Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
218KB
-
MD5
f7eb04fbee28125ef4718e20fddaa8a1
-
SHA1
be3b93a46ca8f49ebccde3dcb9db9eace4bac4b7
-
SHA256
eca5ce8d562b67258f10d6cc9b75269d2b93e8fd3ca76d179e09445d695a8de5
-
SHA512
a27280ca45ddcca9d27b38406cdd551041c6a2df640d258431a59a55407312852f297751330bd1bbb941df69280e4b6d7fd1918cde795a844011aa0cfad48d30
-
SSDEEP
3072:Sd48T2QpeiyfkMY+BES09JXAnyrZalI+YQ:Sd4+2TnsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59BC1E01-6D2C-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431884142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 880 iexplore.exe 880 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 880 wrote to memory of 2812 880 iexplore.exe 30 PID 880 wrote to memory of 2812 880 iexplore.exe 30 PID 880 wrote to memory of 2812 880 iexplore.exe 30 PID 880 wrote to memory of 2812 880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f7aaffc6d8cb068de0811410ab4b0a4
SHA10da2f60573d41dd20c804d05a8f71638ac98587e
SHA2568d26825c97dd73519a524dfed9284c3d8cc2ecc9d3e9adb69ca5508c3b4c02f3
SHA5123741a207b451b6f684d9017b2a57b36a19a05481944de4d54ff87da3d342aef8fc5d184806f6f91ae382a469cdacc6d5c4b528440db7d4d990a00ee3f39ba843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af23bf37b341f0f8f6fe6fd57510aa50
SHA1666af8a4e51fdcee8f72155f0c01df3662d66222
SHA2563bf699423a4b9c1e7960943bc9f5d33a8a951574176aa5e4e71052d5b89459cb
SHA512d8fdc42b230ab1f518660195cde37551c23051cc8e5e95b7d66c53a9665b00be63969d4f9a38f83c9fb3cfe0070b858c3d528cb09a6b067b7195cffc67493026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9075ee80f342f2aec064a2e549954a4
SHA17c95200e1831705b9b14ff5100a2c2bbf4f6aed6
SHA256cca1f56fee3b260bfd7cffecd137db76543e560c5af96db4437a13ceb272fcf2
SHA512762d4d6a13aba5cca44841d757f6abe868f69491b662168fee087a864200cfef03f2d9e67cfe61f6464c6708f52ade668a4432544ba29c626c49d04ee928fa8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f676440ff628e2101c89dc4375e75265
SHA16bc68513d92346ae058528fa13a534be9cb10e62
SHA2562cfa8be8ab18bad0d3bd699eef1bc1326531f876d69329ba7d96d996405c1d56
SHA512baf87eba026ff12e658e7a05d373d5fe0f8367bc219d7fb4fa7fd3dadf0581b49b37db2f33fa5f58e8df0a12eb9424d54289bd4abc6c976906cd46242d078b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaef027b5a1cd5d7cfb92567a7f51a77
SHA1fdcf9b47ef3b636e802f30cfd4cfae30cca70020
SHA256af2a16bdb552e90b62d5af938c5946dfd25612fdc55cd4db77560f037b518190
SHA512cc2550070122059d0fa21e7abee826e9e5767ce67eba0a241d84114c654cbaacda8a707031e07e5571e6ef51dc631ac765ea476567ea4191bb8f0794b7807010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a090cc560e41a0a168d6a2f905036636
SHA1e78820964994c9feae70749fcedee027d8ef62e2
SHA256af3cbafbd00ea2b163485f27329bf3590c9a40a013ef22ccf6c3126968b9b1e3
SHA512c1eb86a95bdf2e15f9fde86422a1328af39a6ed687aed6a60f4d9a18c48b7637bcac863997f3ff4c795b2d249641946325657fc3d7c129ca2d201682d37a1e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae77172f8718b038e427c8fd4422361
SHA12b65c0654b53ad9a2855bfe5a7eaa07e46c339d8
SHA256710ee1f09fa2868e260a2156bf0963a6dec8e9f809836f02e22e3b0afba50bdb
SHA512b0771238fde8da41433c244f9ece3a458c93064f07b61ef6e46f4debec0204e52b476ddccc1a0ea3c5999c07efaf2e15863ac47e31c42d463363b3bcbb4e1412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1bd909137fef290850537f7e9c65cc
SHA15eea02ce0387330591ffbf2f6b3832d465404a6f
SHA2565340180ae9c67342119a5e2318a8c148dfce05196e1334e3bdc5a60fc53a8712
SHA5124899761a2492472470aade5247dfccd5066b5dc58569def735fa60484974651e70ab70489f1065ca1af513b8f6143b99dfff340d3300a79b1b147ee776438f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ee17eaba7580b33ba80fc72adc2134
SHA128d0d69a31559fdd434050ecd92273af0780c066
SHA256401a5432a1ecb008066c66b5d350f91c81593a6664e8d0045ebe058539366057
SHA512f4055745442e9a5ca200b879c77cd4408508be7202fef4d1b20d894995b629485b3aead4699a1a09d72c5b12c0857ba497b532428667c36fa5b25c49941f1698
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b