Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1563s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 16:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hi
Resource
win7-20240729-en
General
-
Target
http://hi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{173AE7E1-5D97-11EF-8F8D-F6F033B50202} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ee00efa3f1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000033ec6934c0a1d56da1e59590b576fbd3c45c74acd7e9fe89e68b81555180d56f000000000e8000000002000020000000525a27e51bd52213eb1206dc1a3a1b4dd6f9a7e3bd1cbf513e844bddac72f1ac200000007e449a0b85a9b3f529e325557b4e6605458404fc9d807f49d5c5967d06c3e361400000007ef16249c34e40dc9cfb11af19eb812117469e869d928329ea5ac963f1d09c97f22374e6fbb4efd5cb572602f52883773e13329b64176732eafd82577d8d97b5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430170765" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2220 2604 iexplore.exe 30 PID 2604 wrote to memory of 2220 2604 iexplore.exe 30 PID 2604 wrote to memory of 2220 2604 iexplore.exe 30 PID 2604 wrote to memory of 2220 2604 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://hi1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52759cd627f87729c3923d98e232b993f
SHA14c60e718685e740016a2378ac29085caa1948f8a
SHA256ac0ddb173ec7a88afec0b2a9e78f03caf22a86d8085a9a11e917d43a615b3973
SHA5121df1a4f2673252f7247afa222f1e5d11446c48daa37d14529d61faa414abcccf41fd4e59a0d9eb30de1fdce93532f8e0c30752b1fc7bd0db11f892a75c516e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f5d3d5bbcf226061eb72c861854d7b
SHA1c18cd5643e67d70e5094c1cbaa79791f8b826f54
SHA2560353e9218441603e6cc627911c96e051488430e78a1e2b18c306e664a1656c74
SHA5128107aa1ab1be3d0884ac9e082e37128edc0f3562e6faf25733709c1a7a2ae500b0bd66918393518649df690dd4b1a08839896c4061a4309db7b065e5aa1dc37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d133bed5ea17a404915b435c1b2437
SHA177163f1a84e514906aafb4ee070ab2ba96174ab4
SHA256b28004873db3187062350de6f95257e6c850ea164e54c3e7ea3f7ac1d3ad5c0a
SHA51287a3eed4342feb9585e678b8d5860d8d7976266c02ecabd3881d310401b1c237b714ae503c904444288315532468ef5b58af99db823392c78687ad54de0a3e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827d07a195bda8774a89ae79cc62e7ce
SHA189573c7d0ef6da09db9a44c483119bf8bba59dde
SHA256a3dd8550b93d3a301d5ac80b8ca77e99a03b9808e40871ad0b4e8c76bc66fb27
SHA5120e450c5310df47d29e61dd603b32922b369e67e36b2698e04cfc28d458166e7fbd05a47a713ff96564d0ddd3e51dbad3784cc2dfecfffd15ef2d3a879de1cbd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cca2e292fc34d10ff9d500451d07d0
SHA100146a1ef7b0c8200c74835ae8333904856ee97c
SHA256f13648766006ba3b823d678cf642df80756c834367c1aa4bb0049c7895ebe0dc
SHA51283f9a4dbca962d5e9b11de00a835d64ce63a0fbd16716bec2f730607d6d4800c66fc9f9b7f15cb4edc97ff0a7c2c751d486d07e430e6a5e4e80c414400162d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af6069baf399062ac50532315147e40
SHA189f24013646b024804a96f582846dca18c895c5b
SHA2563e2ff9f5fd5762b0a31096e3fa36a0ba10280740cd30b7c1f22f4f678b7f0427
SHA512e26db9fb5a58da1402e5d91dc3b4d66d74bb5b292d9376f49e33dbe54e1520cc5381b8de13e0515dce0a702344f00b80f42ad100d9877cbc8b9c170c5961d19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70923f7fc8096302cdff9640b652899
SHA1a4404df6b5df66124e3e7f0f880619657aebe797
SHA25615dcf618e9181ea432e0ed477af66ee930b2b42ced1edf88e40d9e78aa6b87b4
SHA512702c662335d3de3f2d9779e427ca82797eeb779194f8ef3b95977ad0d8433e3229e1585696ab6bcc0fbb00401e266254ea5d4be057c42b6597c52ac5f82ba163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e57ef26f1fa0b4faae921ee935a26f
SHA12f1f543d2b820491457820a943f1fb43f1bbb107
SHA2568f033e976ff5afec8bab41a03676062576dad46b162e49db0ae2f47b4cda6fe3
SHA5122bd7e13376059323c74bee9a7c26990327fbb351ffe2e356eb79faee4cfe8f5a41774bb43e4f997e23e9e14054fe017f8400875386f7f2d02bfa82cdc8a90a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6168c4f425d58372b1644deae36ed3a
SHA1979d845a582944c2c3a329565f630421281e0a89
