Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
PCHunter_v1.56/PCHunter_v1.56/PCHunter_1.56/PCHunter32.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PCHunter_v1.56/PCHunter_v1.56/PCHunter_1.56/PCHunter32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PCHunter_v1.56/PCHunter_v1.56/PCHunter_1.56/PCHunter64.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
PCHunter_v1.56/PCHunter_v1.56/PCHunter_1.56/PCHunter64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PCHunter_v1.56/Readme-ZOL.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PCHunter_v1.56/Readme-ZOL.htm
Resource
win10v2004-20240802-en
General
-
Target
PCHunter_v1.56/Readme-ZOL.htm
-
Size
2KB
-
MD5
cb3eedb39a4b19375c929dd1ce6a671b
-
SHA1
c9321aafb5c98195aa35a54ae30f8aed8530d589
-
SHA256
7a0421963c81fb48f71c8a7727d9f33ec023b574befc6b35981aa388279086d7
-
SHA512
3dad8489626f5d87c6c0b8747908643a1f59df421821688ac272a19473f73427e707e4cea981fd1274d03ab597d22758f7c91f575369b15e7ab795d01c88e12e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000960cb5869aa442e2662f572f6ba1af1d31a8c18de2227f9aedfe2c60ab2d1c74000000000e8000000002000020000000cc7f64ff87507706cb3986455519b3b83cc40b306f9a52b47035e1d93599c261200000009b1c2fef86e33b0895130074140f482973cea1d6ddb27d88b40632959733fee4400000006f4626dbadffc4b95519e8b4402f2c14e828a88dc35b5bf774df7796a1e865eeac42c723fe1f7e7676fcb3b58e4a24befdd1a8a18ce5a387883ed626a46aaaca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCF7B5C1-6B65-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431688995" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0093cd472ffda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2364 2116 iexplore.exe 30 PID 2116 wrote to memory of 2364 2116 iexplore.exe 30 PID 2116 wrote to memory of 2364 2116 iexplore.exe 30 PID 2116 wrote to memory of 2364 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PCHunter_v1.56\Readme-ZOL.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58021abc524f9f46fc2eb98263f0a0d06
SHA1bbd3a7605d6ff3e1746477bdb7c0c8abaecea9bc
SHA256cfabc18a0d7632f96e7734a0347ea6cd5ab3ed29661f6b4d78259753e2d8f3d3
SHA512ec34e284508926bafaa7bd1d385495a5c12db0d964e42bec1347afd4024e3fcb2e4c4eaa2738abb12efe0dfed60203a5076f80a9b8e855e6d2ac39ffbc8a3f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ffd2369af5f05c3b063f97ff3326bd8
SHA169276c7d4b666a5707a3b7ab22f45e5ee8ec20b4
SHA256578c38ebf94f8f16023451bd57b1dc7dd73c1864ac7528f62ac394a048ed2b51
SHA512f6a9c300773c2e1a657336a74b67d3f63b69511d0c0f0be0c4416f7323390c9b415686d88ccaf2023ad847514ca6495c100b988dee09d75d55bb2f19e7515ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a06a4d29a422ec365e75823cadbfd93
SHA1715279e52e9c749ecd5b6c6f125bdc9e10ff1cf6
SHA256a1be5635e06b609995757af122874d6983b07f6dcf2e44a8adea804ab3281d11
SHA5126a70812d8bad5be374856c01586afcd5ff806b7d9df446f10476d3c830dfe9e86274e1ee5677591eb52ca65e0bae6800d2eeba93ca585b97da0fec4be2dd9c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534dae4614f29afbc0ee4026d7978e31f
SHA123d2b1eba39b913fb532da9159e1d5847084d5fc
SHA2564bea41b72281644f4b7f21708540afe23496de8783a52091ac5114b8cc6b9f50
SHA512bca306eec8631555282c7c9728432a138e0b08e67fb74380680d1346ca10ac1d27ad8ac866ed1a247a1bd35f91b073ecc9b9a7b2f554a49d7ceba2ef23bec9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4497bf25ccd1884e12d3b559b6875f
SHA1f590688a47fc991f711348843b964a9375b23993
SHA256e6bfcaf483c329431004a7a6a5efab0d117f18e52e6550b11b66100d04786cac
SHA5121ba86f01fec1dcc2672291f84a770df3c3c6c31d272ec7a9a53f7fa5721874573f08641f7f9114d5fd282a5bc90014ac6ad98217329b80925607d9c5f8636e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34a9d3a9c7a4c910f3d4259fe8ac791
