Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
33fc94c0d51ce15b13acf2c1ba84086bc124da5c0e18476ab0a47c9d017a0f15.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
33fc94c0d51ce15b13acf2c1ba84086bc124da5c0e18476ab0a47c9d017a0f15.html
Resource
win10v2004-20240802-en
General
-
Target
33fc94c0d51ce15b13acf2c1ba84086bc124da5c0e18476ab0a47c9d017a0f15.html
-
Size
1KB
-
MD5
9dc41c32acc3c67501b286508a4e55f2
-
SHA1
87a692f6c0924a24a618959fdd3c6fe8abec933a
-
SHA256
33fc94c0d51ce15b13acf2c1ba84086bc124da5c0e18476ab0a47c9d017a0f15
-
SHA512
3e3905ba619a9ff4eba4aa8b6183624837644a902e52cf7efecf8999cfacc699e6e5c24d9a9c18b801883c4f0ed5936349574369a2ab9fb518fd837abf145a12
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431352400" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000047c039e48bc286202671f631b96191fe8942b7eaf536691fda9f025e7d7eabe4000000000e800000000200002000000071142ddeb8754abea648908623edc5edc124baf047c944ff2f076d93cf695bc420000000c131c12643beaee28c95f2a0f40d906e875379f50f827c71edefc083a2b6ac04400000003b265ea580550c7e05d61047899b181e00065c40b1d4b9f0a09bb93c3af32b1ef73c3188422c1db3d0e3ec41f9f26a2ff32fba57bb01116a1ed9beaca4b5f310 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C0D02E1-6856-11EF-9CC2-6ED41388558A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6090942063fcda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2580 2548 iexplore.exe 30 PID 2548 wrote to memory of 2580 2548 iexplore.exe 30 PID 2548 wrote to memory of 2580 2548 iexplore.exe 30 PID 2548 wrote to memory of 2580 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33fc94c0d51ce15b13acf2c1ba84086bc124da5c0e18476ab0a47c9d017a0f15.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce2a261aea01e099872d2cdcb6d6c00
SHA14cde651fe6d4e4e37ab2de3200defafa01eb183d
SHA256a54659351a26b0cffb82ce7700032f15786234cd61c3050ebda22f663de10346
SHA5121a5932e1ce3b54a77d3e5072c4820d0596a0ce93fddc4d8b60212a6eee59d408ea4835291d37b587580f1cdda1508d5ff1b864371735f1d505eb7aad1c1ac4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52055a67cb0fa4774fb3db3f3385ffd6a
SHA1fdf08f20181bf5244895d562d641bcd2ed47b925
SHA2561cfdfa45e597597499fd7d701aac114e26c626802dedb1f7e0ff114369fae63f
SHA512e34d12dfb5dddf3c95bdf0721fc72cf314fc7c94a4ddb9850df8cacf2e2a7f37b3b1a8af21b132344c7c3539a2b188da4c6ae35bc59668b34f02a204b1471b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b128001cba59a444961c42f341c4408
SHA1ccbd7101e4830cb98b603c6d8282265395450998
SHA256702d3bee7ecffff61d8b8ff6b6cb27a53d67a815fd00bd3d3e27262c41f95e5a
SHA5120d1aff45b4feb4ef00acda06c901d7262b3b6568eae78625854c39fbfb013bdd36ad9562533a5b3a631c58e3387dc0fe14bc83c2b39da358bfe38053ac101e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58015f296d83ca8bf77c75b130de01f5d
SHA166374a81d5a67f8393eb07fe89266d996c581878
SHA25678a84e4d3229dfd24cab031b50b631d532a84adfcc3fc9c5bb5f0cc2732d9482
SHA51240ef3f295f7ff07fdef1b1170917e2d64e1253de5740562e45baf138a3e852f740e7afab3cca5927d8db018dc7b0310116fb60326772156f776d19d03156a10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621347183793ca8121312998aa48e82a
SHA1e58ed79d76f0f2e674e66e1a60b6e53fdb39dbac
SHA256073c93032263f7f1aa561db5ed2f78842e7eaf1979f204048b0facafc19d898e
SHA51288c71fb5bdebc8e426d0ca805ae72566df353d0e220341bb71c258d7d5ba9c6d250fa50fc5547387426d2cc309f02a95d1ad8c5f7ad41f2c3338f9fee38c8d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991a18d84ee89321af520a96d2056a6c
SHA1474d6f4129c2d3fcfefdf245ef2020a621a58c65
SHA2567833b754dffa02c970670813bab984889da6d232317bfb775f34f0fee8e90b19
SHA512e7ec936e29e1683ccba8a3bec9191b6b412d15a5ded1c32710ef6f1ef6cbb9a2f67574709b425258d24203c1fad5a51c4ee1b5b4245fa21ac01535a76ea7f083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532bff2da2b3c92f2bf5bcc34e44bd4bf
SHA101230118115a6fd0d89e00a28a871bcf47e8ab6b
SHA2567fdfeb3c25b48921e64fd4a9e4b9975eb3470a97680641dd9e387bd5908765f9
SHA512808fa738eb7854cb4dab76898631c1913d967169a9b1af7825434803230584c6cdd43ac889379f235edb15fb8bf5503167a0e8c00d4b4e7dcb2a615948f2d82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5032c9418a1cdf4d249e7864ca445514a
