Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
d82d99f6a734adb4ca11b341aad178bddd6a4110095a5887c1327af18ac9f69c.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d82d99f6a734adb4ca11b341aad178bddd6a4110095a5887c1327af18ac9f69c.html
Resource
win10v2004-20240802-en
General
-
Target
d82d99f6a734adb4ca11b341aad178bddd6a4110095a5887c1327af18ac9f69c.html
-
Size
1KB
-
MD5
2abcf48a053fc5cf45199c51760f8ad0
-
SHA1
a06648ac457cad83bbf677361db4aceffc4a6ec6
-
SHA256
d82d99f6a734adb4ca11b341aad178bddd6a4110095a5887c1327af18ac9f69c
-
SHA512
262ef86546fa32e9292ce627d2d6374e8acde32bf10cbaf2ea1b24ec9828ddff6de2b12839854f9cf0c56a7d0b9f19a58fff343bfaa072418e33520e6235c5cd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0097B191-697B-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431478116" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000047cdbd3ba10cab51b7c74ba73bbd93b093035a6cdfe81a773fdaecda203afda3000000000e8000000002000020000000576aaa3d7ae0f66c459e9d9119be4c74f4a20532986711801be7e80bca0f263e20000000022512318ace2f6e13721555030edfd5d707228824a691e087cef33d64b99c8140000000be9b11e75b5a24f693a00d71c25e2af40253f1ce1f3fe617bcf778267e1af276526839c07fe1ed10f05092e0c392c7e5ffdd8322959091cac92741bba81eee0a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9052b8d587fdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2704 2740 iexplore.exe 30 PID 2740 wrote to memory of 2704 2740 iexplore.exe 30 PID 2740 wrote to memory of 2704 2740 iexplore.exe 30 PID 2740 wrote to memory of 2704 2740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d82d99f6a734adb4ca11b341aad178bddd6a4110095a5887c1327af18ac9f69c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd44221b318ce378d23609d385508611
SHA121c2543f2d5f4eeb033a297b0f3368e30874079e
SHA256162924d6de497d3c735ef6deaeb93822b575db888e598b85d85aceeef171714b
SHA512326b20465f28b534ee829590458a1833a83f98852133ede6e3a57a33b551bcf1f533acf88b808e485a67c3dda7b80be7e6a578668156b0aeb24b11bfaeda4be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d8f4c2bbefe57e40019182da132e9b
SHA14bec837f99945d809918c382dddaebc5f4bb064f
SHA2564364a52a4298cfadcc343cced6b1a9c5f8c8deff87de5fa12c2c807cb82985df
SHA5125b08b6c536316aaa4659f1ac7879364fe353743f3ab9802e577affb7078355df8df4da9cb4a2e17941a2da967c4544cd291302ad54df0743ea99ec751d1dcad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aed1b5f83c29dd2b8279940c84db87b
SHA17df41d1d56fd0a33e26817566f5f3429af46625c
SHA25639fbdbafaf46aea9bec9ee763afd80ca6084b6e5644983fa90b6a72b661d35ae
SHA512ffbcb288b50233b182cdbf01211c226e94b32ac6c44f69b9384bf9d350ee783b66e7867dc727b922f660d2417be82645a36f3855cbec42cf55d33cb004073a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b213f7e543a5ef3f9aca050f0b35c4
SHA15ad9e7aeec870d70171c65a6d32afded0ea40e51
SHA256f866ff00db20c09e859024feac8da366b0dfac9462f4ec7475dd9a98a22773b9
SHA5122bea3e917d56760f275a81e133c3b60486574c4d6fa3cc7fab81318ac0bab83d62498685ae219b1ff854e293c2ab22b05dd7cb80b82206d22116002ebb5bab4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58016a569060a1a604c396d5df1576e42
SHA1d1690762660f69272b2d6297b84d04e3fb93ced4
SHA2562eb083be6e5a8f8e36d76b3107c93d4f62b0c406054acea3c20aa86d3771022f
SHA512c7dcb0f55bf835608cba10c99a88d38d5d19a7c3abbb69b6843d703238161a96b9b9b88a14594520e562405ecc98c527544bdf012d8f2306b0f94580940c52c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50711473b452c36c8f0e43e3b29cb5c7e
SHA15cd39077fe93b12f309d37359478febee11d9572
SHA256c8c566ae5aceb47cc5051d9c569c3fe59062715e0b07e6081c85ed806fe1002b
SHA512217b8bf410b3f3e553e64eb9b508ea711f00ad938a6a048e2fcd87d68f9af99eb158f78dac923222b04c1e84511b4c1d5f6ff523a8d4de6e471bfcdb7fa8dec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b8b1d530fea787a5f1f35b23107a5b
SHA1315c7c7d2764d5bb6c62e1a2cc42b7edf4ad09de
SHA256d62be96ddac2727f83cb6b04e022ac79f5664bc7e56307c914906876becf744f
SHA5121eac8cafc715ebd90ea01942153ba4b4b553c560b304c390f1d38550000f750367ef1dc730ed8ae0ecc59bb83689457c48c9b0d04a16decceeb9565b5a6d1024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ccf866b6fb49facc5bc011c33b684e
