Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 08:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1215156814933524491/1215172257664475136/test.bat?ex=65fbc85b&is=65e9535b&hm=2fc8cd3325f19aca06655e45ada5fc57ede2d252d7260f760ec4e1449c9c38e0&
Resource
win7-20240221-en
General
-
Target
https://cdn.discordapp.com/attachments/1215156814933524491/1215172257664475136/test.bat?ex=65fbc85b&is=65e9535b&hm=2fc8cd3325f19aca06655e45ada5fc57ede2d252d7260f760ec4e1449c9c38e0&
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 340 systeminfo.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 50c7b6886670da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000d6096da765ee328c6db98e5605ea8b3b196d4cc0301d855b385a5d32383436bb000000000e80000000020000200000001ab18bd5df47f4a9d3f2542d64a817677d8f1d5e19bc75c320084972e06694df200000001f27f5210e6e8fe82b26e3aab415ff8b145d436880c0083cb870aabfce224a7a400000006d4dd1a4e918509f3aa23e90d23462633da09870f4413dc0a9c9613589f1eea869e768e975357b61a7c6482d5335a60920ef2ae0017b5d93271a4a22280416c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415960732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b3dc9e6670da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C50D3041-DC59-11EE-AE56-729E5AF85804} = "0" iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_Classes\Local Settings IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WINWORD.EXE IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2020 iexplore.exe 2020 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2776 2020 iexplore.exe 28 PID 2020 wrote to memory of 2776 2020 iexplore.exe 28 PID 2020 wrote to memory of 2776 2020 iexplore.exe 28 PID 2020 wrote to memory of 2776 2020 iexplore.exe 28 PID 2020 wrote to memory of 2204 2020 iexplore.exe 30 PID 2020 wrote to memory of 2204 2020 iexplore.exe 30 PID 2020 wrote to memory of 2204 2020 iexplore.exe 30 PID 2204 wrote to memory of 1028 2204 cmd.exe 32 PID 2204 wrote to memory of 1028 2204 cmd.exe 32 PID 2204 wrote to memory of 1028 2204 cmd.exe 32 PID 2204 wrote to memory of 1740 2204 cmd.exe 33 PID 2204 wrote to memory of 1740 2204 cmd.exe 33 PID 2204 wrote to memory of 1740 2204 cmd.exe 33 PID 2204 wrote to memory of 340 2204 cmd.exe 34 PID 2204 wrote to memory of 340 2204 cmd.exe 34 PID 2204 wrote to memory of 340 2204 cmd.exe 34 PID 2204 wrote to memory of 1560 2204 cmd.exe 37 PID 2204 wrote to memory of 1560 2204 cmd.exe 37 PID 2204 wrote to memory of 1560 2204 cmd.exe 37 PID 2204 wrote to memory of 1072 2204 cmd.exe 38 PID 2204 wrote to memory of 1072 2204 cmd.exe 38 PID 2204 wrote to memory of 1072 2204 cmd.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/1215156814933524491/1215172257664475136/test.bat?ex=65fbc85b&is=65e9535b&hm=2fc8cd3325f19aca06655e45ada5fc57ede2d252d7260f760ec4e1449c9c38e0&1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\23EIUNT7\test.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\chcp.comCHCP 650013⤵PID:1028
-
-
C:\Windows\system32\mode.comMode 57,33⤵PID:1740
-
-
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Type "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\23EIUNT7\Systeminfo_HSNHLVYA.txt"3⤵PID:1560
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\23EIUNT7\Systeminfo_HSNHLVYA.html3⤵PID:1072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1e402a1b58eeb167d2a0d69e759ee6
SHA1ee15cb76f8385bbc1ff0c02c119c448011b48896
SHA2565fe0eb448f2a69ea8c1ad21a8595bc0e8fbb2742fc805176679a7b3e54bb57fe
