Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
4954f477331f00a13641be0b11937220N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4954f477331f00a13641be0b11937220N.exe
Resource
win10v2004-20240802-en
General
-
Target
4954f477331f00a13641be0b11937220N.exe
-
Size
653KB
-
MD5
4954f477331f00a13641be0b11937220
-
SHA1
432017d1499da176abad209500331647452366bc
-
SHA256
11e39564cab14b08d3b666dc858a4ac3a1b35d260cee2095c92fceab9f55c1e5
-
SHA512
8212ce403dc21d2e88a65fd53e86a5f50e8315cadf1dfb02af049037dd38f7d5955e21d74ee6c13fad56f80335bba13167ac2331a38552dc9fd1e6c521a0bfc2
-
SSDEEP
12288:nXnF4rdla0RHDGW1gojJvwmXJFPO/adFn7Td7o:nXG3a0RHqW1goFVXTPO/A7T2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4954f477331f00a13641be0b11937220N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 4954f477331f00a13641be0b11937220N.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000095589a77119c38d83d60bc293d73ba3a41a3bb11623538d681bd23f685a2b859000000000e8000000002000020000000193017ac94fe75441e2fd4f7c81ddc29bc9b6c8e18636f7a6e35d3bc52b3fad620000000888db72748db96c4da08ee0634b94ece32001f97c33f490f1f747d2c588921804000000072ebf5f731cecd01ecdf5581057787aa2b6ea5f9f76e5a280ee375ab334f019bef084cb62cafd5b6d4601c606b38a82c0333c2c0afb2e7d6a3dcbef76c2488c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68C00FE1-6059-11EF-913A-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20bf513d66f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430474128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2820 4954f477331f00a13641be0b11937220N.exe 2820 4954f477331f00a13641be0b11937220N.exe 2272 iexplore.exe 2272 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2272 2820 4954f477331f00a13641be0b11937220N.exe 30 PID 2820 wrote to memory of 2272 2820 4954f477331f00a13641be0b11937220N.exe 30 PID 2820 wrote to memory of 2272 2820 4954f477331f00a13641be0b11937220N.exe 30 PID 2820 wrote to memory of 2272 2820 4954f477331f00a13641be0b11937220N.exe 30 PID 2272 wrote to memory of 3024 2272 iexplore.exe 31 PID 2272 wrote to memory of 3024 2272 iexplore.exe 31 PID 2272 wrote to memory of 3024 2272 iexplore.exe 31 PID 2272 wrote to memory of 3024 2272 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4954f477331f00a13641be0b11937220N.exe"C:\Users\Admin\AppData\Local\Temp\4954f477331f00a13641be0b11937220N.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.stahuj.centrum.cz/downloader/done/?created=2013-03-04 07:27:23&user=&success=&error=icq/lista-centrumcz2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e473766caac66a3cd00fec312051e51e
SHA1f658f656d85fbb354221e87e3eebc5eb93c107bc
SHA256514004ec7172303c46f27ea83376b62dbac06f1909f92e7d0852e9eec9a7e746
SHA51210b444a5dddeb3120928f586cf1b465c765717b74bf666c8bc33140594cd13f960606c9ec7bd934233784ff9a7098b48fd5b9a2ad8860239887022b080652457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e543696c699e9ffba8dd14d2aaff5ff
SHA138a4d5339990713d14f7a94813d02fca4761e699
SHA256f6648eedc5bee4a8619ef6bdadc0dad73da718b4fdf7ac580ff65154e05cf637
SHA512201d00c366cfa2e4350bd0ddeaa555a140b421c504a35dd5796ab278a4a8e05abec416c9f4f7bc7d9d72857192c7104efaa0876f9f74fda6b3987396051c382a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbec6e3192ad5968a16988605435ae6
SHA16e45a1e202eb4ade35cd417e77f000b5f657bcc1
SHA256a3cf2cf48ce1ebd38f216985da3146b7a315afcca3373c8ffc084d280077bdd4
SHA5129c0fd5988bc895151b603786f0ac34ed0f249ca16bd161dfb3683298a9889a48f55ddf96ead437d4dbe0386e8e843a3b3269ac35741399d43093ba95103613fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591d8d23536e1c32ab16625f9bcf6479
SHA15255a8c8c7841b3b68b4e3a2f7443bb8d6dc925e
SHA25655c70891a0889dd56199b7ffc89540a31932af94a7196bd74e67cdbc6360894e
