Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
11/08/2024, 21:28
240811-1btcnaygrj 311/08/2024, 13:53
240811-q62x6swgla 311/08/2024, 13:52
240811-q6pmvawgkc 320/07/2024, 19:16
240720-xyvx8awcnb 120/07/2024, 19:14
240720-xx5q2awclf 120/07/2024, 19:11
240720-xwd7pawcjh 120/07/2024, 19:09
240720-xtxk9axern 120/07/2024, 19:08
240720-xtfmqsxeql 6Analysis
-
max time kernel
118s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
c12.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c12.html
Resource
win10v2004-20240802-en
General
-
Target
c12.html
-
Size
7KB
-
MD5
ed05d5b3d7de3d798bf68dfa44fa4aca
-
SHA1
8b93622287614b48dff54351aa6f956a6c670b73
-
SHA256
daae07490831bceddafde61b3a1829043648e5ca24778b4a69ffab9829fd97de
-
SHA512
d256bb6ac71c7d82f31c6d1e5c13536ec9c81ddb3c5060c017240be3ddf2a3f9a966924add381fcb2af26561dd04c7b593548b6fb271ad52c0c477a0086361d6
-
SSDEEP
192:xosfzn2lcWYAA6Si6SP6g+6k12045Tw8R2:xosfSlYY8b2k12j5Tw8R2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b511f3f5ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000a7d769d0ebf2932b38b1f8c0cdec533dd9f13bbbfd1a7300e6cbaba1c231f0d9000000000e80000000020000200000002ea81e18787ff843086d90f5ff909c318e110ae3115a8b656cbaad9c50d7d7282000000051d5709bf3ada6cb5675b6b0adee1ac3604a344b91960a72a55e6df4a067972e4000000008b525953fad106c5560a6bf53f7ac806c1401d21c045420d0f27e90fd2f4d28f4e4cc37959af24259d982aa683e244e9a994f48d200c0ce2cf014a907a613b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E8D6491-57E9-11EF-9FC9-7AEB201C29E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429546304" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1684 2352 iexplore.exe 30 PID 2352 wrote to memory of 1684 2352 iexplore.exe 30 PID 2352 wrote to memory of 1684 2352 iexplore.exe 30 PID 2352 wrote to memory of 1684 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c12.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58360b4493e7d28b97fde1c557dbea98f
SHA1899e07e2efd106c070fbb80ba7cb98406aaea441
SHA256dadd0c7ee5fceee29a9829fdb3191b466f5638e721c65d2240d485579ff48f05
SHA51210f0dc6a77042d158ad65db486b158e20437307c8faf4d4ec1c351c1394484022b374f08a6add82871e4adeb9c016331691b3f54c3467f724ef8fdbd440eb559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210f4f6faf2f25818d66f07f9a917e9b
SHA14b83a794ecfb2655213670c846c3e430baf24870
SHA256b066cf212c2e6d27ceaef5a45e6a0d4de79c50f7da4adcdc193ea1d67b276279
SHA512c5d49d2f34d5b0fbd16ac324f21de77fdb59416dbd22183d4bebadd391d8a10db778379e70aa732b76a25f960f983e2bd711cb09554932a70459d5ba7c4628f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac934d57a7f4d0cfab2c8dfad8f729e2
SHA1e94c46e2fe05a7d9f3baed672efbbdbae775b1ec
SHA256ade431e9bee438d44d5c2a5ca308e6a88fe71f8eeef484a3c8d5d4ef24e4ab14
SHA512884c32ce037947c3b669d43f1dd335c5baa015dadcdc741017e7fc9f4de169f2a0767a8f208023c3f4a1471f9bf9728ad3ec0674f3f53f504bd144b0517cd22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d83a1b6741aecdf0e0c41422cfb4a9
SHA1c4b2f86a533bd94eebb37e523147d8cf917ee9b6
SHA256742abf53cad0dd2572cde4eece32f9744446f7561ef8520666f59a60671c5e65
SHA5126ed7848ff374d16a2feeebe7f1c8fb4430ab0b710455dd1fb191e1bd7efecbe13b5d3b519a5a755558b15f49c6be69ed552e6f1ede521c60c1ef0eccd594e59e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290112abfa2314d8b037a26996dafea3
SHA1cdfad097c7c763a4922965b0efd31fd699d47e9e
SHA25605955a45cfbceb15d32bc4fd76568cd1eb0fb05f041007466fff281dde86a57a
SHA5129d6f50e700f528fcb6e92f23cd81a48b673144490edba871bde51566e341f912ea73396a86c5ce17f5c8570e97bfe8e2de78c0bacefbf89c89ecac227fd006af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b644f5db090562c82d0f6e9bac16064a
SHA103655f0789d654e4e4f962c933bf40c1dbeeacf1
SHA2566cc94f79567580a72e1c299d5d05b0227a1b355a8ce1207799b717c1da21b3b7
