Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 06:34
Behavioral task
behavioral1
Sample
ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe
Resource
win7-20240903-en
General
-
Target
ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe
-
Size
13KB
-
MD5
f3cd8c95f733200bfd9d5dcacb838f30
-
SHA1
431d865fcbcbc5bade51bd0e88c8df65282b7cac
-
SHA256
ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4
-
SHA512
97a49ca386bf5929405b2a9078cd08857fb834e6a6bef0cec355a0feeb4ffc168a18269e3e1e490026ce4f06fa6dc52ab668e4547176c4fde1782c4f11ff4b9b
-
SSDEEP
192:LUL9dBH9j/sAacntGaaQen27LDpgi+S1rAr9ZCspE+TMwrRmK+vhOru:mzacntDr7HMAReM4m/
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2700-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2700-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 205e5b69a710db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000029fbf61c02ef3ef9769d8b9ac0d950b66aad5bb19ccf8dc3e57a68f6a58717eb000000000e80000000020000200000005b5a70cf1f877da36f883757343c7ff7bff81b826f7f4d6c623cd2fe486b2af19000000065d1eb3d87ec20184d0d2f743e37980a6fa6bd9e6cc35923b2100db088d7c09ac008d5cd66c1ba239c5dd6af8fa0ceb38d563d5f7302c3f169cf9bbbf5f68844bf91a35425b8f5862c7c2b05f4beaf6329c4391cfdce8af55776d3ceb43ac6eaba1a93d2ed18fe7ea0bb419b40247d9165633e10fa47cd8f3a31e7694054126c2edfed1dd2900b4595e1299952a57bc24000000020490cc417775122dae6fd3c085fd7c008a76a99c58e9bfd8cc3ff1f38e24a0c0b5905b11489308ac0decd91ae62163c134e70a8b5f8dbdcae28229155390945 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433580751" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000002512ed5f3e818628d9edb9622772652f9001a2a27869cf36c953d7befc8202d000000000e8000000002000020000000d3662e63a8f87a6d50069e15c1843a8eaa45baefff2759f9c3ae1d7d2043509820000000d33f1ffb5daf353c72a0b60ca3dd33e65d6d329fbaae9bde4166354943508f2b400000008f8e5765732aca30df65d51bf5b46268bbe335544dd84c04ccd0ba9be25dfa2bf3f901fba11c6982f8371fb3e683a6fc2c588400e89454acf0a7e0d64c4a749a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94C02961-7C9A-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2700 ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe 2768 iexplore.exe 2768 iexplore.exe 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2768 2700 ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe 30 PID 2700 wrote to memory of 2768 2700 ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe 30 PID 2700 wrote to memory of 2768 2700 ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe 30 PID 2700 wrote to memory of 2768 2700 ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe 30 PID 2768 wrote to memory of 1508 2768 iexplore.exe 31 PID 2768 wrote to memory of 1508 2768 iexplore.exe 31 PID 2768 wrote to memory of 1508 2768 iexplore.exe 31 PID 2768 wrote to memory of 1508 2768 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe"C:\Users\Admin\AppData\Local\Temp\ab7cc1c49e3739d82bcb0519536c762a2d775afc6d809adfd6cc993506ec7dd4N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.alpha00001.com/cgi-bin/advert/getads?did=432⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f295ffd78d95e0052b8b2ed878db7fa9
SHA1e43f55341f3a322d21b58d528ada5322ce5e3f1c
SHA256cb554443d5876b471e3f63782a51afbb468e26bda15d3c802dec03f47cf7261a
SHA5121fb87b2ad2251241b7b7321da366433657bbd4632796f8db11970ecbb7db562ae9a1b14719164856f44dd1e4eee64e62a1e85f9f332b03b19b1ba94187116e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594176ed8136b4ba98f0e248cb41804f9
