Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Neuro.zip
windows7-x64
1Neuro.zip
windows10-2004-x64
1表情/加载.gif
windows7-x64
3表情/加载.gif
windows10-2004-x64
3表情/喵喵.gif
windows7-x64
3表情/喵喵.gif
windows10-2004-x64
3表情/待机.gif
windows7-x64
3表情/待机.gif
windows10-2004-x64
3表情/手写.gif
windows7-x64
3表情/手写.gif
windows10-2004-x64
3表情/打字.gif
windows7-x64
3表情/打字.gif
windows10-2004-x64
3表情/指.gif
windows7-x64
3表情/指.gif
windows10-2004-x64
3表情/无人机.gif
windows7-x64
3表情/无人机.gif
windows10-2004-x64
3表情/汗.gif
windows7-x64
3表情/汗.gif
windows10-2004-x64
3表情/睡.gif
windows7-x64
3表情/睡.gif
windows10-2004-x64
3表情/问号.gif
windows7-x64
3表情/问号.gif
windows10-2004-x64
3表情/龟龟.gif
windows7-x64
3表情/龟龟.gif
windows10-2004-x64
3鼠标指�...te.ani
windows7-x64
3鼠标指�...te.ani
windows10-2004-x64
3鼠标指针/busy.ani
windows7-x64
3鼠标指针/busy.ani
windows10-2004-x64
鼠标指�...ss.ani
windows7-x64
3鼠标指�...ss.ani
windows10-2004-x64
3鼠标指针/dgn1.ani
windows7-x64
3鼠标指针/dgn1.ani
windows10-2004-x64
3Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
Neuro.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Neuro.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
表情/加载.gif
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
表情/加载.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
表情/喵喵.gif
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
表情/喵喵.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
表情/待机.gif
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
表情/待机.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
表情/手写.gif
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
表情/手写.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
表情/打字.gif
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
表情/打字.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
表情/指.gif
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
表情/指.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
表情/无人机.gif
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
表情/无人机.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
表情/汗.gif
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
表情/汗.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
表情/睡.gif
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
表情/睡.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
表情/问号.gif
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
表情/问号.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
表情/龟龟.gif
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
表情/龟龟.gif
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
鼠标指针/alternate.ani
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
鼠标指针/alternate.ani
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
鼠标指针/busy.ani
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
鼠标指针/busy.ani
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
鼠标指针/cross.ani
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
鼠标指针/cross.ani
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
鼠标指针/dgn1.ani
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
鼠标指针/dgn1.ani
Resource
win10v2004-20240802-en
General
-
Target
表情/手写.gif
-
Size
4KB
-
MD5
691b1a6f57419bdca1eef1b0090106f4
-
SHA1
daf582aaf650310b9874c50dd0e4e27b9267c1f5
-
SHA256
e48c6d8e2bc8fa6669b912eec2dffbf5e8cc210012904a460a066e98cc3702d1
-
SHA512
4cba149733a433781b5c62cf1ff17aa429fb7288f1d9af3b3679789a1b127b9beb61c4a7db8c4af719fbf4c507a3d12648b94b1eb3a773fd6f31c35969e4badd
-
SSDEEP
96:8BUybFxDBBOa8BUybFx/BGvqVFBIB80BUybFxPB8yqS:8Bn/BQBnDBGvKBIBRBnbB+S
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0877BF61-6AF5-11EF-8C8A-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1051fddc01ffda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000233a6a613ecfc8d2ade5b0841996cecaf9b684d761b0aa6e23b83807a12dc870000000000e800000000200002000000032150aa83b5977a02652df87e53b18d2f80dd5a382cfe859c6351b934ea046c2200000002a958ebc63ce3dab062bbeec13e5d1728c4296d5b381dbe58e5aacadf7623fd440000000b3b36916c7b2bf37a23008cac31a62d6bee430bd0c1340a5dc8e6b7aaf223dcdfd79c055e8cffa35076528ec48402c2ae138bf0561a5015efe4fab4d83ab0b7f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431640479" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2708 2120 iexplore.exe 30 PID 2120 wrote to memory of 2708 2120 iexplore.exe 30 PID 2120 wrote to memory of 2708 2120 iexplore.exe 30 PID 2120 wrote to memory of 2708 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\表情\手写.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce682224058608d5f9404ac88ae8525
