Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
56d325bae4eaa2d10b83c21b64580db0N.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
56d325bae4eaa2d10b83c21b64580db0N.html
Resource
win10v2004-20240709-en
General
-
Target
56d325bae4eaa2d10b83c21b64580db0N.html
-
Size
855B
-
MD5
56d325bae4eaa2d10b83c21b64580db0
-
SHA1
a221902fc66c8e8698d1966c36b37c946825d108
-
SHA256
7faf0bf252cca9da69879affc076df9d00a0bf20084bf93aa0e3f447ae5b78a5
-
SHA512
f322affe862fd93afe5dc4197fb4af4085b6f2089ef452ed3baf6d13d8bef7296c948f43fb5145e030cfc7895e7abcfa70580bff402d678a6da57ccb10da5a7c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e6c93aa1dfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66341111-4B94-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428190489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004c68bce57c4c15f9ba8447d5288bcde9d3002e72b89139e3381fecc9a805ceaa000000000e8000000002000020000000bf23c7981ea9788409fb516b8379ba3b9382f22856a1c4092a06f0d5a8b08186200000002afa317aacfb093075e9a93a86caaeaebb194c199d523e8b45d98e642826c143400000006da5bafc1b32399f0662a5aee82388e13974aa0812eb907098b1eb35c312334f35aafde75120d100a98a85d0925a94c4dcddbd6b4f2842d1ef1787bf9b02dbc3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2428 2360 iexplore.exe 30 PID 2360 wrote to memory of 2428 2360 iexplore.exe 30 PID 2360 wrote to memory of 2428 2360 iexplore.exe 30 PID 2360 wrote to memory of 2428 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\56d325bae4eaa2d10b83c21b64580db0N.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc75fdbf64f6e802616efc400e764b71
SHA1b31b13101261dfbd439c83c057fc80d6ddfda1ac
SHA256bb0b55c0ffc409f95104008a47c68ea671851764b96ebc8040629169c2c00c11
SHA512c2408b086776c223d24cd195f11a02079c2929979e64e02f58dac0961fa8c79f4b58eab63892e39d3732b2b40a75f4fcf6404165e2fb682ef2df828b5fa4b8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd290c5b6fa198afef2bf5404f2e083c
SHA1e824133adf80d220e8848e44276c35b9d1fe9cdd
SHA256416de17def83fdef12a19bd7234e11c3ae4d863a479a5bcc7d123e42ca46f4cf
SHA512b3a0de310fe8e3ad6d4fc8719f709d91421a4011af26ad7ba20b85c1b2d1beac306a01f21037c936b6ce1eaed2e3b89a8c97016703efdec8e4dcc101196ab0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32df5dbdd967587aa9f5562d83e2cb6
SHA182bc075d9633432858afcecac8aac775f812bc4b
SHA2569da9ca45f00fc1eb7db976ebc4f6fd6175245095057119f425e68986ca083798
SHA5129bb7c50a89bfe88c6a01c87564a5cda39a76bdecf0c06d7c890a85dd799c450bc07b8b882a800d51214143e3febb7ae04ff394a67b5da9ae62b9428f1e7566ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8eb73caf07fe1ceeb73de61ea03090
SHA171d6896bdbc1e2f31a4b1f645adef855eff1c5dd
SHA2563f03ba6b1e47c00060a14fe80cfd351590409c13a26adbc748899a7953d0be7f
SHA512c82b9d08bad0e54cc7363bc08fa5097a842e5e7d0dfcc9771f4466cb5bc9ed23dcde873dace14359b39b5b22dc2e0636e4d4c43f39be312bf7bafaeeae800759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36cf66f96e0f1a398abaea00dbaeceb
SHA14a5bba01c3d7d44db1bf37953a3b575f38b8c6aa
SHA256a51832ebf1245b0cde8bd9743773c7b2299a25c1ecb263560d0670bfdf04895f
SHA512a783d7f8035f4866f820b22624565c79748a7feb27077113229afddab5a31f6edc6aba49b24a16c9ffba6983e8ad1e5767812f1fa18bc97f8834391557890951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07cbe02b51af56b923b226b80deabb1
SHA10d88d92f48ca7ebc999fc75bbc42e7cb9fe1edf2
SHA256c4cf65fea5c6d385f154a439f58d4ab1e820f5d0018860b92935ef39e472d45d
SHA5122632f62f10c5264b9ed549e235ab52cee24f4dc954944ab16bc3335f22bfa8b06dd6f15cf1eb697fb8af4996fda7d4828f7ac5248455a5e694afb2a96742b984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5fa452dd1250bc07e410fc90176b3b
SHA12f8d748fb93c325e50a891d2d178b097e83ddb68
SHA256621fb8fc436c396852ac487cd9f13801802ce8a55439cf524b04c68b70fd19b4
SHA512b49019ca8b37162f47865cad2dda5ef33304519f98dbe11e755644b22b87839e18a47b0bac5cb65510602ebdfbeb2e07a8cb17874eab5be6db2b01d676c3a7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa17110033403193932227ca4428711
SHA1ba94adece2d943c9ad2e7c9e96c09bf620b22104
