Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
Payroll-17_July__2024-174013_PM_pxidvvJshwt5fQghlb70KFr2JvYDVSPzMVF.htm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Payroll-17_July__2024-174013_PM_pxidvvJshwt5fQghlb70KFr2JvYDVSPzMVF.htm
Resource
win10v2004-20240704-en
General
-
Target
Payroll-17_July__2024-174013_PM_pxidvvJshwt5fQghlb70KFr2JvYDVSPzMVF.htm
-
Size
6KB
-
MD5
9556a59ae7146d048376f60e98dd589b
-
SHA1
49d7fba1ea3dc16896f08e5e8f116ab97ff7270e
-
SHA256
1e29695e06a1c8596fdbcd0be9a840d1de31ed9b1046d776cd2e460b13a58059
-
SHA512
b9b6ac72ddbdcfb666235eb34c6a2d3dcbe99d72f2bb063a87c14ab8a02d1b69f0e3df7b9b57989acd814430f9de85936fc1f881e799b90561957f91aaf72cd2
-
SSDEEP
96:l1/7Llg7KngM4encccjQ8bmOSSjJaNWNZgPW/mLuEo:ll7Llg76SennWNbmOSoJaErgPnxo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ad4948e7e1b4336b65d30aa015d9da9d2106930773fe46186499b0520c592e78000000000e8000000002000020000000a06d7fe585d81d0de6d9cf478dcb2286fa746e33dc1d72464da48388b28c0bbf200000007d57be7bfef4b8330fb41f6f1b239486b26cc7b60ffd969b6b21eb8b6d6cb36f40000000a52295f5a42a3fb1c882188589a39378986e4b5c5af351fd4e71335730ca614704a5052751216b5028b658433643d3a3a7964dad3c47a9bdd626b4002219d122 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e2a73e38dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427815545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A256561-482B-11EF-90B1-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 816 iexplore.exe 816 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 2520 816 iexplore.exe 31 PID 816 wrote to memory of 2520 816 iexplore.exe 31 PID 816 wrote to memory of 2520 816 iexplore.exe 31 PID 816 wrote to memory of 2520 816 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payroll-17_July__2024-174013_PM_pxidvvJshwt5fQghlb70KFr2JvYDVSPzMVF.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc16eacff23a775657ad356064d2a24e
SHA1d8ac1d1a01f0f8926376908bb343934eba3a234e
SHA2569443d2b372c0872e7c9a7ec8acebc37d3bd65fec19d01f58c3c00b6c52cd46c5
SHA512f39ce027465a7b6040ad0bf477db88fb3eed7879318b94b9990b2c405e0cb8478a79459b6e3d3f8527eeb0f9ff2fba4612f3824d2c1cee2ab19b6043efc19525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5ed76a0e2f9f9c60bed013fcd2988e
SHA1bae57f6397cce395aa970af026cc07832696a2c4
SHA256f94d8c5771261028df4fe2c688072fc9bb4fa12d39523b9ea2bb1d0090e1247e
SHA5122506ae6e0d55c35086a78f9cc8f52d04bf3204be2c7fa5e24ca34b38121bba6bfd04e39d648510053bc2e327638092308a93f91855567cbd1fed9848b5529cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2b640280378cc3d8cfc89d6fd67e05
SHA179d46c282ddccaf9fb8ae66ac9d8d6afb1cdc598
SHA256cfd4ef670f33e5f0aa6b10a6cccddfbd1f6ca75971bda4ec796cb05d95e2e18e
SHA51280569f2c81ecafef20c0ab564fc1e68f7913ff0409761a4a8d4376fc7236afeed5abb86ed110f39cb96c3076eeccf8d97451c5b1807a212f6ab91616ecbc775d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c2f68763a25d265bd0108a9f833065
SHA1da925409ab7cb042ab850eefc6052d89da95efc1
SHA25672822f2e1bd70fe974ebcd2324c22dc64011760fa777e3ed7ee7740b85209ed0
SHA512b01bd645f02ad133566ae0f9ef08bd4c0f998ea026dd06147cd77ffe8dabf2bb4c328e665cf01ad2c626d3bc4aa650414b20ebc5a4a85b0d8ff3894bd82218a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a30bee0e1eacf576f96b120bed3568
SHA17d17451772289616e7abb944920278c854a175cc
SHA2563b056827970d336b2742ff35ed56b48930622cc1dffd2ea8ec29cf508be850f4
SHA5126640ac7346eb0d7245b0fac13e0f343f2f73e407463dc771d457357a50f4ee74cb1a5ee9ef63d7551401d76b3fe5f6b5e2dd593bb8c6cb4fd25b49780177cb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f926cc10ab6f9272a14c2ccab5b80aa
SHA17fda30000993e46e5057ef9c3b35d9303d900c4f
SHA25688a44ad1a32855e89614b382986652aa1aa34ac15e1d72bac467958619146691
SHA512f6b37405e0ffbde84c28367b66ad5cc6fe29c923e0990c15f1f41bf7a89b5f7daf2d6dcceed86fad998e0d4c322810652c52bc9f8829aa4985a73d2f277a2af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cdef03617915e822530a9e9e0597575
SHA169274e329886502cda5e7ab10b3b91b862e5ed4b
SHA2568ebdbb3b265f8098ab155304ae28a7da49e08ec2fe7076bddc431c65a9ad0c8e
