Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
BlowSXT/Blow/Blow.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
BlowSXT/Blow/Blow.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BlowSXT/misc.vbs
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
BlowSXT/misc.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
BlowSXT/rBot.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
BlowSXT/rBot.html
Resource
win10v2004-20240802-en
General
-
Target
BlowSXT/Blow/Blow.html
-
Size
1KB
-
MD5
a10c97e037dda9e75c0ae3400750f2ea
-
SHA1
3c7e63c2e4c2ee470804f3539708302a5f3abde2
-
SHA256
0c836daef4a1b96db0f3d113bb033400930ed310c3d0869a3857b9ab39639abf
-
SHA512
64f97a5e24561eafaa1811d3ee282ad5891d504987c4422c479967ec34896409e0b7531a971d001a31f693581368dbf62ca7364dcd754c5a34c9a7283d2ad887
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92B62191-6306-11EF-AB1A-5A9C960EEF88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430768405" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000c8f2c7aeb80f01a2bb1899494fa4f4904762052614e240e7d8e2ff9f409e1dec000000000e800000000200002000000090787a2081ca2337fe9c515ab63cbe680593977eabf949b98553064e734a7c9a20000000d095568b0b55743904a2cc31f2cb7c05f5d35a960a7601f6179125f6d1b86c61400000006867f6e85f03d119299e81fb647500fd3d4aa78cc57973bb58edbd8c7bfd7312900226c00572777597fafb4fa9695fc6dffd20c471e89772a42f3d4987564e74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c6306713f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000062beeb5dd4c8b77dccdb6f49dbb3e2ab91f44142d374448dbe24c7f8bd1b07d8000000000e80000000020000200000005d1335ba9c0432f9d1c552f98f3c5c526ebd8340455a4067083835b44d63636e90000000f3565187f36242cc68f4f409b84407c7ce14d40e3ccf9b4095f5d10f44abceb1388fcc1f6b93661c04c1232e632aa0be7b9c20d063dda314d26ce76537e1adff14c6b013d021fb9c08870e767afd3bed9ab5bc1ec941b1ec22c2f60d7f8c3fc87dcde146bb4e1e37e7b4189ebba2bdb8b7fa407433f65ad8b036f189f1fc04e87b920fdae089ac38e4b91017208a8eb0400000002673eb9439c28d23eca43156e36c6de330dd464fbe0b59460abf1749d4c4987ebfa603aa94d6d75faa10f910cd3a126e66a837806ac898c8320b63c05601b7aa iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2696 2848 iexplore.exe 31 PID 2848 wrote to memory of 2696 2848 iexplore.exe 31 PID 2848 wrote to memory of 2696 2848 iexplore.exe 31 PID 2848 wrote to memory of 2696 2848 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BlowSXT\Blow\Blow.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320ad064a20f1c0d683885eaa7a97dd8
SHA123ee2654583d2e8ba5b94788a520ef21e816375e
SHA2562b73c707d41da3c34b4483af4de05345a7d39f40839155ac4cf56c5ea827868f
SHA512e84f7cae36a347026c0ff30fe1e0bff8f53ba17bdfb031e80de6b4a56b92ffb6a1b5d99a5a9c457c3d5d7da85a13ba5a2ea3661102b631b3df8ace70057a6890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53752adbdf55184500781c634eb830455
SHA11f165e1c8ac464cd2f66bd02c51a5fb718a77cd9
SHA2568725091ee7b6cd339ca4c999da0e930492f1ef40f1854ef83b8c7c4a62c38f5c
SHA5125104047c9ad8c7bfba1477f48a0c820a1abdaf44f98ea5b8a5abb5b2aed2d662dd845997e2a220e503f0cf81bbe720dc6dff566b03e854b6ebe1b07bc00e7722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7a942dd5b92be621f0f4a50f2e9b103
SHA1276a7c9fcd19965862579e7b48aa18c5b37b2670
SHA2562171900eadc557cf90508c7c02a0695f090f1beaa300e4ab9764a0298a114d32
SHA5128a6e9d73f19bb485bf23e7c07f91f185f1615549c9397463f4dc0f51050c77fcc1cf24a620041a924e4a117140d44d19b93cc3ed461727a25145dab8036fdc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764593a3e918fb0f38efe9386819f33f
SHA1a7caca7149a6369f9f2180a6959ad1d5c1145b10
SHA25659e857ef8a0b2d508da575e9c3800933e6cee10bd37c0f510b1182adc30789b4
SHA5128f5474626d93b0a90ed9efd38989d9e7b84e2182506edfe0b6984308edb45a05f6912800e6a69fc130cb4d7a8aa639223f782d108cd1ba133f7fca75868f43cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356174d29f7395133ec167e67a3f67f5
SHA106069e949f64bbc99d0bd46c500c7465bbfe08d2
SHA256675c701fad53c0c9ee662649ff7b5ff275aea5887593aab2cc8689d2d696d06e
SHA5129de0baa5d26dedf53882a6bc2653e23ace12948cf227f408129c038268523473207c0a70abe5fd8459785f9f9818cf1cc7dbddf9337f87ddca9b8fe9874b67af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec81de5962a7a4ae7133afe7540e8d1
SHA168d48aa144c0a63f41fc8dac57c836e6a6530fd3
SHA2566615c59d7af37fc1b8084463a9bc7dee68c503e85484aef1c990d4516702232d