SHA15c1ec5b0c9837d997f395ffc5d46c8391d5da3c7
SHA2566d1870172ce9faadf556b5650a6159a8a5ceb61582117ec8127d6cadc65de06d
SHA51205e3322025c9e6ce7c799a09a5b5e616add67ac159cc442bf963006beb78a76c8f07461fa6486ced6d65527fef8a6d6a097146451252fe4781061119955cfba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8834c0857b6e593b22ac7f92aa1a955
SHA12a98be0b50357b0c6bf0fb2988091e2eccafb224
SHA25698f3ecc8b8283dabec8f03ec12e599b5e2f9a6049d3f71d03f5d349b62663486
SHA51267e50a1133deb3a08bc0b3087d0a373152ae6ac90c3fa3e2108f3c4aab58e860e59460c04a00705ab6f42d13e88ed537fb97b66a07804c871df7612a86ffbcf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad246d8f370c248f2030b37438bb97b
SHA1ac19c25c1b01bc6b4a3d26c1bbe5d884dc627811
SHA2569113b386851b817864178c3de0d8370537ea181e156a969568802003d5637d37
SHA512fa24b57137816fd67dd84dd710f5df2f160e4040997c8884f3384c28384a36ea3e0cedc4a093483ba32b17365dda8608872b41c521ebaac49d9a18276520cfc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58edd009bee342aa2ecd4c1cb2137b5dd
SHA1f7228a202eafaf85c2d15234065bd9cfe3c0bc70
SHA2567b0eee7bf32731a961129aa97669bf332ec6c518f031e19b5fbd71fd941b85b2
SHA5127852f8b42210311080b520f48ed9772c31d2a41334c3959b2b583c32290ba7853125b980b803ca7b9d9b53506ca63538c8bc74299f0bc22602b13b309f652b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536931dac168edc6557d6920789903d3
SHA12ee3e4e73b4745183152527024c75b72b677d974
SHA256b6e42685787ca8dbacc87735d3e916e58ab82a94ce5c80eb24417c9aa61c5f8e
SHA51253fb06dc0322920b2763787e5fd574788cf1c957082669ca989e478317f524f79e1c858e26571d7cd852c1c81573e885d476be1f0c615b9d42577c1b44121a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1dcb573fbcc08f0eec7e534fb615fb
SHA1f4237bda00b933beb81e870d66bce0a8c9d0c8de
SHA256ee225e5082769c0c8f6d122c1d09bf38e580685ab25571e3e77811f8fd696889
SHA512df050f573ec5d91f017b43d6729525380288263d9eb695276a4267b6e8731999d1d9078c8bba92c41fdbf9f35505c027ef4091df40c3061ad14f805c7e6c353a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c18581fabe13829414de5a22eebb1be
SHA15a8627a966e6f93b2b72a51059e4fd35a4135574
SHA2566295dd3b66422758f931bf7c7f732ea1540ac59f5244d9d60b989b763f444a5f
SHA5126968fb756b0466bd7e1dae45425a0cb1f18e98539eeee2c73deaf08e88fac36ffa530db32592064834e383012d65f803906379050ac976d7b91eefb8709dc809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc87f53fd1af98b50441a07569c00be
SHA1d8c68a396448d757dd7b03ef29ee6230e6d2ab84
SHA256ec593da5f2093d1a3f0f9f7fcb70290fa4e08e7cb315a0c4b913b40fdd81d62d
SHA512911c4dae4dd2df7ec86bd5d40590372e64a62f2333a2414b64a37262f2f20e50936bb71b97504aa15ea2cca06889b9b5299148a3f11703b74099237e0502ba66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc0f9fde461d1548bdfc0df42b05abe
SHA16677a3407e7682315456ffb2609af6e4621894c9
SHA256f6b266ca77b4484dfdf568ece86e3866b779d54761cd710933e9beb74ca1e960
SHA512a8aed722a421d9ce7e9d2bf8ce6a11c7d16955c8ceeb263842571d50935f9c21826a4b7072af16a651eaecdf60896cb271973dd5ffa364b9584fde58e660896b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870ed9c32074cf0f37770be496d73333
SHA1d0ebb1ff582856c31fbcc8bb061ad08e74c1916f
SHA256858be23a5d619d21fdf95a95ac7691bdf8f781a84bcf3dfe370430fbe90553d3
SHA51237f7f8b8aafb71d415ab7b6a32e1d83d61427ac5879595aa2a6ff1d4a98ce0e7db280aa6ed6fa1a302a814383f436ff4ee8f5f70f616c5901f78982ab02349fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b