SHA118967924a7a4ab74944d94402bb538efe7efa7d7
SHA25604ba980771ca2486f7a4160799170d10ac415c514dbb44dd01e7c3d03a5eda8f
SHA512119f214ea11da995b5715ce9d9a22d04793078438b7fd778a42fbc366dbcce2755c08833c4abdc99cdfec9e3c31092d48968157a7227c866bcfb8a453de586b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50922f36e35bb7c00e1619da5e4d0f818
SHA155631c5b12a220f586b9d99cd5263b35bfbc68ca
SHA256d8e36a1dc32db8023b040c84a1fab28e427978c2e87a98c65dd36f352101f932
SHA512ccb516db9974b4c403e78af43b03d7b6f266b2053b2d7bf78c3b367c4ea7c701a495adcccaceab2329f02abd12a35e2ff753261881412820160ef0b50217e692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1cfe8e923ae7488b11abf62897111d6
SHA1654d54964a95ac9c100801e0ce915204fc2a64c7
SHA2561ef70d4b09cfb42eaea711bdf05d77713476d02b75ca85c8a5f6e8da9f744489
SHA5122ecbad67ef5e6990e06960ef38eb80f43921db580387be455cdc7e3f4be0fe5c385805fe2fcad8db86b82dda8857395b64fba7c2c6d30bc7cbd0438146f59b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57acefe796eea09bde890bba7aceb7950
SHA156144cd6c71e71dc0fed6eed4c773d067ae9312a
SHA2568f2eab8ecea474ce4179deb6bb97329ad2fdbf5fe005e4db33aade9adad0abfa
SHA5125cc16dc7bf835a1b1feba806b39a46f94e405ce843119355883a6aceb92706d675ca40c5af9682ceec2045e6c486463791b53e4f9cf70ce103445d6a427fd2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e366230217e2cc013a5606804713cfdd
SHA11539f00c71630bf7c6c31ff65765f543cd47b395
SHA256fb43a5e051593467a319b42ef5b8990bdbe0292041f1ecc6fca913d66a965a6c
SHA5125c644fa2c50e4b205f3f0cd941a04c675a5b6014da6ea7cc02ea7797b2c11808c9cd4838f412032a14f5fc2bf6530ed7967ab7c2569e50f87b52031fd35a0290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1902f4e84c53327f924d99f73b58562
SHA17aa8019a722e6fd3214072306948b97b760c4fc6
SHA25605d55d442973f626c0bb52ae5794623f58c28754377faee50971118e4cca7c23
SHA512aafae13acf0c9fa77f790bd7cd7d33112c8e0850c70d61bd1985eaabe9095ac03db4ebb5b2549643b336bece0d567fdd3051b2c72673e4ad4edbfbda7fc03bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5129c5f90de0452659fce77a3dc7a8b84
SHA1a5818829a17f661f0cfc4887d745be086d679b10
SHA256787aae4fbb70db1efb0b7449430d50e9e98db741562605b736c78877f1aecc82
SHA5125bed073c56305bbbcae76907c0615ed4269c00fa69e95fa818dc4cf6d17f0808b3ba49ac2b5e5cad1a053d79ac8186af9434e977af3e8302973a7b7f6fb59f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873e9051bf741bd4a9f94a7c1c7e43a7
SHA1be413b86bd957d0f8ed12e42c2e43dde40ad4ece
SHA2560ad321e25d61ce8b0d9a812ed563f67a9f09ed11183dbd14e82ddf7fb3a5a0fc
SHA512fe5d17ae51c14f57979b543305ffbbf837e1f142e99ca34771308be5e88b06bdca7aaec1dff3324ce3770c24cab482d9d96ee579600134683c244ab7fd7770e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56022751a478e21b517ba0fe8f0f02578
SHA139bfcf39ff95672efe3e56e60b69835981473a9d
SHA25602754cbe01c98d4dde70197a54c23b05948c03665fb020106c44b0490a570849
SHA51271828ce6cf187728c5944ef22fd188f524c405c2dca311694ab843c7581673c563f0a5a26d5220e4591c063581ed4b79e33845329f3e2f27c64ead7dacfeb783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dfb8e9db969401a2f47ba045ef51ac2
SHA16d65a7c384b22462a70fc1d2c6f96669aa7c6338
SHA256744850e0db9818d24cf672ccb01a43e4749a722b2c7e84a418e91f6518b62ac1
SHA512ea3b23097d27239561f7bbb24fd153f45a5cbcaf7faabd44736e57ffa6fd60192afe49292f8abae302b1f0fcd8c1a6a3f7983833fcfc12c2525b4485efa02be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601ce48fb12521043a24830dcabb8e72
SHA1b817fe063bad2c25408c27ce16ec9a12b84f0a1f
SHA2562871a856eb91a7ceccd91b7a24e1115c2362ae957914fe3acb85ecadff72e891
SHA512164d2e730730e2c9c51d13d169dc17578b91d1522db9e6cd27fefe614de47a31b55db28a25cc2e99280e73dd87cc28e00da87b1765fbc9c9de34982e673771ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b