SHA144dc323ff7c202ae89c7f241d2a53f4173aa7a93
SHA256f42da5b1b924c4be70432d7e5f244e10d1b1bbf5f9249e3e51a7efc130ad5af1
SHA5128eb72d307fdbf80df6d6bd4f3abeb3759b31ed4477b0f7845d1b67adfbceecb33d210b6ef4ce4f1fe2cd2863bebb2831f9054cecee9f0ba089a168faf2b2d574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4812d07ce23fbc1590def7b82669d8
SHA1eed2c4a01f7b6218f7ba556d00c1cf7da0193ba5
SHA2565176fcbf1f6caf81d00e52de645999ad969282f27cc22fe91553fc14b0b8feab
SHA512f8a13f03bec5469574bc76ba165a8f7cc3835b27c4479cb612f67f5b89e958323002cfa5fb1288d0fcff5583955381ece90c7118fcd55288c7f9a60a130e4d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aba3bc0e672a57e2bf6fed95267cc97
SHA1b764e779fb0fa7f028d6928bc91f37465625e7d6
SHA256da8c3eca39e078def35d3e91aa705188e59e0f2681d14ec30b6988cad4895af8
SHA512bc5765a79b2eaa5fda8f52935eb7032f03b282f83ba60b697a923f83e4b3d60364c8c61d04e1cf7bb15cdc9a80fd3a6dee1454f098f25260bdadcdddd8dd1737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d32bfcc2319a2a79fc6e1825df6b44
SHA1fe2fc54f7108b3c7215d352c42fecaa7491e9d1f
SHA256c13fd89f9a780de47ba4f6a177bc43616513ed251f5befdef851e0c0a6d6088a
SHA512870b65877732d545cd1dbb1f16886cd4bd7f8a1e5ee0ad5049c4ed5a0b25e131743ba0d7cda5916aae58dfdf3f603cbcadf468bf8acc0b5592e181b0a1f48bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f336fe98d3a3823d72da4e5c9a97b2
SHA1c063a75ee718069b7d1e9e5707d3bb1cfce5cd2a
SHA25687e92527f27e8dc2f99b82e41e3749695a2eed25f2d38aec0e2fb2f7d1d19d39
SHA512512acd86bde6977d78d5dfc1781b8dd973e83203ef5991388c7f51fa5334330bd646d01d1026e648a58e8ec593d4ea7b8922993d5e1d0a999b005ae911f2a028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ec5e80fa92789f55b5407af9773da3
SHA19ce52f6082617b7894c577ffbc22158639d0e0cc
SHA256e39025af52b73235353fc433a7f61e4aea9e6ebf5d095cc17d7afe51e0f98d82
SHA5129b0c6d7251b985f3b7df37c5c979dd73c86f25dcf5dd05843fffd514b77ba84ddd591d7de63ca403a7f3215954e912a70fceb3e81feb531bb8b58d69e3429a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5037e68ad04e94286cbedaeebcf3830c4
SHA17a10b2eaf170f24f104ef4153ae1af0cc848c02d
SHA256cf0e1531d8fa03b7776f1562f4c0dfc428a1ccd78f1719f66e7640f4a88df7cd
SHA512c143d8cb7772fe135a3701e8e5c71b4738f6bb649a784a2b30c785d4f16664fd32e856457a11865adb9400c8acba92310c19b13a50918f4c9e15f5678bdb1110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73a1d47e96e0ee7d2a500a40d4510be
SHA1abfb3c73525a06a365da56fd9e43243c7ee6444b
SHA256e76078cc6f5464007efa05a5be6db2720ff05106c26ffe9da912a1b741c2911e
SHA5129d112b95318622593f200e8b6d66c6763fbf8447b26e3470c2939058e9c3384d3a90301adb299a5bcdfd7e47d4955db19f6dff361f0e3c8abe04fd755f13aeb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759a5b73ae892213dc28821d040a0a99
SHA161e1f8b2a580853fe11ed31ccd5611ac39adc71c
SHA2560c2400170bd1a6765ae59f2871d4889c623d3e6476bd7721ba727f9579701375
SHA51290c0364e7565e1eb1894939de413a26253ecdf028dfd8b260a4f841f60875b1564809e0758372b0655dac667e0c24cf6398bd46cdc2df3edb8650479c9ca77a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558dd21b30f4b43ce64343c0c90c15608
SHA1fd806b704684a6a936fbb67d364179610fd5c8f6
SHA256ba57f6d9b94c170e242c3394545cb845f1cfb0c5e370c404b9a6b61d4d09246f
SHA51243d70c159dea37a15c42b3e78d14d30bf125d2dd7524117058c49ac5883bf79f85231db31714396b94b7867c60ecd06bbef1cd96f9faf9cc16a701dcc5293c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc3c64fecea3130712069c614a9ad366
SHA118a872b819708c4dd2db6b80698886cb4157468a
SHA2564a0e6534bc057d1fb8dd677972f3f50929f8ab0cd512191c14e0f372390e3e7e
SHA512eacf415b05448518b68289cc0cfbe89fd98d3204e76ff26b92ac97c5743e57f8f6f3a74a827ea88f1c9f873e2e56a90fb9b5caf562ebf1742ff38da99dff3b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe43debfc61f7b4dab76fda586121d7d
SHA1763be6f4402b571eca393d5577c6dea9a2d6f624
SHA2562f319097cf0b19d6ea36ab72eea64b15319dafbbb6e2511fe69179a5360a4e0d
SHA512760020763e5a7a1aaea06bcabab3055e4fa8458b19ac65bd44fcd1779b6373824096131977dc08c8e22209498f07cdeb4b13c688d62b9830d715f6a8f7cb04ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b