SHA512edbdea1666597ecc5963fb40bb1116c99fb6bad86f761f919eb45f372ee2ad5c6db2d45fcc64abe531ae2327fd3597ba17b262ee46abb12d9f417627c0f9fca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571eb04756b023bab546f3b89e8891c26
SHA10e5bfb591bfa209cca7d1872f47c88e76758b56e
SHA2567ac21363d112d497a4b1e37c8aa38b8b62f3efe8552ea49d49f1cd25ab7936d6
SHA5127f3debb97cb21bb7865b3360ace1f4fcf095a5995b1308f500adffb43889733bbd9cec5da9f349f71f2b10b2fc5a10afc2ea9b26e7a50df9d0f3672c9930db27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b254449534d1290eb3d9d36cc1ef484
SHA1c3dc4e40cc7601d2e8b91f43e1b0f6aeb9658acb
SHA2564927739e832d77a79f99469554e41611639cee6ebceaa4f15e922cc71fdc1d9d
SHA512a57a05571150a0276ae36bafe5bd073e44e17028a9c3d218a10eb6541a1444cb63445bff2d6535e481b6913c1fd21fca8b68c1616d11a5c7ef7b4e6cc325fd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb45ff07a38faef051df6974b04c830
SHA1dde99580a0b907220fd208ca49a0d38130ce02f0
SHA25680d160efecc809a74acd0c71242a8d53fa0ee49ac322d49997c737ac057dfbac
SHA512922dd6fb179de945bb7940a0413fd945dc374e251413664b3ffc0a9a2eec5e742d243d679436d2682fb636011ab56aeada788e77dd3a32326a060d2f7710f17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416afc07de610550a8742bb6c992309b
SHA142ed1c6f9ad5ea9ced98f61136061ff0b4623476
SHA25692b95473af8e3ccf613ae0ba3498a7f9036a5e342cfd923e4fa600e7de8b3928
SHA5124395e041b403ed99091d97aab0f685781fe48c9e5253166d7a9d99fa539f139d1c4f1e1a8e20914ce5b2cdbeaa1570999a804ee422500ca76430ddae22ba447f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c8318b7db950313f92da9641f52c4d
SHA133071d61ed5a6d3e731f59839cb7266215c3b9ec
SHA2569340f0ff9a21ae7e978a4375c627785b33d9f98dd8f61324e8efb95e89cdfcc8
SHA512cc46c9c03574fb110b56e0c973dd764eef0d985c721de23801d093420e206f5f8596dc48af8e0ef7eb01e04c94d204c2238d3f9ee8e204a9f76b06879a1a36af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2635df45a7a765885c197a4b754521
SHA17631269bee3e62a3dab5cb96091ed2c76ed4cc91
SHA2564553b04ef320ee9988525dac58d3e428b7a724239849c54b62685f5eb2dbcb00
SHA5121db00d61719c6bb743f5ba9dc592ac583442c60289790ac51d64ba357a7c9156185224d4fd8c9a8b3b4a4cdc8ce4b15f07b8421b1a61ab40057646dfcd6623d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547babe40a76efce5ba9f2352766fc1a9
SHA13f92a8a82142ab07db66c819b524791a5b0f0f34
SHA25629da9c7cbec8dba6cda1e450e30e2d448732314d3a05963e2f32038fae2f11c2
SHA51257248c6b72f2650f7ec8edf6d0023f138a0a4148721b9f48595c02a24ff3c0594be79b3017ba4706cc4c35c1b8f42f028530d3a88a0b004cc0988d7e9c9fd96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d5b08b977cf041bd2ce132ae001bd2
SHA176c449ad654dd8724b4597aa505f1241c9cc55c9
SHA256d419b76e70137187535033a549540fb7d00ac15cb653e6799077d96d137a952a
SHA5126ea083cd853378c7aea40ffd91314c4443cc4a10c99cbe7a51c0faa4c5168b15a4d886e6b6113c9ff7ca56dc6808c5b6c68d07fa3bb26cb4bdf0e077586ff12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da25b91b0d56a0b4afaf8d3e3f15eb9
SHA13cc0229121459161ab45cc75dc30c5cf57489677
SHA256630d851ae8bff73d331f2307ec274c2165d0c3e6728ca67d2b3fabba32eb9b83
SHA5124a996f5990da5d8c3903854b02bb537b50a4c52b4e50929265291628dc9ab48603f9bf984a07301681060d9230e37ebf4c902242973b86bb3e79f1fc3e377aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5176cfe1ed580eec13b6fc06a25a87fd3
SHA10ac8228b6ec9af6dbe46ee5cc6e0fdffed093f1c
SHA2569ff1737a42651f51f9e4cfa9d3835e2a4a194ac66fb247b9ea63ed6562db3d4c
SHA5120b5899bd5e135252ee10992fa7246b7045324c1c5e6aac402f39fad63e8549b69920131f0bf5f8f35e32eea2d7a43da96346d1e8ed112e307469f44b01b068c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abeb93508b71dc7fcb6fe759855e06e4
SHA1461357829884a2ec4602d111f95a795c9b0821f4
SHA2564e5d4518416a934b45bfb8c6a38f180ce026a9f4a56fb1391f288c5b456bd05c
SHA512222635b3b4d9bf5796d18f079001ad4090485f62adb7dcdcfeb9adba013c6abc563a6518a199ca64f103fd3348a29607dac8aa5bb557d7504dc9efd2a28d6f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a137bb1397825a53facfca5286c626
SHA1999586095573d03b588f255e9f3fbf91ab69b48a
SHA2564fe5608d16f6add7adf2d8a1fc4c49c6588d4219aa4a514701da670aaa68105d
SHA512e4f908322251a22846da9b84dfe15f7f6468641df6115f749cf42d0be651c84028a638c34658d91ff66910a345fc7ff43e493b4937b6610665b73656f61e2526
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b