Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240802-en
General
-
Target
.html
-
Size
3KB
-
MD5
a7de0d14b856dfa32ff6bd600c6ba05e
-
SHA1
f87cc7d70d492f147a2794e2dab1c1d03b6e469d
-
SHA256
386afcb9aba7f0286a45890cdc14543ba23aa8130ac99b466ebbbfea02cd0496
-
SHA512
28cafe42a183b76bd05bfd85d0cf965149b59af000537eac75d47c0671a76440b9d730440a1ecfec9837eb605c1b499317698e7034a1ebab231f859ea6bb551b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431049642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62267A21-6595-11EF-8A2B-F235D470040A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f3de36a2f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000004cc66f9a467df6d88c43af35c8155a55d6901577c1526ddaaba41dfc0edcfec1000000000e8000000002000020000000364a0533b94a7f6bf2e822bf2db011671e4564c545490147e6f915664d6bf780200000002401a748c0d370b982374d2ba9711ab42b11b7667144473d5a0583fd0097e1c640000000806872ef35294ecbbb4017d02f3ac9ac47fcf0883b54df03db1b2342d2be4b3e86239e51657d68b6c6433bb5d037e7623fff9423826ebec42692cc222787bda5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2448 3028 iexplore.exe 30 PID 3028 wrote to memory of 2448 3028 iexplore.exe 30 PID 3028 wrote to memory of 2448 3028 iexplore.exe 30 PID 3028 wrote to memory of 2448 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c05229a8d75d19cdc55143b09728007
SHA1a83889cf34250092c0921ee547729ddbd56f6b87
SHA256d98dabe67c64234e68dcb0c40af02b3de78be1fc42b029a9be3d01c0862fcac9
SHA5122792aa9a962743af374c1599a037af646fca3779ac12dec95463af13f131253a7e3dbfc51f85aab0ee98b391b4bfd3af3c941154cc15791fd2fd225960c85472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d9efa4e8c3c0248f129390517911bb
SHA11bdf0f2bfb14a64716c1bdd0377c89155959d98a
SHA256fe1a8860f8e7655b43c252204a7d468a18d9636f2e316e92bffddd91eb02ad7f
SHA512a36e4ebc4e9b04ac9f01dc97fdc72e574ba6718f932efd5c93f9274e40ff3462a3964bbf66376db31a96e040a30bd4fac530bf4cf50511d4ddf327880d929eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507805259de9742679705b6b4413125a
SHA1f6afc831c1f4e0d3a6efa6fb06619f18a0a8f28e
SHA25635ab55f85d9f5f7bd8a162300ee81ea93d6c5519341eee7d5a2db52a9e4e1e13
SHA512b05ae37f85e94a73cabbbb381a9db1adff4de530369cfd2f3a858fb8eaee2e2ada6eed12d98fd277fc5f0baac70d8237379f8c90d4619544fcf1ec89d6c4e38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e307fabf4b80582c4988f262ec5ebf
SHA18ac4101d2bd1d3fecec76459c667a1d1f128bcd2
SHA256d68c9adbb6be64c61e78c2ed37d50aac709a5de4d02d33d78e99a81da65c6b49
SHA5127746aeefdd780e032b26926a645476a8d067e8965f818c758aa01ae04cf409008d1a42f52e86229b49e114e48da381d666cdc66734da2ee1d9cfd7d2f5925f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f1493378ce063db9747cfc81c712d0
SHA19a9a8dba04eaab70fb5de838bdc99cba56f51bcd
SHA2565a8ca848dbd0a5d5dd9831ad3f618e584cd961fa97570f10a176d77f912d8711
SHA5120372b7a08c5a2d6bece7702652891af73929638f8e068cb5d58ac1c377d58535e5e6cb2cc84daac1ca1392b3385c48fee123ac3e9953ef828129d32cd7c71192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b92768c11f5e802916b5e0f965bc12
SHA1d7dbd9cb629da3e87bd66251dea6429b5d4fd602
SHA256b95e5b7138615266af798dcc7ef136e3b5478689d302b1b20c8ebf6e72d10a52
SHA512154e728dcac32cf34357870ea860fd91a727ae34115764cd59b4c12af81173adf17e61dfb763523fef893a360dac2da324112b32e1a190548b64464ad3b3213c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3725ce3b68640baa2ef67938152543
SHA149e839ef48e02715faed54c29a823c77f8fa588a
SHA256314014e7619f256146b7974e8fef11ec178116b6adfaf00e485ea9de747ef5ee
SHA512733318dea736310ce85beb353262fd92907f759e38fb7f63925422bd74b5fe9e13eb4a867a731a8c83c13e1bf915340a3444f3a0123dc488792330c985b04fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f0158a32d4a59a053f2da5ac714f20
SHA14b1ebaf794275e84c78054d94c4856cc57bca488
SHA256b812fabd0fb0042e3f7bb6288b6585eb0272cf7559894dc9177c4cf1650d154f
