Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3SceneryPremiumV4.zip
windows7-x64
1SceneryPremiumV4.zip
windows10-2004-x64
1PrimaryAssets.json
windows7-x64
3PrimaryAssets.json
windows10-2004-x64
3Scenery.dll
windows7-x64
1Scenery.dll
windows10-2004-x64
1SceneryFN ...er.exe
windows7-x64
3SceneryFN ...er.exe
windows10-2004-x64
10SceneryFN ...config
windows7-x64
3SceneryFN ...config
windows10-2004-x64
3SceneryFN ...er.pdb
windows7-x64
3SceneryFN ...er.pdb
windows10-2004-x64
3Analysis
-
max time kernel
316s -
max time network
321s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
SceneryPremiumV4.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SceneryPremiumV4.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PrimaryAssets.json
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
PrimaryAssets.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Scenery.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Scenery.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SceneryFN Launcher.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
SceneryFN Launcher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SceneryFN Launcher.exe.config
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
SceneryFN Launcher.exe.config
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SceneryFN Launcher.pdb
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
SceneryFN Launcher.pdb
Resource
win10v2004-20240802-en
General
-
Target
SceneryFN Launcher.exe
-
Size
1.6MB
-
MD5
33c468a10d45c4d09d30282aaeb0d543
-
SHA1
e7cb8cb9d4db1bf7c0342f9e5e8ff40cbc8e57da
-
SHA256
8eea98d14907d0b1e73f64998ab88edf18be07e1b9554b6076c4f84f05a42e42
-
SHA512
5f6756c202696a53d3994d76b5f288e60a5497f130d0606afecb82da5ac355d1372c2976997eb96311c80b2d6187ab0dbbe4fa1ee904526959bb123bbf396a0a
-
SSDEEP
49152:z19zp6mePSe6IOu9h57e8RPEkqXfd+/9A9TSanieKd:ZXaSRduz5SoEkqXf0FoSW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000e796268e25ca544a165c52b4fb7d1cb3d689df570bc4975a72917b21db751344000000000e800000000200002000000015627f571bc8b4395b219d1ff39a16161f0c948314f9a2b3efc6f68d8930870820000000af5ff538511f5f295d06be05a50b03090e99bc77a7fd7b3c235a71fcd7a775244000000086eb2f395f6782a172534d6a577278e1a017f7d2198d01455cf288421ae4b9900585ba225d120085e5ad59c804fc504c2ae8dacf0d27d35b60b4c8164e2bd046 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e5eaadddf1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430195570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D85CE4D1-5DD0-11EF-A4F3-F6314D1D8E10} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2396 3068 SceneryFN Launcher.exe 30 PID 3068 wrote to memory of 2396 3068 SceneryFN Launcher.exe 30 PID 3068 wrote to memory of 2396 3068 SceneryFN Launcher.exe 30 PID 2396 wrote to memory of 2752 2396 iexplore.exe 31 PID 2396 wrote to memory of 2752 2396 iexplore.exe 31 PID 2396 wrote to memory of 2752 2396 iexplore.exe 31 PID 2396 wrote to memory of 2752 2396 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SceneryFN Launcher.exe"C:\Users\Admin\AppData\Local\Temp\SceneryFN Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=SceneryFN Launcher.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1febc1f63941c1e941aaa2be8c615a
SHA1d7326db26478b87a2364e54e089f1a8e6be0d679
SHA2563c3661568ccc5ce07ebd51974895d74006ec6929abd0ba44dc62654aa571fe2f
SHA51294fb6737bdfe23d64442268d4c89e93dcb6f0f3b4f1e463c23956937388ad0f6d2db9da8c4ec9a4d360535712738cf382dd660959e31a8ca0abc5c484fa32412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5107c883d0f3e46e54b91e32a27c53f94
SHA1b2028c2632b9c714117ac599378e9cefc01d528b
SHA25647dbbefc74ed7e041c77cc14bd94b0bb967f59369dccce5dc3c5323d5d9a7d92
