Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
193s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 21:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/2F4Jwn
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
https://gofile.io/d/2F4Jwn
Resource
win10v2004-20240802-en
General
-
Target
https://gofile.io/d/2F4Jwn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45E2E191-7C52-11EF-8F2E-E67A421F41DB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e8a90f5ceb84eb93de54466274f0603f04214434bd587f4dd90b378e34c0c52c000000000e80000000020000200000002ca46a8fbbe6dac750937810977d286dc27123b3241c01424bd125868488737620000000283f0741feec107e486ab6c13e2905dae97b1665e39affc3bda098c1075ce0e240000000e0d322458719f092a55f526780c62a45a52e79475f618c1b014f30f90b9533d51ca891066160dba0eaeb38a99e8fa8a92304c64fcdcc5d656374efd07cf833ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03e901a5f10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433549695" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2692 2696 iexplore.exe 30 PID 2696 wrote to memory of 2692 2696 iexplore.exe 30 PID 2696 wrote to memory of 2692 2696 iexplore.exe 30 PID 2696 wrote to memory of 2692 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://gofile.io/d/2F4Jwn1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd78c477489ec0f76ca7b693b33efce
SHA18f9788c8b9c457b1e3d1d4f63cfe4c863c959196
SHA2569c5ca99160d88202cb85c8bea158667707f66d3a294501ea0fa4c89909c76685
SHA51207ac2475da43fbb031a9998b10193d81ac7310069236f691fa2c5611844164b97eb652b9ba03228de9d0864425790f7d99e5fd5bce930279bf0f38814fc60669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577cb6ea43e1f9e34793d9f30b5090aa2
SHA1d617119074a3fdc6a04515e42a372db36538ba4b
SHA2566ac23d1e5849a25763a555dc736bd7548cb95d9f34d8b1520ba379a2ebd58a85
SHA512618211f12d174e5a64e8ae4d4206f1e25bf1b7736d7d0df474bfefe9df4723f917b7f6829561a44c0ce89e27fcf32fab37ff2de61fc0c28111011cb2f0212c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f2f785bd2155151153e5227a1dfc4c
SHA15d8f0c8acc477d40cca8ed419ad9de15f0d0cdbd
SHA256c552c7f118d4349eedc4b0db4788aea9b648bba99deac2ca1f0ad720940b311e
SHA51256bfdfaf47e4630be62e56cc9292431e7844bb15c3fde7ba83d4e54bdb32d491d3cb09e306e37f1d576fa79b615e71813fbba0d5bcd8a4931352ed610b4e0241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89c4cf351f3051c4c9930195c7cbdac
SHA10d0677816553cb040d9496a92528b136cf91ebbc
SHA256cc8e161f464c3f870765fee1e0fa9070384ab5ba048114cdea35414c81ee1e4f
SHA5128392c0873dbd3f7620292858a917ac7edf49cf06c3e1ff87cae80e8f8d564853f786decd34872e8ac52e569f7f8cd6e33a0e3cda1d2a0dc38138cbd61cb9e8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5428038ade8c527a82ff219c98275d
SHA13224784e08930b33e5cd72c007302f47ae20df5d
SHA256271c1a10145c80c09d7624c7698b104818a8d23dde6c3fc199b2f3ef8014d4f5
SHA51269103f553d6ee4c1d9b20df050fb729365086a4f0ebdc0d4a2b9cd2a92721a121e139218735031ece1d668f6296654c1087c928f49fd95ed6ceb1419154a2b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4921360eb61449889fca6c2fc296f5
SHA16617c15742e549625ab5a0ad60033b4b18e125e3
SHA2561706d5b4b14607582f8d295579b5ac5fa0fbaf961d1a0c254e7501a63cbfb7a2
SHA5121943246647e2d2ae1371b3b216f090034c099584f1a1aa76ed1a91fe2036702ec8af149ec9d50fc609574c7bbdb26e75a92c189b3ea31c43ca35655724ff01b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0ae17f4731abbd66d33f6831b678c0
SHA1d378a7a11dfe0a724830e92c47564bd7b49020e4
SHA2568902adaaa8d84a87cdd66df5e9a6748f241ff087a6539e1e3b79be3700a68163
SHA5126ee22a3759eb8a4b2763d0c6ff6596e447dc63b5b3b2b5f3d48d33ec2c519b88626afa6d6e271a9f7723f4a39d9f1594ccef89cdb8901d91ca1f60cd0c0cc7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b64100f0a4eea1dcef5da6713e2267e
SHA15514a79153dafc65c9cbb71f63552e31ba33d6cc
SHA2567a41c863ac6c1a56985a7cd71a5b8e41a07a9418589e22fbef0ffe964bf67775
SHA512acbbfea29254c1fdf6d1ef1ab9238f81d7c87f64f80600bcd77e4bc3135cbb27762f36226bd0cf25f252f6c5f96d06c3b51861d2d3a77bb491fb4a27622fc873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcdf8c27cb3017a11f31101779408bbc
SHA1fc8bb7ae9086c2c802d1e6d6d6fc7ae01fb6f9ca
SHA2566b3f631bba148d7c8b01a834d04cd4c7ad56f9f731f9591401359d9b95c04568
