Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
t6sg0AZJ.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
t6sg0AZJ.html
Resource
win10v2004-20240802-en
General
-
Target
t6sg0AZJ.html
-
Size
2KB
-
MD5
cd78fee42bf06b0d2dfb07d4a0821049
-
SHA1
cc316f5eab088251af7d5b27f81ddc679e02f366
-
SHA256
2a0de0678026de7ceec7136264793d455886aeaa433abfcff9c948131c2d2019
-
SHA512
0ab3a75eb682c225ef612de63dd06b7b98cbc30c284b798a1aa52a77b861b343d5f874ba2770b5d2b9f411fd5ae6d65f97fbf11cf3c4b9a75315e6303ed6d624
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4066bf8aaff6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430725513" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5B10521-62A2-11EF-BB68-FA57F1690589} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000091d0aee177974b638ae400906ec6437c419fe28ee4b2c64eb2d05c11be31a523000000000e80000000020000200000005c85ae4b30dccaec50a43b05aaf7da48d6026daf2bdcf89a266a80b46dbfa24e2000000002ad7a52ff959c34b50f213a1d9280996f1b8e97be442edf3892083473444cfb40000000197f976d33e76645a8723d2fbb31a03cd19c0a676ec5aa20c9e05a1c92026836c740855bc158b41043b6fe2090e4fdeb08533eabe85034fe83c446faf8165be2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2360 2552 iexplore.exe 29 PID 2552 wrote to memory of 2360 2552 iexplore.exe 29 PID 2552 wrote to memory of 2360 2552 iexplore.exe 29 PID 2552 wrote to memory of 2360 2552 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\t6sg0AZJ.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23fb886b0a91ba742082aef331a75d3
SHA1ec627db9f9d046ca9f0651ea2195c507bc82ec8c
SHA256617fec9afac70849828c11bde6d627a70baa9ce1ad16619317f974d9c55d7922
SHA512a9de48745d2fd4eaea6fec565f85cb2070b190b61761121c24b226ca91c8b9046b4f4d01f6416caa3d756081221f5590cdf83df4dd686a0af07c14b211669a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b72ef1d373a22064005d15ee13498b8
SHA1090aee7cbde0d3ad5d1a3a8f1c74d82e682f237d
SHA2561273e40853535674e689f0d8f3d121425e96444eb2ba5580765c7cbbe9b2ccaf
SHA5121e224848dbaf1807577a9e07c7d9ac97e2f7f57ba8ded38ba5bd5a7851cb2e8ab653d3673787fe84d88a8e1cb5d63dd6893096de86e865f2ccdfc9bb93a78688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6237dfd7410848df8eb197750a890b1
SHA1e0fe62b20e9fea2f2ff0cd80c0ff7df59d184413
SHA25684d966849eeebc715dd6773a1f139b9d83b9d0c05a00e170115597a168e8cbbd
SHA5129327e7b8a320b0ab538f913e505a324e6e79cec5af14716ba269c8b646b716b3448a46422a59b9754856e8c0055535c66d61d11ccabd7498f7bbf94d210e3658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bbdb3e6368472a6c71581b5bebbf2e
SHA1ac3188316a41b4628e81522365810a92a7fce37e
SHA25647415d3c756a5e3aae9a059d1f552c4cacf7c6e745816eefaec97ea9340f5021
SHA5125efe8f1e12bea357b26f97004a662712a66aa071f78ab75b93322e534713c72766d9183950dc7309f539464657978fbf8ac518e653a6132a22d13cd37e281b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20cc09bd050206f47200ad01b4a5e4e
SHA1cac14ebcdc3854be49881f0610cfa570df6f3178
SHA25649bba843883f61db40b7a1dd2d9b28fecb515dba6190df1e0f2ca16f6bf52cbc
SHA512635fe2b1d1dbb6e18065aa84f94ca0b2ed998b64884b98ffe3d682d775fac19a75ec10927bed1b6a3d8a6f188f744b150167314116ceb498e9a0c267c145d9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f0b1dab79e544618404bf7ed0a7fcd
SHA1138dcfaf859bac30cdb3c1df00a5415562d0080e
SHA256367f17cbcc009417975c12af8c37d12829e42f24f91f2d1fc9de747a5bfe741c
SHA51296139ff6ac3d1e72c9afaf229bc48e7320ef8a55165a3389d88ff14c4f366876b7f53ede9f75b5a97f4fd4bc3cf55f189c2da2fe71a7c6222f186c24d19cf58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5828858859c4dee71cb871d024f913bc6
SHA16b3952fccdb8b9b52c00142f3cfae792709ee6d5
SHA256dc8d3d128f72851365159f9d24734b6af148bd40a3a320937812db0fe3c51ad7
SHA512cff400d80a208e356bad8e89606bb7cc71a7743fbc865e5c8ac137c0360f5f1e4cdcfc9c7fad841bbded9c6e2eaed23325e112cf3993a470daccce2e9020966c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56135f0511a9951db0291eb950dc3607e
SHA146eb31d0efeb069d5491fa59e440c87ed678fffa
