Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
yk3UHrKeTk.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
yk3UHrKeTk.html
Resource
win10v2004-20240704-en
General
-
Target
yk3UHrKeTk.html
-
Size
10KB
-
MD5
554bdcfc67dd37d9270f6cd6c4147155
-
SHA1
e5296f6170b6efe1793804a6fc31ccc064ddfaab
-
SHA256
0d37dc1147095e1e4dceaa2c9fa503aae238e677b2f4aa27b8e647ab1e8c21ae
-
SHA512
714ba7c4c539595a5f4f6b0116fd2fb5d7033b735ac39b50a35a8143ed8f942a73aa160a5e40ea7b9cff53a259dc66aaf0cacb670a03f34721c9022428ba8b6c
-
SSDEEP
96:uHenBzcdMJe9XOfRr8LCR6e5hNvtdLXe5GaZfdnyp7nx/IJ:uH6le9gRr8+nlu39dnQ7nx/0
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005abab2ac235d8546d8c7b9f31fcbf491307235920ece5bc3a6bf57b966e216ef000000000e8000000002000020000000231326d6b925895b1eef57a3d1f83cb0fb5b1f92e6de7133b4a27a2adfa6820d20000000851e10a88ce153640c66abe959f3c099a1ae89aefed29cd622d4c8919eb44d8d40000000272652061f54138c7877b0f5de1d20f972466efd10af200ca7c190f6f485eb32ddee222fdeac6f63614b6012051457896f28a30ec6a6aa5af25d051d761f4b31 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f9f68a91cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426424534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B62F4601-3B84-11EF-8FA3-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2064 2244 iexplore.exe 30 PID 2244 wrote to memory of 2064 2244 iexplore.exe 30 PID 2244 wrote to memory of 2064 2244 iexplore.exe 30 PID 2244 wrote to memory of 2064 2244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\yk3UHrKeTk.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5124708a40cf8c4d07b81ac48629d2
SHA12eece4987efcc6811573e07bdf72db653f8521c6
SHA256953b2c8218bb51c01134f0e2ac58d92e016814898dc054ee037183d1c3c99c8e
SHA5121099fcca205892ba053d1b1b4bb096f3912bf666cc2f3779e0c6ba7655d11e771796dbe83c9bcc1da10b9cae6711476db68164263555e8c6175b1edb90fc8308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e814f265609a9e8ff50ab34947879be
SHA19e028aaaf7bce3866c9f1316b587ea65974b1a33
SHA25678ab32cb61c5f9bfe9182711e8a8b92ef834a77e3e53d8e5c5b2c7675f30c746
SHA51285a73facb330c781685bcc54a21f93edfcc84386a64357ce15af12db830f3303ced2fc84eaed166279e3e1a1c64ea613c694398a8d21cdc375845ca9a8b7303c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e89a9f5180f21e77fa1fe6bb94462c
SHA1a1bccdb3b7f066011c7a965bfc3f5c17bf918f18
SHA25625c7ab64579a83c446931823312d1d246a8ba30c09d9d4c990a1e85ff206d90b
SHA512ad38fef42d3fd6ebc5bc88b430c5a6018c18ea15b7312714cc318b44fde673d9da1163262fd9669d6ce1a69706053e892967fdd59bbd04e50bb6341f98efb51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51f855b07d716b5cacb8b602052e104
SHA138bdd3930c09526f82bc4c97c62bea3a2878ffbf
SHA256894a5c3fcb34e97f859813998635ea35a59289c180e57fa1392e5f7dfd75e26f
SHA512bfd5932d45332c46491bbe0dee38435af3531d4196bcd67a01f0e350c2636195f58c40fd5b1e23d99f4282fb0144e714d75f408b6177d08636013b5fb30d5dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae5c3ecebc495641a79a2a66a760336
SHA1a22570e34bde4c48dfd3769a725343039513baf7
SHA2565ff94df1cfe12f4561afdea9d6eec15d289f59ad974370971c3b05867fc25ca3
SHA51215974e0c2fe221808531ca908bce6098f6ec422f1201668737b78d0e570512a0e99267e7c16a53bf176cfbf4b1f7f59549f2fd33f67dc02291ece3380a9a01ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b001884a386667aaef48af296e0b32
SHA18c15827588ea4fc67d022b68da775368f0e36b55
SHA25682880f5348b77cfa8a572c9e2a122302710e7b12a33a7323dd0a774c5ef86470
SHA512abb4c4fcecb2366c44003583a7b0adf0be302f13bc8ed201fbf8cd7e0fb2dca752bbe3ed100ec2ed5097dde8baa625cf9f1a3bed71b71e698a2801856407d6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638031f5bff87432467add53f6eaa899
SHA1649ed049989516ce404318eca9872c25f779650c
SHA256090fa41ab4fce102fed63361888d91cd9af4662df046cf01db9759512db0a735
