Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
206s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
s.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
s.html
Resource
win10v2004-20240802-en
General
-
Target
s.html
-
Size
93KB
-
MD5
89cc26b334b55a5bc41b5a05212e4fdd
-
SHA1
c4f8ea88b3657abf7d920cf865270c127050c6e1
-
SHA256
a22c059e81e26a14920c0c3acc551626e825002c019825851954a1d1d824e155
-
SHA512
0eb123d45e82656bade92183d48235eb38b7e8aaad6411c17301f3f621401f9388cbbdfbb810a640a0d389d6c11f59167968c1fb72ce8ebe49a64dc195efabb7
-
SSDEEP
1536:xHFSWp4Hu0GqdPcgncjjH0GhBYaL8APizoV9dSywhyd5vfikUo5gWVBYvri7:xHOHPnyHbhBYaoA6y94ad5vak3nAri7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000881b0451bb6e40d76c375c2f0eec2960dc8aa33f76da322be7e19fa047fa489a000000000e8000000002000020000000e52cf1f75669eb6acad1647a45291f37ebaf5fbba7c512e2147ff054e1220b98200000008cadb69237a07740ac8bf3212ba85cd61811417e480fc095de3918c10d424c0240000000c43ec7a33f65b65a885912de463b29684b1bf1287e67d3e8288e19bb3e6f899b1802f5898da82599adfd5dd2a35ef546613ec5868d8c39f24c12ac1ae7baafdf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17D878A1-578B-11EF-8470-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8028abec97ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429505918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2720 2820 iexplore.exe 30 PID 2820 wrote to memory of 2720 2820 iexplore.exe 30 PID 2820 wrote to memory of 2720 2820 iexplore.exe 30 PID 2820 wrote to memory of 2720 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\s.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5de2a339f8b37aaaffde464872dbb9479
SHA1625c087d8d1f46943665d5187d9a4d1dae3aa401
SHA2560607d515727fd1064a5fa6edc30c64b7e2e36ec83857383179805bd70e7c569d
SHA512560967c43a40c861658bf53e7b416609ea9c75ddf3cc75fc68cdec479a97d9c1198142f7ed7ee61435c082bb32bbfac33f800e7a90097b0a858c6fa5455adb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982157cd6a1f76cc5e8e1dec2294af51
SHA1e1a65bfc35671ae4b1f936b6d4e69662ebbea73e
SHA2563c5bfdee89f2ff50fd3e04eebfeee6538554b40271c15fdc40f04bfbea45b3d9
SHA512fcbcdf6bd1fc556c63e50dff6ff1447594e0adc6f9778c7eeede83b95f1e596d21f236a0426d231fb0208ce8654f94dd7b402f5dcce46f9e95b0b66c87782e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be2e3cdbaf137847ce0a2f3cf01b4de
SHA1e75eeb29c4e38b84294f2baae44dabe6670d14d9
SHA256a0e5613f97a25cbb11891c3f062ccaa9ebc2c51da03c6f04929e357973175b59
SHA512e6197ea002052a1ba36b2f48642cf4ef47aeaf4ad56f19e37c1b7412386945beb0a4c3c57f71e1c92173e4c75c3062602f968ffb77c04c271a66b4ba0461378a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8cd411fb95db0f8152906ba7e9e829f
SHA11646de404ee6e3c05e4d41581d0af4933bed4154
SHA256ccad0af2e27cfb4c9c74ce3f3359e34152ebafdc9cfa0c0a6387e0d92d6ddab7
SHA512df1a2dcfcb0ac3e29c184fffe9670242cdb4223cd50e120b39ba5785ab57800a159c809fc3f8180a44a364cf7425c312db4d5f119506b8d9ab4b1340480273bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36f2960f1564ed29c9fbf5ebd1059b3
SHA104448b87a8a2d6883cd91bb63231b04f8308a318
SHA2563b25da6f4ec1eeb02dc3e719be934f4817308f2f43cde455bb8af2c6398168fc
SHA51221add1a29152e5f8820ae55922f8474c5f008ae76e6471757eb8d41856590ebce77e7b2a0152fe5b22f7bfc5d342f93390dbce7eddc8efde9db09580f7ed8260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e157a815519b0473de77a0b3dec877
SHA1cd6ccb27f38e15fc4ce650aafc10764611bc15c4
SHA256a5070b3e8c8399f5a5f60669b5a29f4e79a754e3b240d326c7a59703e077da89
SHA5122ee45440cb023a5323a5d0d1b960b4101394a07cf37f53a61fd525993ab5d0457a5feb901156fee659703efccfb8dda79aca4219c297e5b66757be4bc09fb89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51941a5dba22573208fe72c0a0cd6f88c
