Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
tAFwIMv7bee3wuz1m0KsNCK8uzWQBeWF6Ot1gl8O.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
tAFwIMv7bee3wuz1m0KsNCK8uzWQBeWF6Ot1gl8O.html
Resource
win10v2004-20240802-en
General
-
Target
tAFwIMv7bee3wuz1m0KsNCK8uzWQBeWF6Ot1gl8O.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000000ceeedd602eb0794e50cc8d29365b067b8535f1138f07d45e9b1cc04e72590fb000000000e8000000002000020000000d09fc7ad3820e5f2316de6056a96768daf2149f4d4a1f727f296a3fd99b1aadf20000000d03ae5dd423b10b428d4e8778492ead57447483e6cdbf1f964cea42406d41c8d40000000ed4130bfc7bfd9a0079dba599c1d4dcd6643851c07eff22e0fc405090d51df0df87d915167ba30995bd96d6a8b2529edbe59337c34cbb89c6079ab0c58b13a92 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9D14841-5334-11EF-BF59-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429029007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90374a8e41e7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1948 2340 iexplore.exe 30 PID 2340 wrote to memory of 1948 2340 iexplore.exe 30 PID 2340 wrote to memory of 1948 2340 iexplore.exe 30 PID 2340 wrote to memory of 1948 2340 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\tAFwIMv7bee3wuz1m0KsNCK8uzWQBeWF6Ot1gl8O.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542eae5c271dbb1e3467be342b6dc23e4
SHA1664a017ae32ebf20b5670717ad1405e021cf1050
SHA2565a4aae39d536940721e7967a1e81aba67724dab2aa6fd26c1559cde8268d1bdd
SHA51230b5f8de55a20ba8193bc675bdfce1898c4589c594e46e9d7d03c0baac4c228e6d38c0c4766f40073bed1d5c9b198239fb1349985be28831218d15391d1a0977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d661c210f34de0814680a93cfff07087
SHA1d4f7a7f212be18c26df2e5b7411023d897d06e59
SHA25679af3037e224bbf7421f934f476b95373a7851f60b70393696c17b60ba0df204
SHA5124b8d0afe17fe0adb8950d7be5ac586f9868e711aafac0716c5e611105b20e57b99f94487b9be90f0af1069d350fdff2bb590ca8edb03717b9e5fc8a3c05842c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b73987809b0e48a7a646eebfaa57250
SHA1c4eff9fb2c3fa12ea2832c08bbc3f9b61a399f78
SHA256882a532edbda379be59f72583157bf77e29b12d377ecc29dafa02023489ccce3
SHA512be9a2a5cc7ae9b56dbb01f5fb85995ce40c2110ec25f3ca90e474ccf47bd44dcbc9d23f783b554ad3a74edefdf7849ad5ebdb0fc3ab421b9deab12401bb6472d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ae1c8fdbf74b677331a9e24ca97fc4
SHA1f3adfecae507a881cd5819eb2c207731b57d675a
SHA256d36b3b66458b087b1be1f1cb0bcc773a011d65e84ed563a8a4e8d8c1acdb4b73
SHA512cd154d84772848106705e2b2d4e2df7557dfe3dbc59c83c9c8ddaf3cd35557eb4c17fbbfc41e45a6287064100a1e1c89311f0c8f5363b8cf2c1b152a767aabb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6b68b12c93791af2b9d2689ff63e89
SHA1f5482b5c3c7d936b6b64ad445cbe2821a07b0de7
SHA256f3aba87f9fb442aae4feadb8a19fefba92d7acfd5d1fa495f89b199dc2bed476
SHA512d1c8f92671f64f0f9558e34ed107cf1a25446e83332d106080375f7cd014c6c597dec543c3eebb37c3ff08690c819e19ed987ffa2b01bc159747501b8f98bda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d91e6bb9b825d9f23458c2730b1c2e9
SHA1fdf0064b56f24d76c5c9acd47f0a97b3449bd112
SHA25674b2d747d4b723b1dad65964a1986d28a4ce5ac66afbc4e62108d63b1f2a4fee
SHA512ec48d6ecb7f36e4f3ec0d087108cc4da7679601e999e8266794006e3a3f0c336e4a6064531f1d5e1430881f64fdc2770085d88b4a92a1c1ec0b72286d0e3fe63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc005af43a9209dd3704d9dc9acc8cea
SHA14026de428412eaf3e84d2b94e1246b154f17aa38
SHA2564dd2eb5dca0658d1538aa4e09c378db43a4a24aa685ad8c915af2476674273f2
