Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
312a2a92216d7e271224ac06ff96a0e3
-
SHA1
dc3807cd98ef390118c8295501fb40605fef915e
-
SHA256
d9712a0a70ac83d0c79989622df1158b86870da8e13b0e553ff45a8e7382e3a7
-
SHA512
57712bc70b5782b61155b7dfd1ffee990940dd5cac81b9d08eb8d16cc0f7cb2d8adabf4cc0077436c477e76baed702ff8c2d831e8f92c8a4b82a23ca7ba468d4
-
SSDEEP
3072:SEDprP6K2KryfkMY+BES09JXAnyrZalI+YQ:SEBzOsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3ADF8E41-1FD4-11EF-AF73-469E18234AA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423380053" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2944 1200 iexplore.exe 28 PID 1200 wrote to memory of 2944 1200 iexplore.exe 28 PID 1200 wrote to memory of 2944 1200 iexplore.exe 28 PID 1200 wrote to memory of 2944 1200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b658d8fd5e45bae9beecc9d36a3116a
SHA19ce5beab541c4d02c4dab09b137cd41b00880b50
SHA25670499ef25a8f4f4c9060e12ad224fd8f5a5d56e471f3253a629f52e96cd5f4c4
SHA5127cd959ab691ecb4356fc8b5f378ded1a4390aca40dc5b27998edfb28b34b3edc4482c97b1cfa8270ded266418c63d2a93e4c42ebd83b972e1d73ccd189d11d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56469481468b192256307b3f286d03b77
SHA1980198e085388104273a177650a9cd5da276efa9
SHA2560051c98f62459f33908897cb46bfaae2bb299f16971988b81fe0a49423330407
SHA512df90060264bdefd39769c2f1ad8e443b8b91cc073bc4d2a54629d0a922169ba094a161080e5810be2751a1833522d0ef9768dc96e0bf2e1e4ab44f1e1a83dbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65d9b3a20fc7227ad6178e9c99001a0
SHA1fad98ea472047c6a497b954a95669415a24623bf
SHA256c2627c5f43bbc4a61774f8fa0da7d617dd506ba0677de5ba86b939b744fb10e4
SHA5127b67ee002f0903fb19f47195114c4ccbbc2988ba6492ba031a13f24d90d234bc37c095a08a120c6a6c61c2debbe9e04843a3f83fca31a3c32a338923b69e95e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b23ae7852be75d2b16a48039e979c5
SHA19335f541a2079912d1f1e0014e572efd5bcb111e
SHA256ea12fb8979dc23d8db8124c5f05f774e37a93ba9ac8cacd2b320f9fea08d2c5e
SHA512eda03eb8121d5664d7986403f1f805b97261427f92ab8ff93b36e396030840daa1ae5395af74f806ced0e9411f98255e0565ec49f3e0d1f76cba75394396d5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7dcda84bc0c5ccefcf5713686a09600
SHA1ca14f26eaa9dcd1a04ff8887206f2917df95cd9a
SHA2560175ecf994253421efed53f3de5ab451da632037e7ddca4fddcada72b6ebdbd6
SHA51249804daee4889a74f889f453cc917703602edc8c7bb98339f303ab2e0f597024b61060e60190b98dc1426c7d2aa4927d75d4c712689ef6048748a3a9d356f317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542830b0167e84ee6e88b4ce1e27c99a1
SHA14dd6a5d6c5f535c2964f6cb1f08fee622a6fe44b
SHA256bc95bfd60052c28e5ebfd788c902bb529c840242488fdcd81d215bf564e48957
SHA512422c196d4e1b9bceeee6825198bbd39ee2cbfdff2c971b7e06beb823cdee85b1810baa99178e1b3358e91211c05b14ed45908681cbdfc6e7bac3e6c3b48f00ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593da500e29c09566f9cf14da8ce0dbbe
SHA1ff5a3bbaa72e57201722b5854cc2f41918fc6084
SHA2567c070b0a395bac73c9c21aed256331a7e9846df3819b389b0fc3242e6d48fc59
SHA512e9853dff816dab9a25f80b6d5b5dd0b81a2d46a83a052205263b8e456496f1140dccf6d85a146a8b522158cfcd8108077d0c2e41a44fd9e929faf2772062662d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ad3b5fddb8fbf80daaf83b98dc3266
SHA1b1d9c948c93df77108f5f62d1ed98f44fe08cb70
SHA2568720300ac2e49c529fec52fa77739ff36bc33f0105a3f95076678ee1997a8d7f
SHA51280d0e250c61375546d4dea90d505d81628871f793e650a09dc016f9e4e95018a18a54d3f26142af6e003390c1a2ac850aa845fd8ddd93a051359b0a8855892b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e85bf4a518a50981d1c3adba68ba045
SHA17d3b19295a5b8cb27c1537dd3c214b38a5354a3f
SHA256b68c8a2653e40f9dea2a4e695275db26eb3e67c040d3bf1ea6d785120ee08e30