SHA5120a13ad97209d027a86ae50717946d717b779178811d576839d5e21bd9347ddb543567deda80c74415b7c28542a12756015667687fde577fe597ccb877a0059fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c724dc1879fc1fe9f113e322ea18d3
SHA1e0694e74aaafb2067050cfee2734c5b8d0ff802c
SHA2563dbde9ae445132adfe9b8d19b22cadd3c37f6dc8f7cf883015b7b31210598f11
SHA512a08c29b4c9985fe0cdccd0fef9d007558ede8b5217ae88a34d8725aa35396f9239953683e1fdde2cd8554c15f546ce9dc2b49a869ca886aa86654c489f79b5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538a050a6ce6e9bc387ce505a7013507f
SHA1614ca9ca78f016a0296ab244a268d7d6340f7f24
SHA256a6f859f4f84f61604d7c8711e64244771502ef2d52708c875147da0adb0a6531
SHA5121b88b48486745084be2c1071ecc40351102f7e4fff2c4eed8955517024c200df0b895545fce8add5895cb2ae7e756f6658bdd19fdd256d8b4f2c02eaf426dc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9877de4a44651ef8bdf802c36ed092f
SHA1f72b528ba3d4a99d23ef3ad662e09f03d98a7cb6
SHA256ffa196afc2537a290e6b7cc56db2a3a0b27c9577f256f4f911af5a4e21a670dc
SHA512ef80d7eae4873fec174d4739cb9484a8cec4d4c5f309ed985f477e41e68649deb5a1ccf0b326db8dacfa8fa6885a9000dc20823a1024a7c11b9bc04d8c1555b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e58e3f2f118aca86a9700aed1c7cf0b5
SHA186ee6f76b8133a5cf5d2f7b30a5e70ecff152d0e
SHA256f21ee3d2a6c1f424004f490fe3cf20c4991645ea834908a7c13a9bf4e6620740
SHA5124b1151d505f6aac8ed70e00df1814eb2c38d64772fcc226540cad1dc312bf776799c0f63f03390dbd97fbdd613c263ef6f01b03f9322b581ea0aa186ff37bb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d10472b32227a0ca023b184213d4f91
SHA1abe21861f6eb9ae5170cc592cd1d62f30c3fe465
SHA256b2fb6e9ffc8016b96f645cb843041ffee10c0d0ed98d6f63d56216896d87ae83
SHA51217e6439e5e4c6837cd360e970cd4d0cd3e6cfb4dde5a013d8451ebc4f97211a7e27fbbfbed0158f85a0e3d4dd0ccc47b1f8387d170f8db6f54f2ea414602fb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c0df8807eb8a6f6603dc373ae1cb0e
SHA1f4b3dc94de5b90626fb9e78901aa79a4b4098081
SHA256aa33f9b8cc8544da66ac4f44d3fab9ad34bcd9fa59071a99c6006187b0d416ca
SHA51272c0f408290e2dc075c60ae5048d4296a5ec3764b8538f39fff59de0a0f1492b8c12a62f8a1a273010111d43bdcabae796bafcce3352a76684b3f95546ea5175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6312ff6294715756e4b0a388216672
SHA10636e1956d6403405bbcc7675bc3ec36b0599785
SHA25643aa3dfa593039df35223f567a07b665d49d12b3f29120828dc439cee5e4d571
SHA512cd6f8f288b92318faf21ca1565ae16542fc640fdabb48825e7acdcf90496d43759e833b00befbaec1e349804aa69f128d62ceac0293a495f447a20751cf7dc37
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\23EIUNT7\Systeminfo_HSNHLVYA.html
Filesize3KB
MD51c133d87a7db40577891bcab21abcb40
SHA15edbed2dfed0923076f6c7a30a6140a8e58c0036
SHA2565eb1344637d57b38458975c30ed7869acfa63985d30c472836f49eb678d3e8fa
SHA512fe632c48ce7b4c4262e82d96672c9fe7bbbe5fb9fddf1b3cf0414b0ac1af1f3c54456c0b2f6ca36f03d9cfbe9163a09ef0315241ba88bf3daf1ab7d52aa44059
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\23EIUNT7\Systeminfo_HSNHLVYA.txt
Filesize1KB
MD58484219f91326b590881acaec9d202a0
SHA1f557611557256663d09aa91ce2b36298abe4865c
SHA25624dabb55cbd1e78e98e8a1ce1632d69f2b1f19510220614e745b6e9f0c16acb7
SHA5123a253ec263fef25513a3b3b14cd6e305157152ff6927edc01c265f90fc1f9f1359d7a18fab731e8a445ed08072eb28dc7ca2822c90ee33481c8f66e5c6d3ae64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQQVSTWU\test[1].bat
Filesize1KB
MD52918be80b07df984cc337dc562f14434
SHA1f22f0a968525c4743de0ec7b109f337db65c220c
SHA256129c81bb6ded93979a9c3adb41396bb2f765bd980adff6b1c4e4aa6b924e9c63
SHA512c8364dec28d5145b77e4416f0d182c1e66d4eb1f04d1c93cf06b58178e7a73d30d2bfb14e575705ce962edd4a47e75036e017ea83ba01d73095f6bcc0c3ba1c7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63