SHA5129cbf817d5d787a008d72279aa60b972122b251565babe622c36aa9e9dd6ec8e831b1820e17451f4f247549ff2c8b5045ec0faa43fbcb6a98f9eaed42a0fee85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b2a658362e92f32925706c03a5f0ac
SHA13220ea4e3bcdb17091e49938aabd488304eb00e0
SHA256ab5d33ae3ad802f995df42ed875e43384a6f71ed9cf3a381ead67f1ce8a34c88
SHA5127d8840a7fd84e9d22347725571f005193ee875661f955e1cc9339f7c31ffc3396fb75b0b0cea83812f0aef60e850d4c315ebf07884379051a6ea5420aac35234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c3f61ea8fdcb6f0ae252e63252d0fa
SHA1b50edfedf73331de767e9a7b7a449e451621cf85
SHA256f175f4b9917ed2e92c590de201fc49d307c8b91736f3e4211d60804b69982353
SHA512d63d84840d623b59f6352930985919df0d3be9c1e3ff474322890f0f949831349f2eb168435051122350c607650b74e1d670b96f0756ec5369c86d479bdf5d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e992f912b13c3256c0638044beb04a
SHA12dce132c109ccc0410fa31cda5fe28d40813928a
SHA256085f66b953bbf89c3ac49efd229fb268d2cf6e068c3ec893e83b2eaf9fb86db2
SHA512a5776f493907c174ff39cc3a741ae523a9503971717daec2b75be7e768fb3afe444bbe9318e4a2d9fe1d66da6ab4796a9c02896f086c6ad81b2e6dc83aed284d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59100cddfa07dd762bcda4e122c1ab700
SHA17fd5c3066a703c5bfa51cf7334ea45c22891b3f8
SHA25695a3e5169d493df084a5206dcd6085c8a4c8bc8cc4c77b3f30bb29498f2599bd
SHA512ac1286529a30c04ad9f1da9d28d4c9d6f9390d996567b55d09d7be70bc6b298e744668283006f7b8a309931e79161c41e3b3b160b9cfe640f0be2d65b395364e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e730717921662410eef9100b29a1b219
SHA1b2d1f1caf92b77f4af0b13617d8d48cd93d127ec
SHA256f393c8bc23c8c0fe38de62f808fbbafac18d8a28b97895e185f9c4b0702ea1ce
SHA512d915e72d69e918462377f163a99a8f06fd76cffc369295d78c6b012d8503537437971a357cf5e0322a461578709235064a873abe8ee1f173cdadb11d82e819ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e431dc8168da33d37a88f14aa09c28c
SHA1c32dfb4e9a43098bb54d747db3002cf91c5543d0
SHA25644b8e33675c5e659f762f414884be19672716ab4465367ef92a990e5721617d6
SHA512ba8da7df096e7fc374c3edd79add9e8920089ae68d0da9a3b4114437cd17f2fc5b9d0adf7cf17d88b88b28c02ea06985087bd8d51cf0e86e81b156834a65ce41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876c1f37e97d46c425c90008d131239d
SHA17b4a375b6b6c0fbcef07756226701777dd612e58
SHA256ff83b4acd9fe1e771f552b3f63b5b1f0c80ba334b08fd25e5ad0cdfd65b32215
SHA512068dd70137f337b0b724c5951ea6e559701f0c2b0f70685e62f7d6a61784e72c7bce91e58b598b68b0156a357d94cfddd6903ea0f0ff9888c0ed4f45c101ddb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df13735078e4c62f1cc33c1abf2d56cc
SHA112c657919cc858e23872bb71dcb2dc5fafec8717
SHA2567944f34be7ae8b0f6c6cfacd472b59de75a96d90e5c8d8feed973b0c76474814
SHA512be7591131547755bb3f65da6aae03d236e727260626f6669aded3f085fddc200bb810c9343c9053e29cfaf239bc99c69fa3a0de1e2651396aed5a67308927d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7ac6c62967bc71cd86195ac930af72
SHA1f54dd8ba943b7a87dee0ce30ad365893d8f768fe
SHA256bdde5207d40ad4930a8fae7d2ddf194afaa3973c110b51b8e6dc82c34cbbb119
SHA5120df3a97693fb9ff0a8b0815fd08d04da8b8b276e870c963948960ac56eb01b5c22c45aa664956b006d4e1060d8033ee84a4c8eabc15151e1fce3741d791b604b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7115468dda18412c1823e7733ce4e20
SHA175e62c883a9c4bc4f4ad292486deb57f3b19859d
SHA2562b1b53982492ddac2689ebfa6769ac84ba9c7bdcc3fd74f7ea0a1cacdc0a77c0
SHA512c5b6cbac837cbc41b496cfb51972500eb0d557bd7d71bf810e585f883af9d867209e92268ccaf28d0fe596a9618c4f1f84ff5e35f2e672ffec558b34eb3af25d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b