Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
FTPBA/aaboa/accountverification.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
FTPBA/aaboa/accountverification.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
FTPBA/aaboa/index.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
FTPBA/aaboa/index.html
Resource
win10v2004-20240802-en
General
-
Target
FTPBA/aaboa/index.html
-
Size
2KB
-
MD5
76b6c0a3e6a84b8980d194ec9d090d5a
-
SHA1
00347033a8db8c89b26826d635e53dd4b3eaf79e
-
SHA256
896a9a31d6fb4ad5fb39a114b7a783f086f164151fc7f32465180ac14382bff6
-
SHA512
44f87941f18b44f0a5b3ba1b3c437967dd06100f2421c17a4936ec51a76fab16bc86e00826c6f13532712f3606e75726ef02e15fbfefafbb1061eddc8db464ac
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20802cf7b0f9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431055978" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22B46B91-65A4-11EF-A173-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000000c8e4be494bee560accaeefcf42b38d918b6a0dcc9837f5e88f3338e953e3146000000000e80000000020000200000008ec3fd12450063bd1b327547a42eb89dcb33701e5cb190b9e8f6d10b119b7dc62000000029cecaf173c4029f46206de38d864de5397b0005033f031a085babfc4ca6f06040000000704cfd635bb3602097b59bf2d269f7a52d0c0d313f04d47a1b1e383cc54673b199d427d43d049587c6025973882e51272cd4863c6705bb7ef61d8847c4b9109a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 316 2120 iexplore.exe 30 PID 2120 wrote to memory of 316 2120 iexplore.exe 30 PID 2120 wrote to memory of 316 2120 iexplore.exe 30 PID 2120 wrote to memory of 316 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\FTPBA\aaboa\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5580e456da84e70971d9c373504483587
SHA18efd7ac7b97461eeb2b797557079cd2ddb4cfada
SHA25675c4ed75308fefe06cc515f880f29d8e7188ae6c743e771326da17e9511da084
SHA512293732591f64f9217082fe1d9539a2137eebbca6ef8cbfed422cf1d63303eec2b8e5bf340d2aad712410c2d80dbf1b60cc489d79bbc7e472205b553c1335259e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5045d6b7c91884379e914a5097804f0
SHA1f0f1fb8b9cddb5df464bdcb9275b341491796ee6
SHA2560835b8d8166ba7dc2d34c0ab6c1945ee18da8582a76f1add6b2c3763e26b8639
SHA512465b153d780527759597e25276b303bf76fe5788a5623a52ef444906b316875aa1a31932bc65aec1b1aeec44fe1956d69794158698b631ddc2e79c74ad32d87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d14b702c11de6f26cde8fbb4873122c
SHA160d4c73b456b78f6139fce0486d629c5a7381c80
SHA25686ed3e941eb7787ab1a56d113d4cff9bd79faa94e4472f315cc95603c6bcc203
SHA5127b845d4cc508a8ddb668405aa46e94f9844a392a00dbebcdf13abdce385c990c1e3135e3530e5edee0e631e44e9a09a21d7b8e5e08d0419dd7d67ac2c356ff6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5c7411ce2fed80e8d9d226b1cfc8a17
SHA128c965bd9969daeabecead42d9ada3fc3d7a9451
SHA25606854752eb51075d7ae13982bd6f7cca51b768427b9dd27065a57071361d6f2f
SHA512795c38bb20ba30d4926013948563879f82771a4c028bc029fcc902e5b921fede702e3a9b4441666d2db095747a075ca9e1a9fbf0184d99f72f10836cefac7b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb5b41a0dc1379a859a91c61d9b1338e
SHA1ea1b5c338671b1a0576572a84beacdcb2d273364
SHA25648d37979ff258d9f8fd3b80913b3af8afc8e6ff654de082f5fb332958610302b
SHA512bbcd9c562656dc11d0392b77a5cffa25be30d93cf1ec33f63b9e433d90e95f3a0649b494ddc3c18f483b627a499ae3e62f35f6f96f3f4d65614cf426309e8a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5317f2c7fd07bff06efbeb807f9eaff10
SHA186eb77bebdf1ca9871728047615bcfb2cfab0ca2
SHA256580bb0b16a3588a590f83538b405cb0631b56a1ff71ab187d70accefdb05ea06
SHA51291bec1e0d9e9f9fcd82149f6f8f10d8e75f60d3f01bbce86203ce36214aad824e0ff8010d3b7de351b0292fd49e1505457f4b8d5a6b3363a7b6cefda346103f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566787fe4dd8e2e0bdd6e6a6988c60067
SHA1dc107db01404c7f53a662a38a1238e52ec783534
SHA25629455aeb11cc512d1d1f65dfdb3167f070d72da0caf938aec2815fb1450885a1
SHA512095abda631a21fb870fee0f2d39ae8dd174e0238d1a34e60edb899d944f2d7856f8f288cfaae0a159e9495292ef04b421785cd1e2bafc973beb2c9584d3afe05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5add662e4f5d53485ed56d009c8581d47
