Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
ZapHub.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ZapHub.html
Resource
win10v2004-20240508-en
General
-
Target
ZapHub.html
-
Size
15KB
-
MD5
28ade1e028cc72e79b0d3c532e163b67
-
SHA1
26ff50ac983719a0d823391c3db3bba15235392d
-
SHA256
73102a8d5e25924c93c6ab1564a46bf8cadce557cb075951dfbf48802a926b6e
-
SHA512
3684a8f74871a873cff2118b6c65142c84d806b02ec30dd87c191c4237672d151dda4260a49fac40a970cbb2ab3bba6ec3c71ff334340dde25216c3ef4d73286
-
SSDEEP
192:PNxyShvK9moqTJkNrv23Rsp4IfrCSzyBoB83fVwmGmPa8yww0yEN:yShi9boJkNzqsphfGS+4afV5G38BwwN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcef878aa199e64e9e871b6fd9b0b93700000000020000000000106600000001000020000000fc16e2dc5e236e6b777529463d49b65d779294db9f1f95a234218441d79f65d6000000000e800000000200002000000094845fd96d7249fd87fef4b8af19506f190de7a87db64d9543d76221d14bef68900000003b2a1e4955fe4716287c8ab8a94b4a6f92eeadf382c51d775bff3f1950a33de95c1e8a0992dc979096661173e9fcbb656b63abe926aedf4202e01a12d323ae7469ab0d8ee3bffd53baf4c177ecd131b09c7ff4182f7be8d760cd732050e757056759bfa783c928be1f96291baa214404ad13fd5d8620dd4aa0fb94698907b834932282fd2746f237cd74230f94d8c62d400000004fda723212c12a36aa136fa87212bc5b9ac01001e89a341811fba6460ca02e3478215109836fa37c96ff8f39446a310a82ec0d11ae185f3d003a45bbf5d8000a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB47DEC1-3548-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcef878aa199e64e9e871b6fd9b0b9370000000002000000000010660000000100002000000056835d6f7f99a815f74c1b6aeebb364813b6d856fcdf7c2b23993db6d79ce0f5000000000e8000000002000020000000b9b1b2301a9f29b8dac7df6a75bc7f7d6b276e0cf8583532885d68ba6ff4289220000000f93b5b555d5da09c1a17fe5aeb69aaab1d89fd14eb07286103905938c4f1271940000000ae0f77e87bd2098aebeca1579f3090a554335d6fb76d853d7f9adb3daa37ce1cc85afb7a71e2dfb8dcb37f78cdd3db50d373105db2c16048bf820460f9d85bbb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fdc9bf55c9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425739145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2948 2204 iexplore.exe 28 PID 2204 wrote to memory of 2948 2204 iexplore.exe 28 PID 2204 wrote to memory of 2948 2204 iexplore.exe 28 PID 2204 wrote to memory of 2948 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ZapHub.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb9b42aa9f3f84c6cb76257aa3d807b
SHA1986493e1b64166fb18acd9a236e9d5752299261c
SHA2564bd8a403fd78cc7c2a8d23d1e461503ba32151e66921e8083bb5dc8dfee1ae89
SHA512ce0ce395e8ce4fefe05f5705dcdbe91eac8ee84f6746b8517e7a4f02e34732ea64fa31fe8a32ec139acb367a0ee5d0b376a7c7b0dd872853980c34c82886a469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e0478c8bbaa12113f16a1c13beed80
SHA14cebf4821a44bede4045adb303eff766d7a54bb3
SHA2569d252f744e168f97764a90cbaf3fee5e80e1ded431c825296bd15c20db19a312
SHA512e97b207f3e0aa5c85451d05316a73c6e9b8e14c0cb2efe9af3624f3d3c5b446d1521bab65ea2556218cd27acbaaab94d7f73dc1e9d732044a69985ffc75ec5df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa5c5e1e6deaebe77ff13e2283160b8
SHA17ac9fd4997dace9b23a17f6e3bc35fe3172bc1b7
SHA25691c900ceb36e2cb3d3a0ea746dd6dadfba86c1331bc084eef74a1039e724859f
SHA512fd8915dcb1aa2ba8f66f3274ff87197d0c004ce92e97123fd8330185b0357f73d9ab2542351d82351cb6477e713111e6a738944efbb4ecd0f17154921d18671a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa4982a5e9826c1302691bc68d3df14
SHA16f97cd4cf8103ae655e1ac866ae37d01dc10120b
SHA2560168aed79ab50d0625da37036cec64c32f4a57b74cce5db717e9ed948bf4c963
SHA512f653bd9f7256cf5b17a027883c79ac650e98e01cf3bb8683a729bdc2ad736c15853c4c458177407f1b61825b3024ad27a0b682fc8e4c26a6a695d69d40a2f36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c410b61898efe1cbdd4baf88b33dd1a