SHA5125ac7bf2f9e41e00743183cb5ca4f38c66c68fa6dfe9fc4febf8a8716d60a40af6cfb670618ca50d697b9daf8b021caa5347af9f7ced1974b355f086d6fe7f469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6041117edd47187d0b20b4cd993cc10
SHA1b056fba8306d3d26219e8d471e6852d97dd699fc
SHA256a882fe469d50943c1b85f7f21abdf70b369d6a63429188b2b54f8a1534aea9a8
SHA512fc731cbc5410d6cf7ce440538319614e6e192418573b1da96c420c09b78bc5e3f0dc52fa8b50198547aa1c5dd2d9fed82696a76b072df7e1e201822bd66d1140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534946b3ba318bca220cbfa28e1b45aeb
SHA1e77301ecda84663fe43f7c45267cfe4b89c4e429
SHA25617f7b1aa3745edf82257826cfef29ff8eb7ad1c14d21614f4fe15fbc59396da4
SHA512bb086e073358e3183641aa4dd0bca8ae0461a0bd4d089d5dec111563482eb31f4b781f89a97d73c80911d239be3cde38c04c5ec4815a1dfa8dbf02f6667322e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdaf02a0135847f8735054cab1f259e1
SHA18cf88f981b9e512736554ee1d0e4255453954467
SHA25632a04003e554a14cb66193b6cea232c9768f3084632500add7f2b3ac4731d39b
SHA51253e73267217ce02a59dce3c7e3f4b88d6e1b28e06feba22f2a68616dee423d8a14beacb7d6a3bbc9bc125091f911dcceb654df6cfccb6e587c92b9cbd58302e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4ca9caf05199d39b3e511a5bc193df
SHA1a9abd5d77d7ef14bef87d37a9551c2251c614ae4
SHA2561ae9d36ea53684452fa9c1150ba502d0fb0a465ba1ab0dabc983aa9390b14f33
SHA512395d5e167fcd14baeb60595f4e3d8b25ef88fbf279e55a9fcf194530c672057f2c66fb2d5391b4247a1e6302c6b83c69584a38b54d1f7f5c0cfc5163a6d85e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbad0e3edf70daf49af3493f4c0bf782
SHA1d87d8579f9cb7f403e3b131962dbd3de9e61e9f1
SHA256fe9139aaf4e4d97908535d61ef31cfd66245c72e4f616d0686dd12462bb3e1b0
SHA51242a7b90399a2a88a0ff99d34f2ce7286f8426c115aa6680cb8d8d7f5b6170b0ac503d89321d1cff815f8c4492a272b6a3583e44f844e1fba676d3ad303ceb81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5950082042527ff1372902869ca1c0b06
SHA127761e579c235f1586a4c299f8da98eb9f117fb9
SHA2562fed69843bdaae07aa5f62518d6bc647c023bb29214afe79ab40209cb7ca5dcd
SHA51280e112dd70f068bae49fb6a3877836afc3f1b2a5f9a412805ac5473c8544947b2346e1060fa46f8782bc85b30535913b84b44db8d96014c9c7cdaa3344cb728f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e779eaf05dd81d69338f714b70b22d0
SHA1dd07c53bd377c10cc1f203404e8c03909f83a9cd
SHA256847092eb9dda6089b429eeb19e2ad859752a19d6d354e7d1a20f6698a9882784
SHA51217508d19489d1e3dd0d2fb038c24b1befdf5fd20ec7fd73dbf897962d8ca55f3e7159a1b07a18932eedfb4c4de1cb7187ce97a1bf2a4ee74660b28ff22c7e948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33a69f1d4b49b5a1580c59d5166a8cc
SHA18e18579016fddafce24e76f4b77b7573b6e0e35b
SHA25693b5dd27929543d8caffa27c9f4725d1b263c6dff0422ca7775727aeb2290cd4
SHA512ae4abe299b3cc007d9edbbc8125e74fd8a144c156f110481fb09785605161fd4524dc1c44acbd469b9f5e86f827b887117f9c2abd297f7d76c9296e7a1e520e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065c70cd4b6943b372af7696d7d5597a
SHA1d16f516668c0e98a094069426c3e3f516012edf5
SHA2565bd47e39df58f0d4305996d9a6b0ea3fe13e510ac01817799e910968c81f8459
SHA51277ac118322297bf549294da589975f6e0e1dd67c3ae383d55280c37d777dbc32352b14852a2034bccf0f22e3517aa79316fd2a45761dfa90b1cde9acb1cd2f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57516753b2bbda20ea33d900a8fcdd944
SHA1d949f76c7aaa1aa75968e3e3c8313e6c3993317e
SHA25655f1ed7f4e38e9bf0778d96044f4f05455ac451b90495c23c88c4f458bdd2a93
SHA512d33d0bd95c5c61d66866faac3158f2cf39a87def0d43a988199891a2e61d3f06d9abf788004b6fbea1048e0ebf0be14774b61224fc52f88b93e728fcdd24f878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669174342191f005d3a958412e40c42e
SHA11caf081f42e789f8ca313d62e2092ad00022c245
SHA256b57e7452e5a8a712a69617817ebdbc815829eb61242c7a29de526454bc8e287c
SHA512ad9b572b0994dea629d62ab2719b801e91d4f13e5cf2f00f3a02adf319a1568eda1d15a89de0f5985174b789697a594d02a8dd328fb14e0e58b0bf94c80b601b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b