SHA512fe4eb2bf6b33c646e88ffa944e9d8cbce34cdadc80bf994660d583547d00871416e707e888932e35e23e61df9896f1ae817b2671d20065ac945fcba2140a1820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc03956f3b301b7fd8a71b176661f759
SHA1559d366b3bf29ca7dfa4766b3ca73942743ed604
SHA2562807097b611ef6cfef25b196ec344204da39d00165a096ce26d95609431c8781
SHA51234cd6bd6e4dfad9fca30772140ac4635118dd1fc5507cbf515594683bd678c82d53e96fef32ae1675663bdab6c6be451d48f643322dd9ef900918bfc71cedbcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f4af86d4c57046ccad5c4ad67d3bb9
SHA1983618fab1eedec60961f45f5a44914dc53535f6
SHA2567eefa12f236c2e68ccea745737a4daf518cab3462e2362b293dbed79c1bff42f
SHA51269c100e5a694aaa1f4b113526e127c69388c8fcebec75f3ed029456ffd5edb22330086900f38104cd6bc8eee0d544411b59d29048ae564b458aabfdb10646b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072a923767ff026e6aa2206fe8591fd2
SHA1d856d3004ea773bb65f2c4be15fe11d6fcd9d0cf
SHA256ca37dbc8e996f4d61cfb15736a2cb5bba1642fadb2bf41bdc8d1ed59578f6a65
SHA5121068bc18ca824a49b20fe4009019704011e76d1b66c4c0721f2d465d44343fb40a903f3439d8868b5c1b03e515ae03432db8d46886254e4ce2d87245070dac43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033bc8a6b2504574dbab051c7db2b0a5
SHA1b800fad1467eab82ccd24b64768f0be78e21b7d4
SHA256d2b391870672665be416443f692a597cb24c218fae086c4445b7308c92bb26bf
SHA51219969a6fc1f53903faeab75389a2547e328d502f5e04ecf8ba4e76b2492a774247a55eba46ba761ebfd0322eda0158dbc0a2b3356d58eb62d0b77a071fac1b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db29b1fd0de41c45075f46c547c39e8
SHA1a76bd95cf93e0e4199c3cdf5a1023c86bee41cd4
SHA2568c27855a5a7ad5a72fa11f722222a3410a6ffc59f1930dbae92f3b5ab1d890d5
SHA512b77545bea20a1900e67937efad59e5a008bfd3508126cc88a682857ab30c47feb09b3d330e3d59d5d960f98ef1daa749413f401c149460321423b9faf889d847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb8ff7bc3d7afe2cc2d46e019588bc6
SHA104e0c056198b897cf3ea48dee14ca4425c9dbecc
SHA256e41c2bb74c7381532b94efade2660fc75b126801e737edd196a7dca4ab2d6596
SHA5126a535de21fa163fde2ea3c7187b6bb188cac7479ab121effc80bcc44c6fa3b6766629b1d2bb814440e5ffce250a26c217dc77ecbc286b3d019f800ee62ab1ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581ab6faf812b4b1d5e4bd86bb6a4e62
SHA12ce4f31a7161355b78a3b7eb14518e72e85506a8
SHA256a502097879cb1aac350e5d5b546800b9945bb61c14ea2b6d406ab8a9db1ad863
SHA51264983bc378b7068a91aedfcfd2c5bc948c82ccba372d43bd355e8343f2560852f586fe075f3c579c251c354e9379c705fdc750020a706f6305f6138312a5ea43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8f18b90bcd24cf90812099e24fb696
SHA111842737a619c7d94517684277043273a81b85f2
SHA256a9b7ecd3c33ad5313f1d3a30d680c7ef71ace04d509f88a755a91a60c40378b2
SHA5121b810b0953ae60706244acd2a1ad4cfbc4ab91f09fe464e61f9fce55256b38de9180d8fd4e0e14835809026463546e3b14e95bdb1751a0e7c1afe07c13bb83a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be579197717a12efa2f19efcad684710
SHA1a6938ffcddc7a1197fdb2038655f669e54819e80
SHA256cc8d7f53f2b417aa5046cb35013417fd65592477e77d3733c584de46cf77827b
SHA512bb163dc9a9a5226288ae7392b9d0b201377bfe81ebfeb99eace34ac1e575024da4b2e175cc0a41ec18090c67afd0a3bac57bca95daf0312543d0724847672541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355f26ef70f0d6ef247dceadcbefe2e5
SHA13699e8c392fb1998b5ad14a071e005f9d42a2470
SHA256a1908994592e88befd9bb92bde2867919bd37ecd2154326d018f2fbf85784892
SHA512fe41c67816ec941122da5e4fd4f6d058b9af860c71d518aa67804dd914fcf1dc197efa04a16ae4a92af638ecfae946a1dab9894e4ee96231fdab6305dc007479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146fc1aaf325dfd22067f06826ad9aef
SHA19ed779900800dae71dc5e66acd5df123381d216a
SHA256617ca866f57459859df3720edc8d884eaf499499c82ba677e343cb2a1279d3ca
SHA512862fe89bcf3a284bd84863a210522e3721c499bd463802bc9ebb7f4296d6445a80084a5a58150f463fbb92c2bcae64a7553111226dfb2807e71670b2ac8de5f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b