SHA15dd34955b7fdc2126139efe40c2a1c1b00217e78
SHA256424b82f58b910c0c735943694d5640502d9ac4e2b513e492ebe5502528f2d9b4
SHA5120831c8886be1c2e385c87af3b88ff15eb0bce2360d44cf164007ffa4178b472d8ba7668ce660770ea6463fa10b1205d1cf06b5a224539a9186525d4adbed22f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dac0cdb64977be14ced77c08e50562b
SHA12ba250530e85a4b035dfff5f7646e690b6414a8d
SHA2569932fc89f8f3da6ee011c60875e2d58e110e2e9bcdcd1ba217b1624dba4af81a
SHA51234dfb42d5dea67f9169616efbeaf2cb4bd333f31aa579f241882c6246266eb206cebe6c71a9febb8901ecc94ae47242c9c0ca71085a9e8d416afa34a2ac88df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0fbc079a7db203c4b62e042d133dae
SHA14a0afd399f4d01f540fbc4dfc46887ab95cdfc1e
SHA256860c6bbfa17579735f379885ed863b68964f6e14df627505661ddf63bb0bdf7b
SHA5127080561ffa515069c518e07cc71edb8ef41361ad2552946e8e5a58c7460d3dda2ee807f79702e29bba7017b54492e7fc5fc1ecc0d1a0c70bdfd6a7c3d990ec62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f96fe8f2731817e849e643944ab2ecc2
SHA14e4a6d8c0e7abf69de8ac3cf1a678fc9ffcbb23c
SHA256bdc666e5a32720f6c10393366e69105a3590a36aad7fe01733e95fea3816d8aa
SHA512ea2588c3424b9c61da89b787a99925df7366a6ddc1dd4a3985595eb5d859e0f7a0983dbc7555661f3dcc1160e65f4100090ff6dee7bb90d6df95cae42af85876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4f0c4760d7abfcd4abacdea026d2fa
SHA1bd8cf43c07899b43ca99893a0f001a41b84d52d3
SHA256fb77def2e8ee4a78a206dbe58623e61eec27ca2d074b66ebda576ec8dfeedd7d
SHA51265786727e79423654938c98906be84c9d9a12984f92a237a9d578f3c6ea2d85ef1f7e29dd58498a6bb96880ed13799416f500b4cf22b5d1e10fff9aeb0d4a6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c22a5c207faddc0e095fd598def24ee
SHA11510f45ea17501ee884ae32263b568d6a7d7ca67
SHA25666fce25ae244f91cedae80d1c3fa8af67ef90951d1f68d7c490085d64a6f0ccb
SHA5122366ab5b684d1337d91359abcb8dd9b1a36bfb3e6f34bd65d64e17a27b3e86ba6da28df81ad8dd44c5e3189f1ff7988fbdc85e644977c93305f728d3dd4679d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f0a4be5cd41f93eae7fc96799d0cae
SHA148283bdb0c4e3703520543268611effbb7eb2ef3
SHA256ba211ec2d04f5e6bdb69b196ab08ec54faa9f0a459f10cbd71dc8f317b7fcd50
SHA5125f8c1dbe1d42787e0506b3098a6e722576b8734da104c33c0f51185e1d451e24bb57f290ee5a676e57f174b6ad422e918f5a0064ada9f897aa74d9110c5677e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52338f0b99cfac62d22c0db4abc1b940f
SHA108c6eef7ad4d9d8f4824ad015751f3b43518f5b6
SHA2565522b0ca4b3282816483f6a5dc907caec848a5d61631ce4a595ad839deb2d6f5
SHA5128c35449322a99aa0625738da0f954e2b2703a0e9299f221a6bd044a64b4f6c3ce362026e4cd1b111b6aba8789d6c9338314a06846712e722e9740a4291c8b95d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8653c06cc309caac4473a8c66de56c
SHA10f732d6b93539f2a35670ab8ae90a0f8a45b4193
SHA25696697fef0058a4969e51ecbda8d9ffcbbdf5577d91775035d29a17c6c58d5bdc
SHA51274ca51dfcbf8cc4540047c71a3c52e9dd269a3a6eca3284bf258b837a65290e92fe6e6853626694dd505f42f93592b9717d307e4b344cbc0d7e6557e713bd2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b59bf0cbe1d2824c95bea4090ea365
SHA1a358f7c0ffcb6ea9ac3b82afcd35a706a7c91a0e
SHA256b6e286dbbc45980a6bc7a906f79dbf1ed30dad3e368ec4662d9a242748adc42c
SHA51260e793be81b0fd38e625a2ea39420ba989d98277d38270da3583b97b318185dfa647a9c0485a5ba92d3c47c4b374f972b281e70fc604615c9cb3306d6727c8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aefa625828d3e3416c182e1a121036b6
SHA13100746bc06860e7b4c3768ae9e9cfbb9f0d12a7
SHA2565650d3acef0da6e144bfd33f0eb3da537f414da5230b866388ee1f9443a3df98
SHA512cd6a88fe76ae939c824a6547be92f5c5eae69ea1a3e3c485c89cb4ab588abb2e3d0ce66b427fe1c517edd1cf77f9896b181d70555d5f2289082a5a60d079d142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657ac2424aea7be43f2996c5238c7dc4
SHA15f86f30f2dbbb4887124522dbb201f196652e6e9
SHA256818eeeb5e5655f6df7393925a6a63d382ff1bc8050be7f47aa362cdbbca19e4a
SHA512e548055683bc3077d93fef9ee488fee9db5dfea042d66d08f54e9a665e70941f441cf90230ad132c56e65a630e28392b604fcc75039ce16a72f65ea0fcd295aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b