SHA13626acb48da6d58e9d370e2cc9fe108f0e25d89c
SHA256c5114e7b4b3b956595c4c103bb30594be4db734157aa22c5135cef12f327cedd
SHA512afc3983257183dbb73fc4f388dbeb40088335ead962995bae61e91c18b18120886bbade067e983622c2785836d32b092bf3b6e7fedc8be538c95e8130da54da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bd0e32653e4c8d26c608dab6d76eadbd
SHA13f34cada78aa9994d115f8b8ee098c62121ee188
SHA25689b8939af72dda9f7bc6cee37ecc90163818ecc9f2f8b0b799d76ffcdbfaa09d
SHA51208dbf388ac7e79ad5ddfff5d518252cb94b388e0246bedd83d4f5a3bae8e5c72ab8ca29c694e72c40321ddcb4315922687c39eb071dedf73762e17f70d7e2833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5218b435e48622f947a162cc2623c0972
SHA10c47e5e98ce02fc1443b9e1e45969b87a7eef4e6
SHA256d94635c2759fc1383d99d3472e529a2deb56709bf5afbd2770a2c2f4395590f4
SHA5125b2cf7d5b4b4b58497aa857344aef885ad38b89ae6e9bc8f589ffbcc3e47215128763855b8f46f0dd09b573f8b6b5395b8e8d7e958082b3194d1f76202618018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e26b3a61f67ef1728b7ba9e96d8ebfc7
SHA15b25d8f36f793e27c784fcf6bc72833eafb9c7a6
SHA256882968b6f9c6ef0cdd1187ca3d01a53ecbd6567ed4640f1f23804e88b7669023
SHA5120f6e1f93a58012874b9c05170d55565fd601717d0ed98cb1ea4491f20979740cf3122b2d68f4dd867d52dbffdfa062252ad28730b06dcfdda7bef6fe66a1cde1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8c6bbcea892920a355793aaefbe004f
SHA16e665142da69cfdd361e8a649ac8535bfaf8fd48
SHA2562850e1a063c18f1a2b81254432e6db1712931d1601ba9d08838f4fdd3a65bda6
SHA512de9fd3be84181de4a564fb0944be546bdf756216f1757c5acf75d4d3772d8fc6986da8edfe6e2d813df4662032a6b4d50edbd6c279f78ca282caf27013253778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD533a32516a166bc4a7e8d4b443f7df9b8
SHA1e0b3d5f34e1b0c85c508f15abfabce8f1d579966
SHA256485e6f60258bfd780708fbbcf3807bdf98f785300156a9b834aae91ad2b8af4e
SHA512e2e50bd166c0d46c0c9b9857bb20f9456a0456009afede5d99fdaf037df6cf5121860e9b675eebeb3b2bafc524b056b91be795819f3a50d5c107345df08d1c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD587b2ed42f613a36b178fd71fa604c140
SHA1933d02dd4e2f907bc30b07890f912674843bff41
SHA256a5699e63141aa7cffeeacb3a97b9b20b5e6ccf21726989cb2deea0db23ef15ec
SHA5129a57623baca69428750a0a827b70234d14a2649afcfe88dbbfcaf5220a5bff98912b79b412bd1cd69a0c1bbf996b3a830d5c96c00b3727359ac27e2d4a443bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ceefc7345c7e5609b10b2a50538e6ee
SHA1ca9afac4fd6faa63efc89dd1320601d64fe7b1fe
SHA256e8ed3e22db4b65d289c614170b95bcb75295873324daa632563a4db6795b46ba
SHA512c3b177a39ccf4b1f3e683c37a3943d266c2f70646534865b3cbe648c38e84319107b48be99d9dccc6455ac8ea9a9a499b94f28155cacb7491fa2b27d96f8ae02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d1446ad644966ea52d473ebe4f18c90
SHA1b807a5a0398b9711ed616b01751418dc87fb00c6
SHA256bd02e09e7b203344dde5f1ad23e984a27be3b5d4882bd5ec593ed458356fb791
SHA512535e8ef299fbeee0f59943df3fb55d2ff9406cc980f1c234668532c8b5c7190b976c3dc117bd77adc739941c369342b8f2bf97d6c4c9cddaea03d3ddc484107e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f63915eec63768f806b2bc48bb306bec
SHA18a842073b5abe64b35767cd36731fb856753d365
SHA2568211dfb35771738bdf43c8f4b1e41838c9ca1f23698e53536dbad004dc901948
SHA512fefbf2524885f381a3d91b4df530d954da6a023676c648ab3224a1ba14c1d979e56665093d2c84f6ff15d09337a567b616bf27a06d8b78a3b226510886b6ac34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b84d9f02ff0e884d9b91b89c6415121f
SHA1666229e9303dace03e7aa124859640fa38a62e07
SHA256d0c9a058c636d562c265915890288a01099b834864413025ef457cfadc66464c
SHA512c2d5ccf13eab0e7acd98c1d49ba9a0b1a9b136c9420ddd49e253679df2e1e240ba52f8788517b0516c9ba12ca73b48c668679ae238d6d55989bb898900864905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5926cacd20cf7363145dcee5588bba50b
SHA1318f1ed4cfd054c5971588cfcb4face47a5e178b
SHA25669473ea8c567d4765f89206cebf9f351a70b9e8b15828311ec4e65982a966505
SHA512d75e9ae46885e5e9a452662b8d6274c8d263294ae61abb3e66ed0bc7a534da55cb67261eee1fcee127cdc3e7dc00dd895e2550d1a994d43e18bc3f6bdd8b17ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b