Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
Feature Status Update : 4JVHV.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Feature Status Update : 4JVHV.html
Resource
win10v2004-20240802-en
General
-
Target
Feature Status Update : 4JVHV.html
-
Size
3KB
-
MD5
0cf66aae069da3bb068e979c6c9281c0
-
SHA1
d3dd99ae6da77bcc85e9de3a1eac7208a7505115
-
SHA256
ff75ff0a15621abc166b7496f0195f3d3a03f0b9196b9319d5e8e7920641e1d1
-
SHA512
e6669054f97b629ec5adbbb9ddddaa61b7b83c245fd11965da627a554053e2b00d8488ee65622182701da0dbce9dc38a2fd2c5e65db1f21664508b6a061311af
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d252f9c6d4afc95a38d27c28171f08379d0e67ee2534831391c654341aea5ad5000000000e8000000002000020000000009be9b9d632135a4e7cf9e7a42464b1dadae8b8f780083f0734b7d514037d19200000002a0db94413d9cbc0328b3e19bdddf30fae4f7cb14a2a78a4e164e5beaa89fac74000000072f8f1933cbb84f8cdd1a4032dd55b412d00073a07d82a9762a375f75d4a53db3f7a67023b4eb5bc826206fd88b988b0211eeac4e36b56176e9c474cbf5dc3ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432369234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2038f0a0a205db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC07BE21-7195-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2964 2716 iexplore.exe 30 PID 2716 wrote to memory of 2964 2716 iexplore.exe 30 PID 2716 wrote to memory of 2964 2716 iexplore.exe 30 PID 2716 wrote to memory of 2964 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Feature Status Update _ 4JVHV.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d6f56675d5728b9137fa9264658200
SHA157c0c0451088287c0149d111de611fc3789663aa
SHA2566c22e9f1fc81bc2383b1a5767636f3555b4cd725f3612c55abf53ea59194f5b2
SHA512250025763de948a05d5fedf53115ca2e39032ff4d86526148ce3eafdcd93f7bb3399f11b19e622a60ec981c4ac4248a9938b6a6144b516ed4dbecf60f949242b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71bf6025d2260cff18e2f5a7f69df8c
SHA1bca7a40818aa51509cb896dd9667f424cadad29e
SHA2568fdb9bc65c14549a20755c97d74a1692bde94cdd9b8f22f58dfa06fd04435f35
SHA5124522f506d9091c81fb87ce1f1f30b19067aeaa89fabf5b742c3a4e996661cead4a379920c56ce27d751ca24ebedcea0aa43fbc63551caba1e73a8925115576a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ba3e26b54d273ce150e707e13816ac
SHA13169c102d2de280dc0888b04a9161c907a3d1a02
SHA256bf6b7e1bff9e92903f8f41ab439756d428c9dc63d2ac623949dca838526c1860
SHA5129e3ae0e25f34ac29978ee568799ef2e3185b51fc07084e7e9e7c2f9935e32745c30480a4b1ca6927402d582b8eb36657c12261a7150bc7ccb1c03e9dded6ff12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a327df67a960ca2321c6a1a0058a2f
SHA1a5c17a7417a678dd9278dc901c7dc8a666d39a23
SHA25619a7d1ac6616d74cc5e1e22f3e0f931b4a9995b069fe4fbd4d5a02747039b12c
SHA512951189dc490ed7a015d7c391ffba7580c3a43e608986f332327430ae4b782fc94c3025302d9ce4ae26f05adc03faf0ebcd4ac0121d1bc083b954206e72ed3766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec62633fa1c20af61dd1da4cb84c6b7
SHA19cc99cd38006a616828aa19a741f4e9d384b32e7
SHA256191a936d69856b990ad976f62e6732dcf863b8f293ac51749bfbaafd567bd8fc
SHA5125f05f6eb81e261d9a11ca8b8e77f2e5b45d82bd2d8867f889ae1e0d6bd469d3b46bd80a5f0f71eabcd91cb011f20ea5e7d28aee4128e4f4d1bdfa3a0c15a24a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d725850937dd47de15b69a83901f56c
SHA1fb2ccae8dd969935a5e65b48136767902b9b90a9
SHA256b322bb8212a143d8d9f60fae1b905b92ce7e8d341ae216610c7e9d3d1a4b02fd
SHA5127b8d04094bf2177c9f7a65b46287a0499575b5b21826efc24a43571f4eeeabd796f242329307d5c608cbc9ace17136942faac3882793113579ae4da3b93a2885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12b1787519b5eef0941f34356ddc838
SHA1fc1640af72a5c2b0719f5a57148173233f602428
SHA2562f1d7501f6d1de571ae8a8bb5e289f04cb519191abcf6129bd0a9e062f6490ff
SHA512dc7626bc7cbb9dfd7bca391815358ab3266e6b5ca71d048c8094dd4ba0aad48a67698afd9ca0487d2afe18b9554f2ea148ab77177d514976c84118ed2c987bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54390c6cfb82854d7747968757e0619e1
SHA1cc3461f925aac3004a53215e56065ce4fc21539e