SHA25628da984f15858a79367aff5f340dc455e7d9d9ec74971d5e96561b9d0a0a496d
SHA5128b0b49e6cec415eca96c53712ac84e0087f1df0295d319cb5d152b2272f0510adfd2d025feeec5ed043fcb226b0af946c4bd10298f46902224761e1e66c862f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ea9020b9fb5bed84588db3062db1ac
SHA14d907049264d59c589b89439c5d18e2e481e9854
SHA25606b30458ea4a4f677db7c845b732963360ab84732e4262529e2ca4dbd4c5dfa8
SHA512c9f367964b956953fc6ef1c21a8f40d50904d4d84c3b8f7ed011c80d79bb9ba846f873c4bc0956fac2d05381b0246db51ac56eddf6e0ec08d25647f501961585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d84c129219b6c03adcc8d0d3dee8914f
SHA13064d996977cc4b78a8a393ecaf7a851e183f232
SHA256264b984de23e8b807665b3de9347e7379528ae46f82f3878280104b42bed7c21
SHA5120893553237b0c1a356e44a6b76464b0a6ddeb2994948d43d774e916eb8cb84cf201ea2427b2b0aa1feb2a6697a630fb9c4feaa79dd62946c31bdfbbd32ffa856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb637d6fe21583a98f7bc402fbbc2fc
SHA16556cc0c606e18c884d0e88d7ab2bfc84aa5349b
SHA2561aa8052455b8a25fc0cd68ff183313d55943880755dfefc8c95c43854d7e299e
SHA51240dc40e9e2b83ff345367ccb4dce0a110d84a1812740b89f2328dd020be7d6a980e581f5c259fe5e33639c69b85c72af82c3e503e1c8f6e5aa981c40d54cbd70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf540be6f8be42cf03906790fe190db
SHA1343354c2c4544ecdc3772bf8b55a2e2dfb55c2bf
SHA256626c7fa37c044e390ba1ce3f1c748ccdd9ea726261158d76f71b5b1b5ae35a5a
SHA51230a3e0cb9db6830107fdf5628f11dbd41534e2b713546ef13b81056eb84283fb85d129b04e9134ae66b340f4064c1fb6962ce7d631e709253f732d28183df17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f863875fdabd9ec8fe0c1c09ab69ca4
SHA1ea3cdde9af51a19eed7d4620930c3340aa1ee797
SHA256a34c75dbf831562d06893c54dda4adc94d9b125d0f7ab68359107eb3af723e4a
SHA5124f72da580cfaaa3798ab955463283126212e8a6af3695035f07bcf9320c70ceaf6410d18441d5f9ab5a38efb1ee06fff62cfb354c6b8c8ce4b496a05d5166393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507735d1525c3de3cf1d67f25d10c4447
SHA1ce999ee3109d2f5e7993d4f69cd3f34b23f15615
SHA256fca44f0ee8524f0b81e8b2c0c5d2ba60d79c3644d88bc07f96cbf8514a123ba2
SHA512ffab1a87d753cf85f374bf776c5ed9e23249ee8ce9db8bd8e5db6f77dce32cecc3a0b756d309c92009ad4b64acd6e32dffbb4bb6eb534ee85229c777c40b98fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50831c65cd8152e86d4cc59e8242bdce4
SHA16269b63b150f100a25b1c3ff6d0fd9e6bab9534e
SHA2566eaade57e921830d323b1405a20706a7378d6b9732aed3babee4fae410ec5171
SHA512aa6b9d1a27adc303de7cd385472b9eabae420319f1f8e0b6d37b65be8ebd87cc7ba4b82dfe96045a134aafd5f33195a507f56252a21d5d7de841fa10d4c343a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6f7b2f96a96d88f594e8e01dd1d3e5
SHA1c63d7f474ad5e8423650caf31cfccbb6de0d3efc
SHA256131f2e7580bd34616c44170e05cb503b667722217bb68967f3b02d97cd9ca927
SHA512f1e5834dfb210062f36e685ff8b01594bdd7c2c0aaf1741d507378361d748c255156fdb82de98e89fe9c61d96b729daa027e88fba29cba3daa72414b6516acac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf5f9995fe6fa106398f9d2e23a2b84
SHA166c6fdaeeddb2c778573f56eecc0450444332819
SHA256d336c5e0bdaeed690867581699e8b70b7c2f57e260c9662aa79e28958286c7b8
SHA5120014690b1f8bcadc92200a5416c66977d43d18fd8788b8077c8348d8dbdc649e51701c8da47aefd55d640dca2dcbb0d61788838a975d496270370aec5cec08c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e43424f1a5da4b7dcc3a9a96d33164e
SHA153c8d71de80f4d4b47d4458c1a62b5794587da38
SHA256087d0a981f7366c8ea5ca16942f451c0266f49d5069ad5f25498546f949ba96d
SHA5120bc92d7885cadcf8a56a19d7040b6c841c59a462136b022d4f4be138d4db1a07b09189d2f374ca4df785c4de986e5a62acc3a2d4fb28cd74a1debf4b7769ad27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08a11b18373a504b6c19d4f8eebb7a2
SHA1880035bdba7fc8de43652d16e1728258154c3908
SHA256e3e7cdef84b3be8caa8c10f4e664bdd8d273468ca87fb64a2e89ea1091e229d3
SHA512759f7ab89527cba8ba55d7cb2577ba8ec1d7abdd97f7d585f3cd28999517b8072ec375c26bfdfb452eea449b048585859d0c2afb10986ba389b3855f6a95c481
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b