SHA512a749c97bae8540bbf261bee8969e1a63cc1d7c8eb6af5ad908ac8a13bdcf00573304f44c79a429448d35533216c4be40a8a9c29b7c2fd3d4d63dc52100c3d53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a764cb62bbf7952896c3a96e868bb3bf
SHA1d1b9ddac14936ab3b6306eebc834d7260193ab1d
SHA2564b52d815f48c733f3ad2b0f9124340d9ef6b03b431dcd83a0d3820e823ae1f67
SHA5123b89241827adf47dbb476ca72d1e63662159a42238fff93f11f22b47413d9927612a40e3e53dc42c1b0fb606cc981d9215afc35cf75804418679353fa6c713d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ccddd1faab32de80f607159ab3b253
SHA11c1c8660aa9c15a23f66a0443364f6bee31ba7b2
SHA256f56394d9b3cc8fb060279e3c37cb28f51bde3806e551f227b171bdd2876a43bb
SHA51286080ac1d998b84466b806422ef3ec3610c3068ff3e338964eefcacc4d953ffee9ba3a96ed125359be2e82851143cf964e5c0dc3153c4d18056e32d928098e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2c0e8625bae021423e5b6f0ae451b4
SHA1aa76efeb4467dafe6ec109d05e716267349c93f7
SHA2560adada41e26dc31b1a75e63ab2d7136cc2b3243b6bbea55eca87eeea40551ac7
SHA512088e72aac892f29f51aeafdc3a19cdcd287c55972bf9ec90804c5a9efd276df8d0f174120b3ebe30fccf1479e34522162d7d8c2900035a2acb1bbe9b2eddba15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b892b04644a245e72e79a007ac65257
SHA164af7cc30b8b98c35fe511eba25f683276393ec0
SHA256ca6409037e50d379c7ad8636ab336450a9abc77e54edf25086107132076363c7
SHA51256f1e9cc2cb7dd3082207318d44f259a1108714fda0d47a197e6ff5b8c6360efe6a172a3b35f86a643ad3e6bab58cea09c24cd970aac20d24054f81794e9698a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef3446fa98a85b1d555f55d41bbbeb7
SHA1df7706ea4881beb0cfefc7ab512a97b800f88401
SHA25609a2c36fc3c536ba685106382c8a4d56c63dc2adbe584a948575c448ca2781c0
SHA512f3a5acf5f34c140448a8f1f1e5cf6114c75a9ee70ec98ffcd8cbc83ddce6a138606603b1bf370ee1be13ce4f952dc0b88ccfc812fbe5d178f6cd086f6d065a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa0b7af0da07af4f697c6694a9c3e30
SHA19782c0c65355b61a9ed10570e57653beec8ea25f
SHA2561cb6e8420027b1430de79c3026a59443012eef5c7cfab8c9cc5bc6908206ede0
SHA5124cd61fd36cf9ceb3fe44b75d912fa86929c79e7aa19e00a1b90eddd2d7b53d02e32e2fa8da6d7496675f28460e124c53d9e75fa366d71d32b06d9cba043b3b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c60899795d85b1c62629ef3b4cf5b9
SHA1e7a9030e2e43a49ff651d8f9e281ba738f9bd03f
SHA25608b238f4a9dd136d58cb54e05599ae26a3346b3f52962a8034eba38f72de097f
SHA51283c0a9078c400b197fb2425b2ce7ea91eab25071d099b20b5ba7c3d57534f8d0b87e22e65e7c1317c643d181da9991683e9146dd588e2c6b8922023c37ddd551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334ab7c84a030867e787c5993e8f87c6
SHA1c3a624e1b383a6e2885f9814f41ec49471726e00
SHA2567be4bd149726953cdd0803fcd777ab4a581ee839c701e9f27621eee2b84d80e9
SHA51235b69d1d3f34fb7c10c2c7536fa6ec17ebca3178563066e5148d91bb3a46164e0c93c780d859fd0241c672ab5fa274bcdeb92c5b1e361c71addd2a6e2a3c32f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c302d020daf6c9f77c3f2481c830691
SHA14ae18f8aab717269ffd04914fd5174404d5d6609
SHA25651a2ff7c9786a7abba17485ce6d84d0e3ebbbda1846115d42ea75c3926e2a66b
SHA5120b14e0e27232e56c88a42dc4810a15994581cfe7c34105c2a351fa3c2d331a47db961ec2f351d59bf0aa8a3c3cafc85faa23a18cbc317c8d717c2d0e21c7f620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a90111b6d12afffd08a4b4dfc38e1bc
SHA1c0d106e7282b9c69c3f48903c1c9e58bcf35823b
SHA256b4c2652d2f108f12854ad78dc2700fb04ab360e7e22951cd143a74aeae004b89
SHA512151097dd373ecb47c5b6f48ecbfdd645497249df26feeba0cd90c4adea4948e94a5919a0945cadb7a7516c47fabaa290511f7ac763a14e16be652d7ecba9b252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578466ae0521388d13e7850fd74821cae
SHA144f95ad62406995289f07d69b0c0f1d2944b140f
SHA25693d44e10c5f27f43704ffd15270f44b375a9f05cab264a6f7bee305241d42701
SHA51285971ddd0ba5d697bb3d4e74c2cccdc4aabb4a332a325b3741d1c91dfb4bc84d806884cd4ac2fa1b878ca028d00c8f31cade403585436daeb716d43cf96c94f4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b