SHA2569682289807416ff4000489208753fa8af4d70b9a49a1a771ca9b2050fc24e0bb
SHA51215b54c8da9db4453eede22919e04ee02d7a8403118db806ae4cc40108f5fcbdd16b86676fd110a88f63db6a965b6e4c23ab312975f2410b4cbc498b23a69adbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3db68741680d5e6adde7939db361933
SHA155f6a0268799b21b7ddc42411cac6800d4174d97
SHA256d4d24f69042c01861341b2fc9811f0f89e9520e5e81b9ede7e3f46a29be352da
SHA512b8b8e3c1a9154ae69869aaac15a95b851062b5f26e4028946d3b97700d43bb922027de95b91c2b0951f8a6c8cf908f4b04e8dc7829188ea0190b4b234ae5a85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79510e54ac6d401bc076a397da6d66e
SHA1625f9227d523a20a2639d2d92cfe3f23aa83d6cc
SHA256ba69bf83881285934584fc57a783f1a918d3c0f27d0d9da4a1fc6cc44ea42361
SHA512819d12b3e58e95baa7fc647cb08d8310a3f9ea9f5168f8ed6157afa0e7a8e96b2add96c327a99f0228744f1ffa6a036ec47b98444eb143def6b7e30aa3f6a9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e700b24ec5af0cff84de7c801bd219f4
SHA1d690fc83cb081fc65db43232e92252b260caaab4
SHA256ba06f1d31064c6ff6e2823184470dd3039ac8dc4594050516a6baa42505e3c2d
SHA512c010af2c27f7526df3023f47679e2126d96f6db2e63e522ebfda00093105032600615586fa67e4e1f7324405507881f1464814651ee24a8d748a5bf067c1a60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d752dfe967401e01ec7c56e99a960fc
SHA1f057b25296da7fa9f1b4b226ea87198142368555
SHA256098647e1e2a283d80d26a54b980bbb831843d192a47e80b64dd85d2c36cecdfd
SHA5124ef9a707677e8708ca67ca5883cd17e319ff871f0276face76262e65ff94fba7a10085415f36ff576a8e571b0df418fa2ce22c3a13f83fd08b34a92e5d6ffd16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de07cedc2b66a5a46da76daef3f3e4b7
SHA158ea9b2dbd94bbe93ad97468cf485ca20d051d26
SHA256084ea66e3937de0d1b36bb681775d68dfa4bad7e8b1e65d5dd96a3e9aca90200
SHA51200c655eb133cc4aaa499fa548fdbc7425bc54c330422fa4b4d5a8bc8d1434aa310f04e892746a01b7e80ce17600545f9c211e6b57d2d5895a662cc8222c6ca34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559678d33b7dab5cf0c4ae5befa3474dc
SHA1c2f291c0a1acba822beae80f8a3300549a9f1b84
SHA256b5b04ec44ab0944fc6b8d7adece6aee5d097b53cfc998c6819fd674b79598969
SHA512416e90b6c6d5b14f357350c64c1ad1c62e6e100ee3b74cec2b9ba4be09077d09d096b252f03086d605013f91c7994169b926c179d5026e2a102025c5ec0dc5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0dca48791ad10c791f3fd9c9178b1c
SHA1db4da85990c9172b36c6129fe979efe9061c8aa1
SHA256ba3707595b109042ac5ba4058207126b5ec70d3300c05c1b77b39ee00871acdd
SHA5121fb67df2d5413e1e750d0e6f7b9f3955a2fd1ef1aef30772f6391619224f5b1a6e1ed638b58b32261d835439757957ac3cc06472a1ae7f0648636d1ad9c7ecab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593f80a868806a748206e9897c4fab4bb
SHA1dfe660a966d688debfe993fd9bb0d1c87f72fc3a
SHA256b86b820457668d6d671b3bafd5782baf5b1451390aae6dac2502f5b7b21a6e7f
SHA512a3df3b4acad2e5894476a521d86b2b4ad89c9614b22861d84fdf7405ac9add996a51ce8a68d50e3b08f1f265bf116b256ebdb8d54a7bb38f142533c75034d9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd3930900683777b69cef4d6b0610e1
SHA1e9453e5f9bdfbf533fb7452e289ee15a2b282164
SHA256802dec3fd52d840167d2a980eac9cfb851a9b160bfa3c6083e1f76ac4a0d6ab1
SHA512d4348766c41456d9ef17293facc830a8620d805a6adc8c857fe2f1610eb2b1f28ce8eb142a24793695ccfde433892faf94a1b55bd8d5e3fdc466f9503c85bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb8d6c1a20b78c8a0b144766467a03e
SHA1e7021a96ccef59cb041f387a5bf4c000318bffb4
SHA25614afa57692b214bf3248548e989a788a1a7db7de2ce6f4fd22078ac6f6bb26f7
SHA512ebd3c4e32136b9edfc2bb3566be3f1146ec68c67b4be00e7ea2c62516037aa49971d6206cab533f61abed389ed71a1279c927ab2bb80fa61825c24f4f2b4f459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df034e482ad4d4c1f00bffbc8beb1c7
SHA129fc64686509e6557f6c8d060453a51e362ba19b
SHA25617712708842aa1ead6d702199e40ca88593bfd58c49e46d0cbf881f7e71adf70
SHA512a7c1ca6d373303ba26429bd0b8c0f02595d7863ea16f5c4c5fef56397966be0b59ab25f6dfa616a530ab1f710cd75b916712804dbb7ef8e6fb0f75b77c480a40
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b