SHA512615bdddd6cff0b83fc127a4b9ecf482ac2f2d915ff2dce277167da7abfce51e7ab96d30e14653d51848319238e5c2d9ae9762d1f4ba304f7bf5db4c17893be26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bdac862ef9beeffe90d21ceed2c1e5
SHA14c9ecc530219c6590f2e8fc4ed61dd082750985d
SHA256d304326f64072364cea34c0928b66e9fbe6d98afd188ee914269d7ea971c968c
SHA51270df5b2c1fd5e59cd53d5f67d282b2d8258fbb120c8f87cb1be4b6c4a3dbb357ea729914d77aed11e6972b7c2c3c0066ae8df5b14e4c664f79f232fe6e9186d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d38beda07c764a38d754f068f65baa2b
SHA1694aec32e06246d3bd2a9020713585995b3696c9
SHA256d2aac6b7db7ad10c8cc5f218b00b0eff7f3c4792e1f4556863871fd94b6d04c4
SHA512ecc1ceb37af4b5d586350ac1415d144f593a0a094a0798aa48239eaff3ee7dde1ecb5f08d0f2227084af951521bb1547391d0212a00f2d3b35ad4bc63354db60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e9ac8452233ac04a9578bad09f786f
SHA19ec64ea250fcd29d6e4d91b929baedb0521d06fe
SHA256c26b240e97e4cb5ec8a26607e0f9556ac416c7039d9a61f88877a0ebd233634e
SHA512cdd2261d563b158c548acdd3b8e837d37af67b68b3f53768b60790e51cb806a2957a6fdc24d7880b0ebcf5f028301daf970c4546c7b8b32f534f4496924d3e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529542df1577cdd6dc54fe7156fc09382
SHA11b6f26e5e0e38eb934f1e695d4fbc9f2f39b6b8d
SHA25667486e0195184adeee17064c9623cb9b8e7220f609b4508f41ca344c539ba5af
SHA512a500175b343e8ad79fe18397e187cc6540cf709c63e7cf9ee6361b1f4d2453e05a006ca55f5486c700c0373e01b74f9307e5b418a7f40e7fbdef78cd6bc97d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ada9f85d3dc1e4ab6c0575a50f43de
SHA1d46b8122292fa5da7ac6ae8a24cb944b4508b480
SHA2568dd4ff555c2d4d8beb2c3e025b851fa463f9de4d64c4b699a97013164c0080a5
SHA5129d3785f39af7f81e073ca8f17d7b554582582562a4888bf810c2dbb763052bd9027bed4b8b7c1ee7061fb22cc5c92525c16c2b8ee107658e222b12882beed494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bd9572a89a92bde09b55fb94921759c
SHA13cf5cf4aa2d01ad432c2dcd38963b25692fe1f9e
SHA2560324770bcbaab9103681010e6733a72595c0697884475e308dd21d72d6bee58e
SHA5124fcac0348ee1807ed8ada575cea2df2955dcaf7e0198dd46d3fc5e66f07987d141eefb71906f50d1b1a3532ed77e17e639a366f5ae2fe9b3b4910e74fce3ebbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b644cdc0a3fc9853692767711187d3e
SHA18a2f3fbd23f469a31a8b591c27de100e08bc4365
SHA2563317bb45d249b1b8cad9a8bc701efbecbc6c6fabfd3b475f59c1cb324f97aedd
SHA512e1c87a96d542b0f74e59b97f0dea7596cb3c18c73f07618d1ba7c9ef23e0a4ea01989ec40e3532927f57401a57cf91c19203269c0514bb4311a41348fb265232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df67a23e9b7418537e61cebe1cba013
SHA1438bc352428a5faf7d787a57a5463eae9499b9e8
SHA2566f65488666028e98e9fd185af9f6c50a6206fd68b1b104dc72ac31573bedc6dd
SHA512242e6c7b70416946ef84347bdb545cb6f2a405e98fa20df0de9d8e45a6233548cb16a1b55905e43a2f7973d908acc20b82fd301d6e551dbe269dc189dafda4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33965de3eb54dbc9aeb3620c48c90c1
SHA1c35b2040268fb7a97c0499d5da842970b8a208ec
SHA2569cdc4da6d5d6503b5b6e1dc810713826b6b5ddf9c340dee32b854c7e456cde04
SHA512ba427484653947332f24ea2b50de7da468ff106804b8619c5dfa8109c03917987ff64c584059603ba95bfc0a77d8ca745e021e3bf35e2b5d8e9a5c40f572e138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f31278db97755d0dd28458ab9590a561
SHA1f70aaa776009349e22fe1e79b6ecacd1a8d9fc62
SHA2565e93b5485d7624232133184b4f578ff0f4e50b8dbfbb4d8ea879a5108fa2f287
SHA5129d8170bffd9d3371e0fa0bb6966d07751392a9e0e9b2a36fbbd3fdb940f1e560db4a1af865d687c20e71601edeebb95337ae8cdf5d6d0509948c3dce811602a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f21fb7918c73bc19cafb70764ff2641
SHA1c85fa4a830250f85a0490ced7dddc4debebca099
SHA25627ff11d1dcabaaae41d50045c99de2fbf3f6ac60cbb6fe76d15c08aa8ca6f149
SHA5129665b8ac5ee13b8ad48ebc1e161b65993a075e736e05a9338a722df3090938704095eed943e842232d3421b710123fa8b903f005db25104bb46efe3f42a7f306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be5b62a83ce498dd74a2b17537903299
SHA1d77a8921dcca0d8aec9a30af73002a4375ac4a73
SHA256cc6bbb3395ed48db64ae3c46ebc8186eb3c355ac82e2231b52a3d1aac4e8211e
SHA512fd6daaa3b3ef7af33be5178afff4ec18fb1c3e02997077ed3414b33f186a6989d2c749b0ee37b1753cd0e343a33573d17277b37a5db142036f4ca35dad05a030
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b