Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 12:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://desicinemas.tv/movies/love-hostel/
Resource
win7-20240704-en
General
-
Target
https://desicinemas.tv/movies/love-hostel/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{989BAAF1-4A81-11EF-91EE-7699BFC84B14} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2308 2552 iexplore.exe 30 PID 2552 wrote to memory of 2308 2552 iexplore.exe 30 PID 2552 wrote to memory of 2308 2552 iexplore.exe 30 PID 2552 wrote to memory of 2308 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://desicinemas.tv/movies/love-hostel/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5672ebe6275fdb775e0ac9dba8e6984ca
SHA1de03884aca15f2b57abdb8c52b8d601f98b48144
SHA256d4e9101561a82a74541ac94081fd455ff00f8ade654889b311ffd992d95d4f29
SHA5124edc19bab392027367c42b6f28c42a756d1a20e44256833fe32ffa29d684bb3fb8d10f4c1f3beb4b42fdf5e04ca2d8a776401d0d73962f614611787560144d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a090fb3363e82846e6b542a2e47003b
SHA196776a0adca14f1a2868657b615540f46463d2a2
SHA25626c9d1c5c771e9d6c3f452c37deb932fcb0647c90f4eeca418eae7ee05c2309a
SHA512ec615082bc5dc96f78520c5b8c8f57dbca1bb4ff43b93641cc056ad92ebadb62b3da44971f0959811e1fcae48890a3eee2a40804888acea88f4a88440f8de7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5147e9c45d05c260ab19dbbe6dab1927e
SHA176da831cd90d273b2bf965ea0f69769a2f5c8d78
SHA2566357daf0e601bc855115aa5a88740ead4e21a296a8d01ad3ae6eacc10d507988
SHA512b78ba52077490877c121a6f7ee63b9bf79700237ed23d8798506c834ee4d3a2449a3cec350c33a6ac37bee40b64a516f8fdc959c5d260c372eabc4f3c4637783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa775540ffa814898524f7a30ee8bf1
SHA1a1d579e2b7e868ae45249386c4094d32430d31a4
SHA256c96cfed9cccb93c26c9dd85072b95435dc15eb964f8df8491748e9590e181f44
SHA512b9a6957aaab4961745065d7d1ceaaa9ae9f38a5a3991bf03886205fec8bbd3232cc3bac2d9cdea7be02e4dbd1f1e698c4d0d062ff124f9017bbcc85f1c98ce88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ee8abdb30fc9c34dca3a696449f668
SHA1cec3e73aa0e93bd74e25b98609c53c3bb839546d
SHA256dc32a060d395bc3ccc359261a273a69a85907c59aeba4c2f06a75d1989beaa84
SHA512e584c79380a449a2aa443404db05b060e6f51a888f1717deb0ee21e13e3e03e7415dfac7097da22f5fad538cb94418f06fdb2225ed11757fec72043605d2f233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661092e411a7ff70bb47af95ed210060
SHA14b3916f0d2dd961acadb8cdd003a40fa731fec97
SHA25605173140d066ed041af8cb9940757a70b549f4203e06c4e6f42a3c64bd9e0986
SHA5128e07ef2f8ff86b520fb1d46b217f9c44819ba0fe871847bdabad5a86d8e5e86a74a3670bedacc64eeaa595195f6748e6c03e80507481f9c777480eeab75b618e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b2140b3c73426241018b611de37980
SHA16a7dedfca3bdadc74a271f479d7c2fb80286df83
SHA256d05d7c379fbcee37e87e62fdda4d93d96d02527a1d885ec6de9887012d8e27e3
SHA5121fdc7a804db95b9f8c18095f3f06d432e30ede93d8cb697b931e6eb84a0a569c8e7234223f7deccc1d3e52d2e9005263d77a99eb0c3817552d1e432f293d308a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc38aef0c7b1fec7f6aba6dc4b62a498
SHA132ce274866cc2a4751f086d0c8542aa24e142012
SHA256edaa10f3f0f1625a786563a7fcf45c487484d613c5657aa73fe0174acb44110c
SHA512efbea23f6446a26afc90c4a7edf427a7324155639a783c4bce820cfdb547338a34541830980bfb2281c46e4656881548a58736fdeff700054e16b9b63d3fd9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de6f8e682b35c86855f6a8671d662ab
SHA1bfb6d30ab177a46f635f85f0e5fc108f440fb158
SHA2566c444341a63d63d80cde69cf142960c66b767af0d069489f2ab9a98bd06cec2e
SHA512ef32ce74013b800f27de31fea2d178a0411c7b0306670fe3f3c586768f2e4b4bacfc64c3818d4f0fb50515cb7df6638e65d67940bc2f95e7f142f18246fc887b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50d001a121a250dd74b52e274016c1a
SHA1b47f1473aab96677c0fd9ea99fa66f43d0a58f99
SHA256bddcc4088ef8d84347fc8a0ba8181ba85ae8c3e2b29968bb4b211b4efb993912
SHA5129cb6ef2d235d535b01b80edbc68d92ec486abe12ab9271176f38ade62ac36312a68a812bcbac27e1477f521a1dd8f0096c9e19280157ab38fa0d28c97aee1aa4
-
Filesize
3KB
MD59419beed26578fe20a7e56d405b0a5e3
SHA1e290ca9a6961659c2c7b32ebd2fa9bb0e77153db
SHA25654ac1dfd4f3bda68566af05456c6bd85a5fa27fdcb2f3e08a448200943a0be2e
SHA51236f075b5c72449bc0fa88bf1dd062a91e3b10a8c7ac6b2e32ad3ed146e901aeabb513168ea6932810720138a3bd914b6b7e47d85a00667316cc57bfeb4a17572
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7H6XY0V\cropped-dc-fav-32x32[1].png
Filesize2KB
MD56c42e8d16fe0b41776e58c4dd91e2e9c
SHA1f338dc2b8c696b51156a62945e2121ad05a902cf
SHA256a4d3a55d9adef6ada0fa91dae55ee7d6b7dd2684e0fee3f4e1017f45a4faff49
SHA512f46d266d6af9bb159578230d6738e3a71d5236bf3def82e0b78b290a8afbe9b028d4aa4c07ce06cb37f832fcdf0305bda3ace4b84fa80c544860a6c1b3c3eace
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b