SHA1fbd1d9001b4fed0092d33cab8e6dfc25b5d2e704
SHA2562bfdb1b29859beeff2d30adbe37362f566629651edcba0c117acbc73049bb69c
SHA51235c0f588783ad02edc0bf9a3dda88b6b4306f856ceb18d9d30129e4bf4c3b15b8af435f5a90b9fd0dc881be0b6d3e6976126c498c906c4dfe566a20b72590950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a98b0f3d1472717ce4030b88d00297c
SHA12f5044fd01943a6a9fc03d1467adf3e74193d1b1
SHA256d826cc2426b59289d36b0cbc593b12aa6727f8671b02a5f43dfca01b6f2355e7
SHA5121656f35eaa938373491fcac3bee60dbf0a0d8b967ca4568bf50c04adf28d212cc80eb3d0011dd3e6cbc813ea31f18b032ce85c0ed5f54ae2bc4aa2b9d9defdd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749c74212018464dd96869bea57df3f2
SHA10db4495eb4c351acb2e564461780355b2b735b7e
SHA256dc631067e3e51c12f860049ce98cd944045fc53bac2389ef458d1c5985fa1a68
SHA5125a08eb3947db8d675cef3637c46117a8cddb38523150e68bf2604580eca6256c538179a49cc247b0b9aebf483cd999c98d31091cfe364a48d1ef921c4715beac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54017e1fd872296c54859982318130075
SHA16462972adff3bc5476ee63584dbbf0d79309f891
SHA256659f7952f8ecbaaeccec2965df78e75940947b538fb59b50e2526f72607d58ac
SHA5129191b2213a5a40d104c27ce33b791c053c497686a594358f8c40a8e4a3776c5e8cdf1e700bee46f4eb8345bf1fda614c63c80a8b9f5a11b00118db285506106c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0197d51c242d2731860e419cea487b2
SHA1a3441bc9aedf5aeed5e49acf203063757e7078fb
SHA256239d1c6f8dab9715f3e75a1b5aa62d8392d8532be0ee9fc28d27f57e716a3573
SHA512c5cef226af333cc5c8907618c9cace7d192908d56e9c5a954da52328282ec7c7fbbbd5f7153d93b72717e4a4083144cae3862574e5f92efa4d49dfb578a8473f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ba3e77c61a833b7b622bcc638330e8
SHA1a0b5a1670be1e42d9471947b9ecdf60c72c6b5e5
SHA25655f0b283c18daa44cbaac9524c4c0d07f4ac3cb3f2304291158f64d32b5dedbb
SHA5124429534c892d69c876ccd26e87c5f9cd1088b53789ad2ed4e23276df5a619b3feec790de803f660aa380a8cca40f6b895b98ea0107f4c9e04f78a63c6ad7fafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5691ededcb04fd328931f4f334b97633e
SHA17d1f2e16cb96b6c7f2a81e022aaa0d67ca5699e7
SHA256dbb6c436a28e14e7693f1a35834546e2ac1476aae8d0315a82e814891443245b
SHA512f475ffe11a18b6674379ef5e96a3c4fdf6be2b5a23de859167334b8c0dfc57e97f4c1862701652b9dfb221facc09ddd22e726ced5b4b9c649fa907d608940d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352200ef7fbfcef16121451b3e1c2c65
SHA13f1a06a114345f198eaa72b8f95f19f2f5087076
SHA256a3c5b23ba9ba836f748b0890f6b7f035bdb947943f45d8e29e8ebc5cc7c70bb8
SHA5122625d9c00af83f40cd8bdf062c0bc08fe61c2d7c78a65931476d10106474146c614069fc018f6b0809825972e5ef1587943614676a8edc1010e5fd0cd86b3e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52408a5754f344c477600ed50ea68b541
SHA15f53a4bc3e006b62290a4cf28b3e16c4d6fad89c
SHA2566cb7cbf007ffcc780ae3f87140dac9dcbe3afc1f0934caae4a00a002c34bdc3f
SHA512185d7df34d529f14db302040648bd9fc3d6c5aeea5408971b5036d9edea71b38e569d1b040f0e2c066a9c5e3dd31d9bd3ce122e94af6873be932a9a91cdd97ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986f0a4d8fd07f42c3d4afaf123d9d1d
SHA1c102be5b5dccfaf7e0498643076c2f1bdd15d212
SHA25680b21cdf32d53ce72df1f53d0e50ef0af937fdccf17eb5b4279d40ab45bf430b
SHA5122821a546a74457c71b87dab38e4f1b957ff002cd53cbf941ca3fbe49488983ea5caefbc9186997ad68d536b24b5d45f45b2a230ee06fe394603181f3cdbb8b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54218b48dfaf595f74e0c8f376762288b
SHA194eff47d7176a9b1a7c0a9a0722065c2e6337747
SHA256ebbcdd3b612a31c79623ea1f8f6447e7f24eac3a08c56f9cff2cdc0a91c06a88
SHA5123ae94a2f86590cd27b69d3a908abea63eb3563436b5c0446771d36706d4179f9cfbb05e270bb1d6b97f23ca1d171db7616620f8c533b563ece3d1aaad8808392
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b