Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
download.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
download.html
Resource
win10v2004-20240802-en
General
-
Target
download.html
-
Size
117B
-
MD5
2dccf9a2e169c68dd4f3bd5ea163e45e
-
SHA1
4ddcf984285a5c544ed1132f5f6efd7a5d01b470
-
SHA256
ae138caf8767f7be2fe6f47f1663b0e2e28d903264707aa9b6f73bb7b223902c
-
SHA512
ba8e31094fda723fa66d589e229f240773f46493198b776240897e60998e7695c2865e17213fb3ed0e2756de8227c9271464ba64c5bc9448880d5f2a03cb4f57
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433684065" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2130C081-7D8B-11EF-9D9B-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a0a9f59711db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000f2010a68299b16fb51848869bb1171ae47894c230fc66ce98d95618da8336e7d000000000e8000000002000020000000cedc27b615c967df664a7604da1390db25cd35c3623d7c03d44aa09082f8f2f120000000423c3b109445f1558a9955a0297024436c8d3ef01e266f2232e72159a07b8c6f40000000df27cb116bfa9ae7e6aafcadd20e82c1ad1ebe0d6600fb0e008e992aecf2d7588145f8fe901593042687cb9b32a6955efe5162e509ca8e0af5a7f12229cf4ee6 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1972 3044 iexplore.exe 30 PID 3044 wrote to memory of 1972 3044 iexplore.exe 30 PID 3044 wrote to memory of 1972 3044 iexplore.exe 30 PID 3044 wrote to memory of 1972 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\download.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5561cab553a7c51fd3850220336592
SHA19cbdb81d8d6e4f521cfe58aee67cefd0c077cf2d
SHA2562a58a52de59cc5b60d5dc9470b16f7e1995df51c0984b1c9bdd0ed5440234430
SHA5129dcc3e873ba3b27fdb569577f531ee65f46f483fc8de4c1ee1f9191b2b77f76a38305b0db2900642f2101039c7042ec36ecf4374f7b2565f7b147fa1bd92442f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b358f472737ab0c9a364d53fce969930
SHA17a59cde380e868b2037a666b9a24053b654dc667
SHA2565a6b8a6eaed0923d2256b33068c2f749da49288be2d82d6bdff796212cedf43a
SHA512a45a3aede4b8ecafbf2a804d472007421ec7691c309d30407b8b13154fa62d7c781e64f77093ae034a5345ef1b0b7c6a4afd7f79a8beb461b7b34fde94bcfb23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293efa7beede85e7cf88e45834d9fbd6
SHA119acc4da60cccecf22af68e82ea936042a779c8b
SHA2564e59c35b692f29ec4a7f4785bb78cd347a86ea6f427ad51127ca5a0cd3375908
SHA512d68e1ca0f8e6d91d47feee2c3c8d407d5cc63e10371c7575395c81da07e68980a5af9febe9d9785a12bc0581e8544f2a72029043baa0083cca04671f0c9e5c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8603c5efe19277e58530121fbedb578
SHA11b584e874da9f6b390083426bbf883c0d2ff956b
SHA25600fc5ff2aaef9d996636a67082635ce21120f94aca38d816777e3559d34f6d0f
SHA5120071d8a47cea73739b9a891b0b540da9e8507e24e19dd0d96d4fa0ac45c1ff091133a0df587c6770b967ab7b973da882de06931dd8a43bfa8bb1394aa922f5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53505746ff3f044c62d799e616ed25c9a
SHA1d270feab7176ba943b8c2a54028f0dca37f3422f
SHA25689c7b667403085157a853288bdf5164630a8377771db6f80ae714f0853006338
SHA51287b0e1eb77a157b779518d6603dd79f1fce195d1bd996b72347fa67c24aade26f4e7565c2c04dd376e420213a09e5f326b19b6c041dcef1fc66e94ca134534eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b56107c8df125ae6f72fc86c5e6d585
SHA10879d051b9d5f0959bf6763ca9d974d6cacea9a6
SHA256fa27b13c099c3425f94c58ab07d163c7b5a57a16ed153ba2d83581c4660a3637
SHA512b9812688ad84255b8bb31dcf770bfbe09a50a36bd488ed769f30de69cfcbb792dc2e6d39eac92096ff44e2e6fb19ac3ee7084f2e6dae4f5a8e74326de0132d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c8e439bacfe0e7e8b46ff11c484306
SHA1a28ee9dae645c2ed0144e9cde61e797cf94dc0c4
SHA2564ff456fe1b375089c7f9857d5ed1913341d342223a27ce9bd1226e9d5dc6c795
SHA512bb06bb2e5aae54d23d5dbad6c8596fba4134b3b00c63aca177aa4aa0f5abc67cd96fe5ef19e0c892c26fcd3307b2fce858c86a57113a5e38f6b4f1a23dcd299e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51865a6cf481224a9d616c6118135f38f
SHA1e45f517dadc550ddd323faf7c1f892b22b0094f9
