Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
691251-moan-fuck-me-harder.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
691251-moan-fuck-me-harder.html
Resource
win10v2004-20240709-en
General
-
Target
691251-moan-fuck-me-harder.html
-
Size
325KB
-
MD5
ad4e502ebaeea931c1d721716acc282f
-
SHA1
a746466e33cdeff3961ef692b9d97868b0cd41b4
-
SHA256
7c863db03b8598729858d45a430e45f0491dab2449c2f8163413df2c5e1dba8a
-
SHA512
9983d329b738c15cb9eded4b027fcb17ca90021544eeae414af3d0fbb225b9ed5a7be9149928250a4b24b31923245c1019bbba052cc9c9e425fe82579affdb02
-
SSDEEP
768:f1/n6naPdCsojXzUZ+1KmJ3VPlbIKqZVQzXK4fKlHm24bWS9PzrT3WVI5VILlV6u:bduHBJ3VPlfX5VWmMWn1b5UBrn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B8944B1-409E-11EF-87FB-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2708 2692 iexplore.exe 30 PID 2692 wrote to memory of 2708 2692 iexplore.exe 30 PID 2692 wrote to memory of 2708 2692 iexplore.exe 30 PID 2692 wrote to memory of 2708 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\691251-moan-fuck-me-harder.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59272c581c4aa8b4cae847d579454d91c
SHA1083a66388eceeba6584a47582ce89d8e1a675476
SHA2564a1984f885039a007eda811f7ea3fefb7a4530da36dfbdcffe5b5cdd18460d68
SHA51272945be081f48eb6303a3015eaa6139991e010d1493c8579fac4f4720eae85373bbbafc31ece0cb137a9dc83bdea7e1db07b2f547af27111b602c87ebb3b53f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f584a50a84531cdd15b2adc9d12f8433
SHA1df56b45d6ff12fb6330402577dd0401222f2b15a
SHA256f153bc9f307c7adca931636552ff86780c27d0e800ac55240d56f98206ce39a6
SHA512ebba661a4f060f2f736464223c385fd82072e38d7f1c1db7ed6930437bc1ec74a6b00b1369a0c2b4732d25c10ec84f90817044e2b9d212f612d591089c1ae050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb969212ad97103313b2713649f1c8c
SHA16c7bf3a5e56fb0035a04768d0efc0d1fb3dd6764
SHA256a520e4f71c83da0f6fed553127e28250f346263e8811df7b8ca358627df7324c
SHA512c10c3e6eb4e2b61ef5ed3730e5e58b9b1f3fc85b201f03921e138f57658f8108bc25100a801d6543b394f7f7e5584779405b2edff3210fe26f82382bed2ac06e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff61908f9cbb78e6a37ba2367bda64a
SHA16329d54b54d92fdb16031137a4e7458b3351cf88
SHA256940c903e2797e24203f368d7bff5f45f0842ee1a607bbf2adedc89ef9f6f73f8
SHA51241427bb0f4e23af60108a9ed2330da79389725c9d242318ae3c4c6e92e08ea5fdefe5dca87f60594452cc71a8c6f5ac2673d3126ad1616056578be7d413b91be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c03361ebd6bdb5e8acf8a42edd9903
SHA1eb0e9f55bd4383bce49bb95e411c393dfa0d070c
SHA256f63f8c34daa8f7816726497c1aba96f9b8a5cbcfd8b7641a62284d29729d88ad
SHA512b8f8c75467fb481a306c52699fe2ffe4824523712afbd3c0e9e1502040e68da458ec79e7a63e38e8686e4398453edda66597b42eb4681c9c5c58fee42cd0db35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c875e538c56f8011427764d86b59de1
SHA179926a0234f5e7cd8b31fc5cac3d4749155eec0d
SHA256ce9667f3b9890025ca4b678eea46f98e42d27b7207a27f5bd5d14c49d3d660c6
SHA51290febcc9c4d8a3d043f23f6a440fb348a4e47c7f30fe5fc576ca246ca83eaab32ee9c1e716c077ce921fd66ff1529d5588c143ae708e3a51be81f191c279c588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6bdbbdc0443769d7181db8c09dfc59
SHA1083d4c5a1574423e8cabffeb2732ad98dc05f78a
SHA2568d1ec0e71121c0740ffa731a0f081474a0fd123d398429ed16c23560e34d9898
SHA512c9fcf997368182e76ed83cda89c292bce3b8b8878f7102669ff27e4ed28ec41d15702edabf9efb17658eeb353980d8175ef6710ec13b368a033a761558d4023c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56432a4e9829ba0c14259789d4cf09a
SHA1d024acf2842b69afc83e0389d4bb4d5025106d18
SHA2562ea1962050caadcece476b27150583a9237c1045ae2b29e7e8acf3cc36622b84
SHA512d916dc3228631fddad7f9cc04bab9c756f8b9d58f602e866a06b9aa96fd0e863becca563fc8fe9af57d65ac8d929b81821bfa3de52d8b57fe742c948d3a0492c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7977fe0ce00d0013580b703a3b29b9
SHA15476165a7d7e0e14dbc2a48057aec05f5db0933d
SHA256451e1d309fc9ecdacd8c968aee1b86c58dd77a24f13e66d9f746c153226364fe
SHA5124c9700bd46b07395730cb218159164848c606985a79162c12428d27df382a1b1ebcbd1971dbfb17ac344c9cf227a44102702cb43da5c21531cdec254240ce1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfd2a60e2a675f6d5cff33587bed98e
SHA166a743846c758c02564b29a8471a8ce0bfae677b
SHA2561e5da8daa2fb90ffb70417fd446d3b7c5bb46a0db6ff095fe46c664cf9899e03
SHA512db5d90f68a73102f58082de1a515b8dfd0dc92e1d6c882c47aafccc373b7ee055082ff0c70117be2602790645e7064223183453db24c2d3b2021ff86ed388b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648dc5a10031baad7ade7f20093ef1a9
SHA1ef2d7284afcc6bc0f567d205ab8d6324d8c57ae3
SHA2565fdd71b1d5b43157b3a352fd166250bb0b5da553c2bdde5e413d8c6cd1b25ebd
SHA512134a4df2cae7b125aa1fcc1b38b91c9a88219e14838735bee771b5c45218bf81b9cae6352dd0a2f294a1c0ea692a23f057a63d501064098337166a5a7db6481b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b