d6fe9c30c75defa965910
SHA1c7123dc3d5d83427ab2c65999340df775da1279d
SHA256dcb2649554dbc0740472a487ad4ed842e9423f334c795760d563c3a93b593c33
SHA512d16ce400292539f123341e3f542720ef897459ebdd9f7635073d4332ecc8c2e5a7661083c380662614911abccd32668ff4a4ef73799cfaa4eac975b1ce44738f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5604a23e9478e0df457169ef510a718cb
SHA136219801f16db477dde2667b35caf514feb27456
SHA2562228816a7c47426faf5e56c5180afed6338c24ecf9bc526c4bee027a06047cfa
SHA512dd19d594dcc7e6cca632e45a35e605e3d6c7fa64b2660c3037bc675719d753d4392e182c49481f9118a92820853cd2f3fe0eb9dd489bb6167942885f788265e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f682b2ef5952ce90eed25c02f2edc95
SHA13dffc6a211e58cc7817ba086810a2d4eb0483d24
SHA256f7d483b1ba967e4e755119fc4775fc304482b4455a649c6ba2ab078b6f05eb54
SHA512c763a4e0ca9906f1be50b9f59754e2cc45dfab5334d0e4356216536a444eae2b60d052c469ad59f321399cb8206d06ddf5e603380e6bb9f3c0e764a67f90deb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594104af7493ac62255cc961fff484b31
SHA12369beb6e11c84e2310c77b2370f8368eb83da8f
SHA2569346a39bed616a4dff1cd08a8df881c87d6fe8269b10375fc8a0b37d75d58e25
SHA512edb164a1acf5e8bc7f4337a844d5f407838be838fc024a6989943b8f51360faae98f8d5ac759205cee4cac1190f16238bf8594dfd5ada998f694136adbb775ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec83be9f5da5181f345486b7c47b825d
SHA1cc09b2fcec35b97297def92bc79476afea859800
SHA256a064fd7a65126fa537516ea22e986a72d4f8a740f6fb22f4bc22578ed2945840
SHA5129b9dab348b7047389d3fd8d5995d8378cd1883652aa8189f2ad2739e3a84a09e40602bf4cc507d2f7e198f824c99df5a1f514ca73072e06e86c3d3f334eee716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de840a07e10e000d32a1654c4f54eedd
SHA14b51358e81d225639e0ca69de77252ea727f5238
SHA256de5ebcebbe60192cafd8791d7e67a436dc6338ae3cfe861038131da6a7495d1e
SHA512d202e81b4c8bc5b0e8b751cc9c740e86defa2044ea5e30744bfe41566f06e6e56be024e480bc658ea3b239e3da48214fdd221b0a0a58a01d78e23059ea8e475a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e66e364ee607a6d46c9e933f9c92727
SHA127c0a8a7491a4176c365455be656b452f41eb24c
SHA25676899a7bfc675b449b9ae036188b01eb8825007ca604a2aca4722aa32186057e
SHA51210b1a9f7579b716a7e8ced4cd8b76be43cfb0d00ef7ebf0208c3f75afb953965bda3bf4dd1154fb89a02d414eacc1ad6b74dc078d9b65bfd1b6216e54f80acb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0e497e04a793dc7a1511859669749b
SHA1b090b257772cef37e0a59a4874e3764363a5184d
SHA25609687492367200116a8725c588d85cc4c7cca335526571f0fff7d560ae85f6be
SHA512cc84d6f51c38a9293649f524dc6829535c7afc2389fa63b9fc90d245444744e855b6a224bf02754b08bbf3a9cd0b650f829baba156267f63dae1cd27eb086e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86d5523fdba55e6eafa99d4c7bd4175
SHA12229f0010f28901bac2be96bb4c38ef9625b34e8
SHA25685e227c7646ea7c4489216eabdd2a3b4d6527f74608736b8ba21ad6354685172
SHA512ec1e0f0ec25311f1e89bdbc8156c766421837cff56b3ea0e653df804326409a752d770b3f89364422d2a8d27c2f1240c579835d4128cf051a111492aaa71033f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a