SHA512bdafb2225026d7926fbd2c864221d1e2bc82adcf401d19fd0aea55ac4170c0af6c8aa3f473f1ac6aa0463b5e9c6c038efbe5cf6dffbedf7165615ab8bf659b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56267f971b207580279d6c77c2e13ce5c
SHA1c5379d90addc20f5d4c5e5ea4ac4ca28b99535be
SHA25616e472e9805aee02ee03276248cb2f43c5cd36f9c7830c9c7fc1d37db63c117b
SHA512c36e550001328dd8d57616e8cc934f3e752be6b6afca7a9f7bee54b67a0db1e725dd96ea3a597bf3e1a72c6bc722ccd4efc37b216c27dd2f4634a54f20386c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e42f79733cf2d931a70b43f68bbd11
SHA16c19f9c0c20ae2f1713537b5e88403a2c8e679ed
SHA2561fd97f5b497eee2d3ff7ceac060ad9b79999954573afd9b68981e8e1ef5dfe3a
SHA5129d45c85310a1ebc8cba6d174ad0d1ed7d92c058f72dffe0f8b513995ff93109044762474d7e52693796b3f30d5555b8194d488645c3edbdb4a90f35a841d364d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170c6d93a973286780e5ca411190587a
SHA133a3f8630a0c9fc1a9fa155b5525d6e3868a7cc5
SHA2562ccad40a643945e74db9d1b252021195273a5824db7afdb39a541e2bf0601c3e
SHA51227dfddadb89b325999c892ab2bef0c7ad71292bbdd6e24c9aacd7d08830d3089e1c11ef78491e4d58de32358808e1df85cfe853c793586a9f01920ee7e150410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c7191a36c2f79a1a2f4dd37ee4ec8e
SHA1fc7a95bda258b5f3170b4eceb25d273e175082d1
SHA2567f5583a3a02a60199b073348d608dd2e5ac1b858a901403157b325aaf186ecb4
SHA5127f2bb0b3bdd7a72a169c8f509d2d1f8b607b7619261784b78299390cdd5cf1e93ec6ddb4610ef0ec980bc2b776f63390215a7a1011daefef35e8f5f364b83924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a95d5cb56978a8d112ba6a7a9ee225
SHA172508f1ac51af9f8f35de53ad9a24037c1d75b6d
SHA256e3731e96850461c82cc0b6dc01e33908b4bfccf2d7be32dc80fc224ae0ddb88f
SHA51293fbbf212c2ec494f39c417dc103c81dc0632f77088e2753762a7fd761ab379b183f831bdadda8accfd8e6e179f76d29df77f15d85f18cc0d02dea8beb8b0891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66d549a80d68f09db85ace92b7cb708
SHA1d8bb1050a225784b06bbc56793297e6e3301db51
SHA256ce7770eb45a5ff7ca2c44f93bc6bc670819a9b413aa9b39650a754c7f625808f
SHA512b62d172f41d96fb3db9ff3c47393c7f20b35bc7edae56feb439f5041d7236ad56a736e75d0b695d64024575918e819b88f956c07d260bf3b33ca44e089a048e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b234afc49a71d4d837273ea24690c2
SHA1a318c5339776aadbd6a5f61b0b442b531276e0fc
SHA256f981543d9cfaee672be8640cbf223d63afd0c5c92f1498829cb53b344aa7cbce
SHA512aa86c5359a71c359f1b4ed66a61361613eac780dc4bc867842873ec722695161c8f06e45491ad4663601fdcf7f61691e57efdd58c84eb038ff678c123e8b8cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d51aa0994563dfdd1617034519b4acf
SHA1c4f21108db52c4799b138875af759f14e821b288
SHA25608963583236de69b7597d211328d9f6f96f572e9d45388f30132b4a25e2760c1
SHA512bf4c03cd765d44372a6450682689a9beba6b9236dfc3dc8a073d8fe46695c71225c269ad96f1804d8021ab5d972cecf9db4633add94e2b9ad1618225c181a444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a77c0cdf919c4328926d2736d2a97f
SHA18218b2edcbba89c548467c5b61944f7974455c69
SHA2569ac60cf0db3b881b9b3daf7c8c8eb4a677cde6d27fcdddefe8d2678f7c6c2ab3
SHA5127264eed970300e55261a32bf5222e08e11a0265f71aa29914093fc34fb4a4661b7e604ccd8e21a5d79ae586484296b74c9f881ad1e5dfb105ed99599fb90e1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b38633a20f4d6301206035e3044ef9c
SHA1b4f37e2596ab7657678f2e5b74f74bf5c519c126
SHA2565df230c8bb50e8419bbe7e7e5e9eb45ddd98633a2d46cfbe301b75760513fc9c
SHA5122456e42ac3be0b3a9c9ea0faee0104ddfac9486599f457e1bd38e08800f1669a357e7d0712cad893b925d9bccaad9b961dca0246c0da4a1f43291d18c4e4f83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216ae8b47ed54ab3c6e2db4b01a8a943
SHA1ac9df98043f3b1a4590174c1a8a76955aa0736ce
SHA25692c2d456a7c7aef5995036316623c44b7ba1342c93d037303b878ac193c5f910
SHA512ee1ce5373d4572daf17c5483426b9c193828d4d22caf34f9ffd12094cae87ef09e6a41edc294adb072e5e146be52bfeedeeb6283f02fead73d66f02dce70185f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b