SHA256a8e357874f3407b0750d7992a4eda8a602629babe99050c62437be904388bf73
SHA5124144c7b893b2ba90509e778c16ecf1cf746cea942c513b4785ab644c8c9f6fd3a99583d8806e010b4bdcf0becde463e465342111791417591fce40d57e9b6ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd637988675bee17a5bb6d9c675457a6
SHA12a0253e60e97e3d7b61ad1f70227af8a74266304
SHA2564a3e456cc4483bc05e4a8733b8aeddc00a20272295c9cffda01031ced4cd37c9
SHA5122286a10165ad83ee8631d8d666c840787098091e944521321eeea8927102d52eeffa8edc7bd4b59140dd9f775d69eca5764a843ee67565f01545b030d39d1818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dceea4a7534f608deaff99f9c57f999
SHA1cebcecc6f949b57e1b9eb288f9aa2f7a8fae611f
SHA25625034edea58b4cd31ddde4745b00a16162cfcd137a6437a155364186434dcd13
SHA5124a35e3249b8e2cf7fc704a75c57862cc43797d7a147ef0ea38535023a47685223d676b8143d967c6acc99352edb35446a3713dd9e0aa072fa8903214b1022f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfd0d8660f2458931d086d782c8b2a9
SHA18275d82579a0d19dcc7850bb62e9fb0057eb3f0c
SHA2562ca62abf61b9cbab9862d3a17bdd49dbd936dfa64ee000d6b21a5978fb6485b1
SHA512248b7961316628fe5d6ac379940ad8465c0ad9bc8a1d0af46d25d1f4d1ae6bfcc0b4b4332beb4511655ec7fbd67ce48d4fad02bf62e3ef6c8240e2a0f81e300d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d8d8ab71c5b7ddddcbafef1abe1b5d
SHA1a992133e4feb16038bdeca1004d6c29b3a6da2ba
SHA256d075ea2a0089fb669f7c974739560b7f0676a84b48f1f87788ec528303be61e9
SHA512c7cdcc12b2b6b94e5c5b370d153359779c11844a012f2510554a4cb08a5d4e9da5875db4b821508052e13c28614aa73e40e5e3f2c91dd0ab25e2218e0e5f8f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a7c2b60d95920c574d9b77bb9df7f2
SHA16d34b317eb41c504ee67566dbebbd0d945f06ce2
SHA256127b56dee89d6c07951c9b4148faa51f499bf8ebd4108bd4f68a075915a2a8bc
SHA512bd99181965fb101ba1f571de438ed75514f0cfb9343d0262332993e72f2e5fcd8bfbf22b19de6039a9ac2d191f04afeb8dda135b2271b183145befb3f77ba354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6012e9de0c44f113486db95f6cb6b96
SHA18d7671ea8f50494962cb0bc38be5a5e6438193fe
SHA2564fb4bb82fb26bf64617dc02d9e28072c8da2775f01eec677a5f754625dc036c7
SHA51233775f25ccf437541671c5fa3a6c1d93519c91f18a63e34c30826c41d2a548a2682eba80fbe7c21050ee98991d08b4d825b62d188886d4d06236be98ef3d032d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f121ac28c1150804c38cc11cfd585d58
SHA141686767e64510cfe5156cf1094b53ad130da4c7
SHA2562c140adfa7fce69f2d15a53615e6b377b92906281e2081f33d39a91280052b37
SHA512d193f253e1fb1c745afc5ac73313308160c5ab26624183571dce865ad653f8afdb75846d251a56e309a0d8dc455a5cb7faf8acd9e373225c98eec9a591d0f892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc5d55735fcd231fc9efbf526bd1c9bc
SHA15b7bd137c275738b8607b23326b7d0c8defa7506
SHA2566a66b79f8df77ac89b24e78efb88b080df51b87d66cf3eaee63650fbee537b1b
SHA512064c58e98244daa9f57c9f881702374e749a9cdc460d7b7c79853be9a2d9dc466fa96ae91781967d5940c62344815ba5b8e6e701d2956d8c01665c5c61aca741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e17795b92d48afa714e8cd66e8c215
SHA16bd63f37dc48ce78c4a2035d0259d16d38effcbc
SHA256bb19dccdc8a70ef01a28ad7ee5556e60592db840732c6d680c41fe68c8e832d3
SHA5128235215c0ca6ac5aaa425beedd23c213283271b1d284d411a35205457856736e5c148fa6c2aea919edc221b382fee8db34495f6ee7b78f09c1371be621a3568c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bd4ea2a4a39945b0d98fa14bc9d4dcf
SHA1412fa5a0b62558b475a1fac09b1abb71ba909359
SHA2567b65af80f3bf0bb73a769eff5ae8dda2e10f052df64d16f7ec058fc4081754be
SHA512b7d019106f34688d6aa8a49398d700f77ff79a26711ed79ed75506496f812fa59a7e0d6f2da60898aaef39f7c1416a24199412197401c93f98133ce2c03df10c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67eaef1fdf904ee5bccf5f7fc4d9e42
SHA12dd9a7084cbd619acf1c19e015410294dcbca100
SHA256569876e12336f9155f2ec652b04e22d119199afaa44c29ca4b388c3b968e8ba7
SHA5121fd87c2b9d8fa27187c2d81aca9e5bc8dc2ae3ec224e03a84190ca3cd497b04a46a18ce162ee976ccbbe3745d841df65cce9e4093742ade1c4878452394a64ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b