Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 15:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wsw.youdaomiv.top
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
https://wsw.youdaomiv.top
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
https://wsw.youdaomiv.top
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
https://wsw.youdaomiv.top
Resource
win11-20240802-en
General
-
Target
https://wsw.youdaomiv.top
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{874445E1-6EC2-11EF-9E5F-7A7F57CBBBB1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432058602" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000047def95f2762110169a3e8a168cc7e78e99b6dc98fbc92ac190a335bc4dcc41a000000000e80000000020000200000003923ba5ec483c036d0b195f0a6d885a804bfa2ef2d2a9aeb8447f2832cd1bbb720000000398499c32cad08e45373cc1da42140c4da5e3f59cc32045fd4ebc156ecc0bd1f400000001f75880a0af9400ed00e5a28acae6126a83be65fc8227c3776bbecb9758ef3590883f9208fa9516efbff0b37df670dae9bd81fa5e83a45ad3b0bc0c8b683802c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805f3e6acf02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1792 iexplore.exe 1792 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2772 1792 iexplore.exe 30 PID 1792 wrote to memory of 2772 1792 iexplore.exe 30 PID 1792 wrote to memory of 2772 1792 iexplore.exe 30 PID 1792 wrote to memory of 2772 1792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://wsw.youdaomiv.top1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc1483631bf72ac166a43ac4e5cb186
SHA18f3b35f10391d823f65f2ab7bdc1e797630e16b2
SHA256e09b52cf3c5ec78c917aa2b6cb3b62cb97975e14d73862049c6af8cdd3fd308d
SHA512af1011f958ce9da90430ee110928c403f7f25a10410d20d1605be9b7fafc38ad662e0b7d291a08e946faa8b6f6fb4914282f5f7c5dd6e1d0b70afe10b2cc0fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077301d52f474588398438ba2bf3ebe5
SHA126720e27f2738083b458228db517af44bfb9825b
SHA25651bc9bd414c49beba1a4361ec65537ce7773bdc5ec5b203c05182210407621c4
SHA512ccab43b89d1979ea12e6e0a10ba995414c598def0b3903622c5a36792a1007b45e8d7929b0f9e8b9dafb7f57fbbb337872ef49a970af3c70108d994c6a96714f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d78196d7b59a3209620ebff87f2e3dd
SHA17a5076f5c0925d6fa1fa39b9ab9dfc7e5621aa16
SHA2562f53d3780dab953cca8b1d2ee91c0d84fbfc1a442bd8b261ddf41a4dcbd7d915
SHA512884b1a73fc5ba8f9020ff6ef9dd583d61878ebf5231539b3bb300aac30670b3ffc920cad75de3615fe4e92b35e8062ba86f73106d28f1883db88397784a9b323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d79425a282969f3ed8c21cb6e2ee215
SHA1ff0fd29d2f9a1471d451062b88387c03c40db652
SHA25691f3388cee94eaa5f01d84e2a078757b955b903d8295ef80a3be0f2556b49e36
SHA512d986f9dc3ca93a1e5b6bf329de52258170fd3a18731c103a7710e8d228e29b3c18220a1f96ffb9a92801fce90f6f51d8e26acf354d8066a7555a2428d6f9a7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550298e7859f0b9009471a0e3d66e2f06
SHA1cb12b8c606c0e6ce4fe2873886c142b59381bd59
SHA25680a60b94a482dfdc5f2ed479470d176ad68375bf6e9661eb06b8379b5598c4eb
SHA512e7762059c3808df6f24eb5687d347dad5af9c3086ad0f3369c33c329363e1a3a4c8c979803659852764375d82799e5c282b77330c0d96df272e7495e0217e3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7359ad119a4ccdf60f18a6c70ca4e40
SHA195e7ea1cde2f4e08efcb1ebec990d6bba2bf25b3
SHA2563f99255a1be911bff2a6c9897a90a2de87b722894b38b29d4614f871f53e4bd2
SHA512dea74e20fb802a722f39f0a4abdb16ec4217391dd5402946a459e72b1359743eac2b6aca606cd0bf25abbe4451489156679fbb7c9fa9c51f42a53b6a72a14421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51b0275070ec01bfd4036df5055957c
SHA1e1c255eb5f2c50912eda8389dca304d27875861c
SHA2560ddfa1d1c49ca6aeb79466af4a72dd0ea6aaceff23e3321b2438e728e09ea723
SHA512c9fad2903537c6be9b9a904471d5f79e5e9922e44770135137b5deb9265e532e493d4b2e9a3f3c1affe5f868a20a483f2a02f298874cbe331eb6be6040df4b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782f990860fae62b10dc6e9469938c76
SHA108f9cf43c94639ec266620837c6e05796e705615
SHA256e42d878f401a3183cefadb5c5febbbe7b76a98266bf90210e905ea0d7224ec34
SHA5128eea9110cbf582edf41ece9c55c11b7b443b8fdbc61c6d421b285665a2a2e0fdb99fdb4ba545780eec9f4adb46b26dcb322dff27b5048625310f705da1f33dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53616bc0ed38c66fb5a6c162caf40abd3
SHA13cd1acd03c0c87607e2f8cab943749dbc14006b7
SHA256409d2a3929c3cbbc90574d29ab247ec6799e5757594afd10e4fb8df37a54adce
SHA5127ba6211db6d2aa0940353571d9c47394a20db6054e9928e427a3f3d4e2f060ac155cc3948282e6cce09fe4067577e35c3302e831271531a04775a3a9e3da6620
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b