SHA256788f8012b38d1195d8bec01fced488537496477d5f790471d168fd721e61a620
SHA512e9ec41f6a05771d3998431496962e3816c8d14f3d122ee26109dcbe2cd48612c0f9403152f4650de1c982eae410b2563b8c83f43355f792864486b866180f226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8327311521bc779da122e5778168dc
SHA133e80c6481797d33cb68edd9acf6dc34c6d9a5fe
SHA256ebee33d326d7bca55e5f98f2beffb3404abeb7d33be65e7fa3b07dc2d8fa2188
SHA512780b4ce2844f4a3a8184a961612a9a9f1c66f046e6a0c33f885af03adcdd584e056baa4524d175f3c28f9b78b8f97ba7556e5b016c1f08a6cf5998f6051138ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ae5461b40342cb179c907672c538a0
SHA1cc43c8d95694fab4107870c8b09739a6771d070b
SHA256a97c2c56f181b150e3e0ee6db1d44a529c05d1175e1cb83f85b2bd706994cf52
SHA512ee5d926e321bb50d8b796d6bc8bac392a90681752f04ac1036d5b7144fa14d2a871222e429e017306355140b265c87009ad188ffee835e6a588802f3f92e1cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc4edd46eca4371610325d52baabefb
SHA1f3061d4c84e9a2041de9af0a3423d1fd0d737e46
SHA25653e1cf3e39244f551a7d0d0693276617fd605f19cb441d606331a7801f791510
SHA512f66825bea8c595e701eee7f525860752d4ad880ae03e03f19c1414429b82a62b6bac5212b0c4bd8616df68ebd17f39760efb30cdb2f9eaaeabf7d4f345cc7e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0cb6ce55a84fe67fb757851596162b
SHA126b6e33a66139545031f7e52d3f13faba845a9dd
SHA256b3a5140b0145f68b8aa230ecfe2f24d9a13d1a601cb18eaf672b672d15624f8c
SHA512d7bb515d6de1d445d697ef08717546b262d0ae44ce4bdfecd94b474fc7c3bfb7fd451ebf15f71c89263fd750c1fe08aee0396da83003feac107645ff425f9a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f51fa32256ca136c632e9645be86461
SHA1206886363bda0f455a03e6872b5df228d533ba8a
SHA256788edb0111e469ae4653f3e66e32db24e3625076f277c73115d60c1984bf1119
SHA51290dedffce42724978a53d72f9ebbde2191e18a58c4b91b37f8af42e29d6f770d155e8f59b0930212bfeb80490ab2b0334fb711deb4b9d111ff175018d8c13f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57854117c2248f9938aef73089555a648
SHA13ab9b85b204b39d57bead69daa23516e1ccd6fb0
SHA2562bcd29696702f8bcf29fa0c7ab4935dc411ff7eecbc8caa44d0c324608828e48
SHA51221b80793a55e7f6f1b2e848b675cdae00115635dd4366b291288faa16bd6cd2e8e4051a448b0efc32750e7a5a4592ce5c1b87370067c88ef70f6bd7e769065b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd6894b3055995dcfd0fa9228cabbdc2
SHA1d58303b83117f2153d344aa89ac99c429b47c6c9
SHA25641a9e88bd9e1ed3e3b9c85754164c6f101c43d6642cd8948d022e750b59ae3f9
SHA5121a78bb250c9a14b60472824173e88e0a9fafd835278decb1c2182628a4e5d1c4ba2e0d1ee14680fdd0bf70e5190c48e1992ca89c629e74a332b017f4ba166da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559124f047a9a83257d350409248c3b3e
SHA17f52c7d81d1e4f002430b105dfbcbcc07bfc8880
SHA2561e6c9532520133d6ce53e95277ad02ed177554ca85d0b0378c8eb29dc39f04b2
SHA512838edf87957c44c380582375d4924e6457d4b73439421bec46799adbe1da067037fa5695a8ed92226c0982d7d5fbc95e570f2ba05cf6271bba8c800b17d873b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505768a4c5e13aca88b2993492dce1abf
SHA1b3258ed960559137c3fcd882662a41e705c771f4
SHA256ab18a03336612e0ba02399bd4dbac2657dbfbfcc756ee21cd5503ed0c60310e6
SHA5128b87f60d1b3507eef039e0ad5dd0442b547c0e841c4b60dd5640960e4a532fb0bfd77095308219e82ab9aabb88fb9a391b1e0b8162da842eba7c5d21f89e4ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9e883171f2cecebb2b41229bb052c3
SHA1f3bfcb12fc8132db3f99dc60dba20393b894f0c5
SHA25637a29b5ed1d00271171e4d2033a44588b5c9fc7bae6a1255416329e21e0c2add
SHA512acd12eee564ac261ed28d0f0c691f60776ff215a2095604878302b40cf80c11273d0014acf99f2691e58e12d792f0e436c45e956f29497160a08eb63832cc97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5594aa8e41c69bd525f6b35f8f6141ccb
SHA1639be79623d4b01e6611bc0de3279fa912cfe98e
SHA2566fc06415bf84389163826a135165f76105a1ad04b016b437675a56969c8f5d47
SHA5124192fcb2a0d890459206119e0bbafba59ed69f6460ab9ea0aeccc31282254a31841a507bd9bfb1a055aa32e725277cc2faa6762365bc58422f6ea5a8ca510499
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b