SHA172bfdf5dbf94803946caa202894a026bf41fe807
SHA256ba106868b8956fc0c7d792c5201f3795da1a5c5ee6ccf8eccd366002d52f9545
SHA512f15fd7009de035a18c65951081499cc439c46dd0cae4cb579d85119dd17af5516cad31d3b58641966c0d43d1661a4e149e01eedad7a6c2e357ead0219fdd9171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceba2fa5c3e2914d437942b4f13de705
SHA10f49b78b1e2c618283f5c045f2a911a54b1a03ec
SHA2563374daa118cd91eb4f46f203ba931b62cd1c1df2f064635ae4f27e0554021685
SHA512f015a66e367f1fdf6214392be44ea64a090c69c9070edfb4b52ebb729a8faff8bc2906faac3edb802f705e364a5c70c30e6fb39fc583f8f011481f1310c024f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b310d6f68471231ebe42944eac05d6d
SHA195e177886e1310c6cb4f4e98f83adeb5ea008227
SHA256f46f80d3ccda57658082f29c76f59b93dc12b3761ea760e17d1867fa761a037c
SHA512e10cf1f4027e5f5725bb67648742472ae3e05653ceb1f8709bf19951599c9ade1525b19b6ecb69f6d65127ae3a92e273ba0c57b5c7f64a6c1efa5b38f8dc24da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e68206796bfbdea8e62360ae623690
SHA1e38d5b3efc58d6177c10d3410e33dc8acd76f52d
SHA256f9ffa40e098f1e3639482bcdc2c63c6feaeee8847f91f90506cdd1b3fb195b21
SHA51266edc3e4b4f4510c7a11d42a3e514161b269c5e794f6a5c1198fcd2266e06cf79ff347edd0b215dae1868f9daf646949f4839ddda1b2459489fbfda8a4d18538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02aefd48f9248dbd86e226732d61203
SHA1762e734263b9f0d825da3fefb64bfd26f83c1009
SHA25699000d10cdf14a0e62c87112bcb171c88c0a1da5a1ae54fe0910bb81a2f57935
SHA512da247ef04b68c0533f651b51b223421d3d86c1085046fb72fde4d2eb61306ae2c23e700442b5b115e999d059610072ecfdcaea9d7822f6e5cc52a7400862bbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c4cbc509e4517f2aa11b6b13d739be
SHA18b79faeac71ecf8db2f106a2ea168a7ba26141aa
SHA2565785ad0aeae70693ba495db54f24595988606aeb7e4a5d5ad17012fb9736a1da
SHA512661b0206e553c03ce4928457d536a844ffb449098b7935215ecffcd1a02cf2b560c1915b0711c438c4e16d9106b06969bbe2c3a245065737b07e5a124c87165b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b13844dde0da46d6b2994ca08b9c1f
SHA17786217fb9964e97d6981480bbbdbbc860fbee29
SHA2568342ebb8f988d99aadd830498ee28a61f9a02ab812ca4b82c4e7478a0b5777bb
SHA512eb521c5ef9fa62cc358a501f69c3c6283c4860464d1b2e13dc0ddb1e0534162bbf30f4b92acfb32eed3e13e8cd645fe9512690bc813a2da98fb7340326f1c821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4cdca93fe8f2658cec5d9fe4377107
SHA1c6a46fe1425634cd4049667caba8b7c327bbc508
SHA256b10cf16a2c75297788511b6f9f47fd6bbba306c66f01c8300c03983a49094e09
SHA512740978bafedb4b1c0c13e2fb7428dddaddeac66fe235a797c1b4c8d7d445a383a5b40147bc0fd9065b71d7802e736f8b40d0289b45fabaeaf16ee992501ee080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12c56be53742d6e04d30d32f955857b
SHA1a2782a87ba2390767ead2aaa7a7411bcb115b8f6
SHA2565a6ad73701c24aac32942a756d0ad63e82b79b9b732864ae6cb3fa9c1c8187cb
SHA51239451dc6d96c647865874b0c8c0ffddaa010710e0da72a4b29542fcc3d9780cc79c121c6ad5d32f07f43cacfb3a601be0d0948b268a97597ffb8ab50d168a5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0fd8153bb1d840685faacac566b4f0
SHA1166ac8efb1c15d2f9b122061883d3e7df16b9075
SHA256e67ba2d71535f37ec57acbe947db5c85aa244c4bcfa9615c85930985a9dd16a2
SHA5128b4ad85c92d6b586918a30184ab689eb706f0aefa97c3461ae0af8699bfb22392d74e4484a1f9edee7e517d5462b3e2f532c6a5f62d7df01c3115a3e0f9a07c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac9e0ccfc08f0b96aac23fe7a1c12b8
SHA1a6b4e803d4831155fe28995a34d18e738c196e26
SHA256247322eaf3b2da4b42de99dda43079b86b9a6c17b14dc2e60358bada7a7815b2
SHA5128e29efaf6eed127be6419b9358c899aac18b8b789575ceb77e221e96b153e84439247982fe1e6a2bf9ea4e03b8a4f93cf0630b442c565ced41bd3355df846d5c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b