SHA512248a6c6112bf45642ef6938a2a02c64e037059f7bb10c942af61f82531bb1f5ca0cc2d35ecab4e5f683b2a5c181cac79d79ad6fa61cc38a505ab53a685f6311f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138cebe9091e6d7d7d14bf30d755a18c
SHA1b6ae948f166f359a62a85405de3673139b90fe69
SHA2569111b024cc2fc468f27d547fdfbaed087e996eed5edfa91ee83625514fa12edc
SHA512c2be0fc5ecd59e727cfe5e285d375cf176f4364ae977359dc5722e76f36cd80114f2ec32f4b2352bd64c36684877670aa39a1c9491395b67d819695275bc8d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f70e771791159d9e2ed0676a8b3094f
SHA16e8d21308f98c5a893fec1366b75f763d9880932
SHA25655475440f07af78be2cc9ffc1ca56dd270aec9fde58f31db63db892a5ea807df
SHA51239828b3ef3df8b130ae26339a44925be910629e03eba64e5f7c7c789d1f5ed2e6234576f0ae2ceae64bcafa573a674e369fe63b29ea6fcd25ddf55517d39a432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087f814fc546f0da037972e62c457d6a
SHA13383e83028f85dc4267c76c70b40bec72a242dc8
SHA256437777010a56cfca7472cc0904aca446cde565c00685bb4ae177b504b1e9a294
SHA512d892bb60304315aaab6c2088a340d43edc68b27035c621f7d8731af5ffdf185329e6ca409acccd404c23f36a7dd67eb4ac0854a32ef2f13ff3f93c369731d3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50577c343e8f59104e5aa703387f5516a
SHA10125bf054d70876917558461edf6724d2434d586
SHA25655d1edf4c9778b924475bd74d711ebe3d7a3ee42157edd15be194a06d8626bb3
SHA512ae83c0d1eda5d8397193ed8a2b9a842efc1f17c5a84ee5a25f67f00681103456d5f99c3f60799ed26b870b40d540b48420ab520f05f861cdb1e20f1457c084b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9f90a03207d8e10c27d5022a1935cb
SHA112a493156e1b5c1cee0ba302ac7f459f4c5d93d2
SHA2560fa7a4a5c0d2ec5db8d4f565a6b751e757aaff647f150a1f2afc394de29bd5bf
SHA512574f20a2c0362cfe1679caea8fbf5ed6117605ea0fc7e189cdfee1202ab4e2d8e8496738a416ab96ecdad40306691f4c8131eb31bf9478a595fd39e5507fd9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3b536300c139a9d8b46a35004b66a6
SHA18157842e63c2d67ad3dcadd0c7542dfd6d914fb1
SHA25601323383044c59e17ff8c43ef6fba87f73b266efa6c2d6fc0210096d9073f6cc
SHA512706c68ba07d0592fe3479f6a77695f5c40aa4bb83d3c7c80bb60a287ad1d63537b66bbb0b8fe9882b6a116e0df5641dc9675bdf2f7257fb14ed613357bc0ea1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834af8df94fdeb5a1cd9a5822064d5a1
SHA189f5fffc897d8e0661ba2fafa6c282a99a9547e2
SHA256fcac98bae21729006cb89ab480e84e9ee27fe9bd48d263f288e4c92da6448047
SHA512df259453cf559f06d1608a49907aaa2f6eb8b7cb6926acb95be3fe52ba8bbc14eccf26806b8618f6b9cbf48e53414f78880b40b7a8b3f32c2386113343d18f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56675be3c032f7ea19ce2ee23bfab29f8
SHA193239acbce58e346740c85bcbb32f3ad9b65d849
SHA25613b1b5e027fb200f54d12add11a0081674941a30ca90492c4ea402888ec7068b
SHA5126d23e6e5e0d5e5eb09db4e3d99cc44c2f8472547fc17e526d22196b00b1d071ab6031c6d4462773e2a44ada9c9334b0b96b9106e052c890d668db490c17ebf4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4cfaada7d5ee249ff551d8b5b2d2985
SHA1f702b29d5a04dbab84459fd5ed3354e168ec899d
SHA256d1d774c1f3783e7e95c1e80cbb6954fd5b4d5ce52091ce42b5474c639f142dc3
SHA512eff001b9024a946a4d609a388210d616eaebbcf2bcbb6a8b6f65af9b92acdc3ea3f995e8bdc831477a694e3358f3fd3ce5e9333da5461fa3c44c2bff59d39d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ced6b603018de2df50af1154ce4b350
SHA15cd4874cf5608feb910c0e7f68eb5ba4c90b2f02
SHA256e60a4f4421db00980f5bcbb1125289714bd0e7f9dae68e9ec0bfa24858261d17
SHA512d5093b3bc548c318486bbaa39af0513ced7f0609a0aab74942b5ccd7f841b1e8540009c42c582c54f91093189d354eced3766c6a7557a587956857686b09cb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e0456d66ed398dbb6ea4cd8993058c
SHA1d71dbdbfa462555e0369c3d6427405573f426165
SHA2565f373ede91444e0824bf5bf98c7338e6c60141703355bd9d6ab36675ff52edb4
SHA512619907b6d529e25d513f6836d173ed5d70ed87d8031ecd8b43d973637f9315e92ec9613745a3e419414554e797aa22f43977de62a1cb962d8ce0937cfeb3e37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffce38dede970d2cd7b42e014d1dd23
SHA14598f4629b07d26ff4234853e47cdbb26a3170b1
SHA2567c249e3ed06eab9146ff4e90aa624b4862114ee3afaebe2731f96c24a8459c21
SHA5124680565bce640b7de225ad577a13f99ea19923ade457e22ae907f1e8ec9d363d6f57673c1a2a06b49250e1771edfd5e80fc2cc62f60510d0cbfa62d95975fb7c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b