SHA256fb00803aff90157ea0379fe96c174e79f3c344d07296b8cbcec180f1e16e437f
SHA512c9dbaad3444e01635a303b9d4b1c6bc27eadc1ba5e73ce4f7bb4551d13f466524ba49cedb1a1c37c3005feca522947406b545c503fb0c7549c770f87a43f9f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d2a24a013cd0ffcdeac483afeb4b5a
SHA1936bb9ae66c6e084807144b51b4b7379022858de
SHA256e9b09d217e1d1fc91c3b9c801da12b01d66451e267c0dec50d7385bc1d034de1
SHA5121e24bd4b7ddd53eaf262463ddc1334392fcff05d2d5db34d7e6c1d76cac8dac362131c275d7e4cc4e48b3b39bc241721fe4cbdde12317c1c1540d1b65dd38f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580188564ea56b0ae7c68dbe78bf187fd
SHA11c87ce4d25ea8495f993c3c4bb946ce387f9be2f
SHA256d12aab08ec752905ad4b3582e78d6e2f0a9b7305ac7be946fa3eed9bf451e0ee
SHA512407561a4ce99b91c59f92b6b9f2084b02db5861ff708e3e1714bfdaa73b62fe7e85badaeafd66b6803365c9b980ce2f8bc4b3ce8879815cb97041592eb510bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51733623d603706744d5d14f13b785ea4
SHA1b4c6c331efd0b9498e2800745671095440148b6d
SHA256b6828ad75669071a64a9639cb02b64e83fcea7bbe2afff194f5d5a5df75a0d93
SHA512841c19ba32a5f3dcb83e87bdcc6fed65c75a27f07ea65a81fde1c697d124e3288182a95f7df9b676545f9bc6e4b45820b664d2e7488780aa651e465b0b57e9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13f3e47f26448b84ed807107cd02394
SHA1614910ecca62d59f580f70e9c85cce20dd329973
SHA25697505193f29625fc278e9c860c9a9029509197ed8bdd9f6076743ca212db29bd
SHA5124afe41b4af89dfd61e18c9b8262266f35666951f39c91f659ffbee774d2d29c9487ab17768b6e4f86177d5146c15ec9006455205302b535d4aef9c2816862b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40e1c920179b683c9fac9baeb8b0efe
SHA1ec282a4f6684dd5b02f38b3391bc190a7401cf4b
SHA256811605f19d0c95366da79851b0a62986c83a29e55f49849bcb36f74ec0cbcd24
SHA512cc6ece2aa92930bb115596475f9955625f3553223f4e4e6543fceca25619889e34a7fadb09896ce7b5b74f8267d6a3dcd795bea9ff1ff2dab7ee8afa19da4a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca07b0d5e16c6f11a7b93db073fbb13
SHA1ee514a6e7ebecb13a4f062d22cf673b98e3e1661
SHA256b2b794ac43893c58cf3d530b4cbea16be35a1d71b0d32bbab163392ffebb8ba1
SHA51249a6899158ec4430ac6d01640a972a651b5fda9da1b8ee437c8df24e2e36902b16a8394872c37fb21c221291289d41c2f10613b3c1ec3497f4f25f41583bcd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57692cba47942dcd0be68859c77fc109b
SHA1d99da6350ca63b3a0575729ece3a0cd213cc7da6
SHA2562fc60aaefccfe86c0f53699f54f0728e99967cb26f5814f6ad2965ca5fad8260
SHA51265fe1892d727afcdfdae0c04d4a598869b868d98e15b17372b85ba04e37cb954d74f031952367c07c55f10022a1f0c37ff3108c09c180f75b0b7af1e647bc4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2e09a83aef8b77e0147f802ee42aa0
SHA19249f430798fb2da506a41e8514855de7d6b7535
SHA25612d40396d2a7fe10052c396aafee1a1958195638d8b0345d9ef32a2b507b1b09
SHA51229b76bf69dfadfd5fc5c6ad39bc1c7f72987878bc9c385302b84d99b3544b930a2dacf73c7462f15e3f2963e2399ed999d8436bbd9059d87b1fd5a644d97fb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37a235968ed79c2268a7516cd1fc668
SHA16690d9e650dbeb7e6d1ee41fc5c38e1953207e64
SHA2564c1cc7bb8dbf12ea73236574103826607beec1862e63c6fa4f63e186808cffb2
SHA51210fe2170517383e0f3f874491edcf0d151e52267e3ef50fc685eefeb5e097e702a47b80ff8aee3d2a843a4bcaa0c1f5c39e7086f210cb689160f447507ba4ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53484bef781ee4db337d3e69e473207df
SHA12163dcd01ea0b41fa69832b5de849cb6b2159307
SHA25609bd0ab8b9c067b4c42822bcf83248e66554353e6225814f41065fa6fb90df78
SHA5121833cc4ea702749ca0d121d1447bac49ce8b28633a931e9f115f80b4a786386551bd5cb9875f57d51ba6a833daae7a47f74dec6e53a81024a4ed8d4bccc75f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2af54147b77f58ef5ec245ef4447475
SHA12e2298e5516ff95017ef4ec6812ddb3cab4c2e65
SHA25660d5167f6d1d9504ca1414ca273ad29530871030cf2945fe9799bda32bc56967
SHA512777c1f2e9c2dc1eb7b50abc9d8b7527fb5a68ac76783b4316b8a0b5076f5c9bf3bd8e7de986b64394eddaf3d24b01e48a1c3059970d91f7b77a1c8ce11f46959
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b