SHA1e41e1c269e7708cb48790d634f018b4914e25b48
SHA256fc55479c67f15ea7dfe8394baabe1b0ba2bdca80fdd51580eb7cfa61b4d92a30
SHA512b27b1c5510142aeae85b9483360b1485853ee3386581cc13862dbbef92c6a06505993c9129158a36aa4521e4d558095dcbc50e045d16dde8ef523db0537822a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c5a143402703d26783db3cbb3d394a
SHA1fe2fcf31d050c65a70f4a98dd1b016e62ab361da
SHA25617ed4287855cb3c15df12dff81661f91e6403c53483d419ea136cacf741e4418
SHA512b24604c2d991c52ff6c2a67b012034a8298b928c3681a69ce8b0639f820dfe4fb294090bab9aa3a215c2b740708f7bf21caa03a3aae0f76df67680f37beb0935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ef195ccdde44801f206b2eb7b5c2b7
SHA15995fc9984730c0f254c0dd58f7d179d23820a32
SHA25665188b4e582c3f31ba9e30df2ac4607bac1dc1ee77b8831807c265bbb33ca452
SHA51233718b48d33abbffaca6efd15794dc283f050c73c9cfce667c320b4e37f251774feaaedede009659bee82ce831e15b19fddce2439fdbb74a001b44ff65e8a0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ac85f93ed795d2c9734d8123e0630a
SHA1ec2791e510a80a5a99cfec0bc852dad05f083524
SHA256d3da200870e8a348e1a5c2962264470be547d4cf487b664440a5e0c346ee6bfb
SHA512b1156d85bc2c645c099a1470c5f5933e4f5020aee60ab8c21a01f108fdb5f278b5233df1b25530367a09af86eb6446109437086f9ec8263016c1875cbb0265dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4b1986abb90330e16664ab9e3ea974
SHA1ed444035ff688f507c386d6ef4a657b8288eedec
SHA256f38cf879e138eb50048ea4bc669afacede612baaf3ab03b08917ad733a632ae3
SHA512f5683ae09eac38a9e6fb0c25ffc46fb4e40415ec937943e5ec18566d3f76af13651d0ae2defd00fbf9384d998da99e4170c46ef4b02b9d5dfa6a0aed5f11f7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699d3769d0376eb8d38195db3afa91c5
SHA1d7766f85ef60d087ae9350835f3b18d552bf41f5
SHA2561ea496139af061b118dfa421dcbcbbce77c6f609393d951899dcb99baa4378f3
SHA512f50665cc88c6d09b57e09ce569d478bfafb0749a6f38a80b64c7c7b16f56e9f88ff8eccd9a3ba7359fc1c6dfaaf02c60caf29ff79f9becb2c43f351de0decac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f2c1bb7df1903fe780643a8c1a6274
SHA167711182055d5429c92ac856c71a72c2a79feaf9
SHA256bcadae40d37a2af9ff90831177ac572de500387766001df75982c91543a0b01e
SHA51247c49645ab81f864d4a99f47fe0f0d95cb38655b5e09aaa50af5372efb5935ac55ed4174875ec66015d46c2d5e8bf764fca0922a5c56f48027d8d28b90eb5a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4518ec537341603243534aa537d771
SHA15a412b7c23b0b41cae2575d4e220de33b38faa03
SHA2568631c36f8e483dca4e8fe63ce91bf69d48bd4030289e94f243659ae84068c47f
SHA512f86d8b33d18fe299e9eaa09e4117fbcfefcc1c0d9c447171503750edf28310edcc216a97fe6c58fe15d02dd1b37cc997f14e0aad666f409fe9c68202092ccb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526710aec07a6385dff877cf272bfc337
SHA15254b64e151900f775f45265c5e25859f00b4576
SHA25670c9173923888be7a8ab4d461b2d7a0aa225e3ee8c7eecd57395128436db7046
SHA51268b283c0a4aee5ff8668bb22c900183df301581ee1147bc1b77467ce4582f1d4e02dc4ce3d93b284820570d67bcfea69239064ff934552a1b34a39ce2203afd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518677302617c85b7af3446843d6f9104
SHA1e61dfb3dc5262659a597dc8026030d185ed4c72c
SHA256ceaaf369ac16c35f0179bb5203c3c4e66afc11023a34b02d5d584020f036d18d
SHA5126fafd21d53bd282d676b503e5142bba6ff8352012b1c0e5a47683957a1ef7697db8ba9a3b98ec5a6273a7aa621ca33e2f3ef720505f325028388feab0e214e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c5138788d54675ee4496dc823afdee56
SHA139f78237037d1e96da3277549a3472dff59d3408
SHA256c68d92272e07c6b4ded17cbd83a975ef696570c3bc2f43b54ba3d104e90e0e7a
SHA5127c6080d4972245f45b95a8fad39f7b41948a6d87e5d6bfda99b231f87924ed94bdc4cfc8cfa2d71663f5c40e16c6d42bf2eb74f898d21a76926dcb72ea86bbf9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b