SHA51276db4204597b06ce1e3e3e199e55b9df245e8571dbb2d6f5d18d2e01d8ac2a9e11233b078005a0e6613e529981655ba0dfef51ab6b459e2533ef3702b2be5bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341825af9bd6711c20b5e7d96c166617
SHA1683b8b8ded4112d7dc577cde2734cd3e7cd9fdeb
SHA256e0aeea89cb7721319436786f7b887ab6367168f5eddb69bcc89b3ca5a8d7f1b8
SHA512dfdc24d4aaba7db1ab2b36c30f22fee59b22086fe5c627bff993f2c1ee9bccb1f8a2a05dd8f96e66e0a7abe0b2d93f262182ab55ac92e01c7757f0954b36bf25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d8e5aced31661ab8d8f19f14c7d1475
SHA117c34d717df554414d0a39b1deafaa5f3f7cc569
SHA256297641c9ae0994619b00f7d9a09facff928b3ad3eb61bb1d8105998e11fe22c3
SHA512437080a4a8e7f4df7ff3709c91167ca408938e57b3845fb0dd4d1726485b394d2cb41c7d5531f3d5898c85e1ef72ece8d178c6a06cf2df3af8665876a8a6bef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77e831872717b924628397acc5aa274
SHA1a7232469968566c0e4e5909494cd9707d2f9d96e
SHA256194b0fbb2aacd4c9b60ba8e8a20ca42d64d81da82fd27416744888b6d5207ab1
SHA512c2f17aba58b9092683a86aac0ce2aa003ac65dafd744b073c87c33861b176113ce8f0f13d5ddd5b4a8f61f9efb7cf6cf0baeae0c338dc568acb1dbb45b202cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d51c3b7804a7a69f2070c1086d1c4b
SHA11adc4318eb2aed105a1e639636b788d68ee7ca96
SHA25614fc2a6e3d07580652a0e764a418da5ffc29fc7b0ebe74a85eb9acfb823cb82f
SHA5125a758bc173c67afde80fb7c62c8d1e91e88b075d41b7c2359fd3c8eb391f89913327913a0380bc6784259a1d5d29b42bc08774c5a6504a0e1bcfbbb7d5a96f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7e3a6f7d45d1f1200b100a05f4cf9d
SHA1a2c5fdc478f14f5a50deb24074be3a9bd12c062e
SHA2568ec47a08d686ad7081a6be23660ef5822449c251fe4793d99509172c9e5f9379
SHA512cc3930856f57d8b3542c0f810806788f3460ba7445f36898a4ca4c21730100b078e73692b1eb7fa4be40ac7160680eefead31f91dce1da1fa1de5a9a4b50c501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a0d096ca3bf906f5cf37b59cfd1c93
SHA127fdc3a0c5c943901b95ce117abd82a1b0690a4e
SHA2569a861879f658c4386ddcf01e79600724019330c4eaab10e671d00ec7b137f5b1
SHA512ea49d165ee71b444a6d05f7404e08fa1b3abafd0a9f1d20fc630a9c599d0ae6c1f599a0f4bcda99f0517c202092516b178fe50ed841f29b9113673362ca3def9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a127f4f8bc59660749d50f413a888ed7
SHA1ad19dfa2e4eeb214d3f0208907a3b6bb47f88263
SHA256afa61f05472a3f9d21d398034fb835696ec11d8622614b994cfbd32bd395eeac
SHA512dbdf4033bfdff2b20313ce30e239f7f85c60a377cd63f4655b99a2fa42a6ada74f69df8641932be36c3b23a44868b9982540c41cbd2482c93a86f47b2aa6d75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cdd27c05f5c49782635f9d14fa5b07c
SHA1bea04af0a191c0cdfb0d1565b84c78bae9e0eff2
SHA256c1587794d410923d6fe0b142e3e74d3306a3fde80c1288e970398fb6589be5d8
SHA512a6a14d1fc1f30e60db69fb6e8043fda8b094352052dbc2fec788344e1155606806c67762651c90036dc18b1fb4bed0a019de6da4b892f4a86cf4e9be902900b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e40529451b9d094628cdf25a3b4eb2
SHA1865b32a2f7ea22c9a82004dd016f5c252a479bf1
SHA256892a645694785babe7d06b71837a6cc89d64fd0d248c7cbfb30c3d075f3f4cfa
SHA512051f47e51ddfe082ba56b63dbc2fd6f0db942e427bb6f9b61560bbb158872a9580ebc7a0310c52b06a247b7445e54505f35f7e8bba025e5041e4f3e341844f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc7d4ff33d781e66690475c58875322
SHA1485ed2aa9aaaa9d1921792607c265ffa61defa91
SHA256085173047ff57368ce1e690d5b4c2b542d0004f2ada1f63b5a74c5f62fc15f54
SHA51242133af3eb80c7214e1055c53bbb34dec95ce2da8aa722f64cb424195b4f96d496fbc8e44f4d0f662253194e704806ca1b86e37bbf9c2633c45cc09719f6f618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d223a963faa40d1b470907a2808ab382
SHA1edeaa83e734b71eca5b3644ec68287418703c109
SHA25691acbb7d9aafeaf1c9216e5bc890898083ae30809be5b7aced88f0f16ac9e8b8
SHA51256e2115d7bb90246bb6748a77f4f9e44999a40a6240f5c981a38b0883698d2b63d33631e40796b41bd8ba9c96d791800d9749e63129c59a412a4e713f488601c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b