SHA512156acc3ec855bfa2c3b3fd4017f934e8a97d6880dd4f70147f68c2158ed22f4a54489eaf5f383f12b78dc02c2dd6ba2932e1d45ddf674ec7003903cb846b4bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c88bdc1b2f7fe1b90d72909ea6abd4f1
SHA1125c69a10bb077b3f3603823b35eb6c934840bfd
SHA2561fd6737e4b4f2ef902b975fce7c108ab382618c8d1d25229d0b4523ffede734a
SHA51237a5819f54f4913b923ebceefec235503b5428b9950cf4477ea22449edaf5c9075405086635ee8b985d2d391a3c1512ad6e0f79013dc153425643d3e9cd3a42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e5ecc7c9c8e1037d4d35696097446f
SHA165ff67f375acd62bacbfd58009e2b18117a8d4c9
SHA2560bee6e5bf8ca572b7fbdc4d6f0199b2e1368ed9c874ba12dca45dc454faf976c
SHA5127bd4854875b76e0839ed57d8449359db00dcda34b3a479fa65eb4c5089a7b2eb7b957e56982f7768b483f6b780d87b9351c5b51a05d22531e9b53d48e2d76f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7d18915f40c619d22ab05586fda686
SHA1158a30b9711ae4991cf8f843ef6e32e57ee31767
SHA25618c535e8521e4d85a7e54efb59b1dc38a623c370531d0c52712f25339e29f834
SHA51298b1e80bbddcb6c73d3d328635bdfaca2c2e7a5342964550bf4ef09487f999da3765a68f18d0fe1eccee341be6e63ec614679bb2f188c17fddc032da667ede92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526cf7c31270c8f3fef7a0a182aab548d
SHA1d09c4d042677e826228ba9f13282590e217c9b0c
SHA256939af9983d98867a8de0a8cc2137a6a43fa48efbc22374c4ac29bc0ac59b71ba
SHA5123b1f15b82d745d1f89f3451aad93fc6b182081f79f71b0ae8f0674efae80fe060b8e0ef5607f4a474968d6ee3077d10bc2d7f04255ad6ea6540fd67b5fad82f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569fced20690954f5310cde5d15b1fbb2
SHA179994a467e41a538d602666bf57b62fc24c6c300
SHA256ed06c2d4d04d360eeb22c870bb7847f1893bbd104aab4435c71574f78314c665
SHA512593ebfde440fe70a5bcd379878d49e71faac3cdf360c0adf364b1059352131783cd807a390f2aa9a3e120ea9a4f846a14463876ebb6e8595bd8cd98607399e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b2762ceef6f8bb0ff643fcf82f7a7a
SHA1b124c6bcf5544642ac35e3a76523d7caba57bf8e
SHA2567153398891e293816d5b197f18fcc129ec630feb683625d0547e295c75e5f3c1
SHA512e026aaadb22f098c67b292d2b02f251feb7c85e0cf5d0b768df143ae004176c7c17d797564f63253e788cd2fe356b5c8747d5b8c954d897539a0ea3e68594885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4e46979729be1caede21ab634938d9
SHA107e4029460dd3792b8af462d753b1b3370fed444
SHA256701d795234e0576d480aea34654d455af604c178ad0908f1b42baa76c76f16c7
SHA5121a56771a31e6d675a7d21a6154a21c11d12baf6cce89c611d006ffda75c84e1627c20315e6b9591177412e93ccb303663b37b89c35110a1203964828c8c0fe39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df3be93a7adcefb27faa4bed1562a63
SHA1e812f94daf92fbeaab9d763a8ee5eaa1b25f4d8a
SHA256b492ed302861db274404bce1b2acc8ac7b184475626f6a1f9b7d502c8d627efb
SHA512ab788593958484612b97346b7c5ca2f539f3b840ef033efa92744478ffcdcb7ca4e601cb49eb249ea383172fc0a219d7a1d8f22490f7fae618438eb75097acd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b828ab054a67178378d42813e6f64e
SHA1c1eb010d21f2b07a05e07f86d2f011650983dc4b
SHA256b8bf69e16befecf246528caae7cd9851fbd54cb7ed99099393ab523039678865
SHA5128162d1718d99d51d0922c3e278acf4bd92a52aa21a882ce8ddfa6318e4971574f0fbc1eae53f9a05f28f8b761a598600649181689f2bc97a5a360ee20fc0d418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc1291ee90ef43a001e95b322ba9021
SHA1d6a02af89851e51354deee8fe986d6b2af412f7a
SHA256f2509dd3c48668cf7f09c6fea0bfc37f4ebdd4ffb9cf61ef3f50a5777924451c
SHA512f4a562a4b5fe4fb3da0c554e795304798b5bee4ee96542a6fb42f3a8bce24dead4417f4f5a599dabfc77785be0c8f85954bef3ea67270f9a55548d9a160dae08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c49b09383ff6b9dcc94af0c205dd2c
SHA12447e0fa5f549436f3c6ae519edd1d635b0e6b7a
SHA256695057e90e19a9e999466d7edfb6ee5bd1214144ae105fed0f173507da7eadd9
SHA512dbddbb8c57feb4cd3716b0dbea2fa3e8d69a8e9b5e19570d0d2b5519af51c2a07b9973e1a7da10478c5105069db0586e616b263a055c8eee0ec01fa2c68b69cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b