Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
no subject.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
no subject.eml
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20240802-en
General
-
Target
email-html-2.html
-
Size
4KB
-
MD5
473676067406f47cbdc158d8594c0a3a
-
SHA1
59f08c21da948951a829a630db8c98a3333d886f
-
SHA256
51aff64e0dc4ddc037c29985b89ece9f720659265ebd65ae2ad7bca35dee44cf
-
SHA512
d570bbf88d2da796d9b2db30d5ad9aeace639a909ea6bebc21b21dd22335d9cfd5cc0c856e6a2e26dab88f36b7bdcd25164ffadf0f265a272ee6b421527e15f4
-
SSDEEP
96:gD1Y4BjAucbUUSXB+Lr9MdHlUvLFv7i37WLZ45ScoIayoryMSk:04UUrLhUGLFv47WLyYIar3r
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402264c07913db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBEDF9E1-7F6C-11EF-ABFC-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e4fc0552b71ef27f9c47029ca1cc9a8971a71764d437b467a52aecdd1ab6d149000000000e80000000020000200000002a5d3a9849225487e3a2e9f832ce2c33762f2f5e3da049834cd2389100b7c53a2000000022431dbbda7744a8587b90f94343a2c8d426b80f39f9ff679607bb70efd8b211400000004a17d287057358fd7fe2b121b70dcb684ae915e353bd66301e4ce24e2c275403969c9e2559c274e73907ea643f3ab7b878e835153bc4d2c0f618bc034cac649d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433890993" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46edc8128c0ca682351d472f107fc7a
SHA1e9c39fec5bfb0648195f5d42397ade1872674515
SHA256cc75eff6bb4c77003f2c342e851960761cecbdc9a8cc6b628b02a90250381c64
SHA512215396fc94fbae25c0a12fe3023b1edbf0bb77d17b9dc216086c6435987bc93844d00daa0cb731f23c651459ca9607a108ac6d5168f860a5c8d42ac16c143bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177480c974244d50bd57f8e1011b9700
SHA138acfad55430ce83878757bbfee0aa3a75becc95
SHA25661d6e9616fe6d580909bf2793e973f025248029b7ea97cc58d49d421198fda9a
SHA5127e80caa80dd1d643348fee5a81421f6707d02e24e2b990010e640a5597da4d72a5a017c35a0a86b35c5f18123a615c037a2d88e9683b060395bbc250c98507aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b639f28597ebef10a979ccadcb35ee
SHA1bbdf823ed631bae8d7a350d1dc2510a70ffd5c81
SHA256c7b83ed6742db083f9f1ab2b0bfe42f10e09a25306e9a99640897beefdf06d00
SHA5120dd5d3b571c3e20ed2c16d6c557cda3e4af5e77cc51d093ab00167d75a2856fd4145cdbab9bc4ef0af4100437f2908ec125e80cce67bf2904f5c20d97f38eeba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546355b291feb62b0a516f9ac8411dd69
SHA14c484133072d2f59ac8adb74326f682a3154743e
SHA2564ef960f8ad490b26e5d86a7eb6e4deea41d2063ba2a95529c52f15dc2e77fc0c
SHA512cdec85337bda687e9ab623e02642e030391c17685da238c80913bdb4b77a029130b4a7d3f1aef479faf86c331958b8154d779d798b0d778ac080aa34dad48437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559fd61ef16c0a0cb62d8a52ce5fbc554
SHA1627917e256a8c98ec943792400c40c8d21c220de
SHA256287f11185b5866acb7a1a1d89cd3dab66cd28fb3dc237250f46217202cb6971c
SHA51203a0c66e607b7da02fae52571faa7a8a6477f85496f8711f0f34a8b6c48e0fdd27bcddd3b269fd4e59f0624663875712310ca166ef5375ca2cffe91f1be4d1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25f07bd132dbb9afdd235dd6cabeb2b
SHA186678da4f42049a8e2fbd27d3992a5feec6f0bf6
SHA25669ec3df99d852e4de6dc22652dc27d3913890cc3527d9c048cc99559a8d82b3d
SHA5124747b43d55ad3dc9f0c76d4410260a2c107cd067027fa5f8472203a4339f619cc33fd7f7a65ebea0980744561f10f8b9effcd0871658c2090d788587be5f7a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573052b85535f770e16bf08676f6ed68b
SHA173e70d0b2531fc28d3292e823fdf6e1fdde477d2
SHA256f1ecd19392139f32e6c9cbd34a99d0a1f4da9bf6f455059a846b67ebf3de09b4
SHA512d7026b279d81cf052fe9d4569fa388409f6f8faa2bad71d12cd52842099fd00ec4de7f81cdd2fd02a34c0ed67a7f935dc8a3cfeb86d4a0d50434f35232c7c472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57897c82191151376ddfe368878e34862
SHA1e9875306a6810ef05ad098060bba2290287153e7
SHA256aab84f8da4f05d81d6be949027d61b31c2db5ef1ba648cee6b5afd83dad76509
SHA512b3133ebdf99021313f407f60f33a15588e8d85ab7b57d2a8baded79e6362d4b7e362584a07f965f128d51802b3502dbaf7ec6c4d237bd595bcbdab72d6658bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b23609a777a183564779f5c4c68197
SHA1e46bbc08a281a46a5364bfa78d06cf19a147aa82
SHA2562123b70785169b0593d7119d794c0102ee3f275c40476e3e3293074a2d3bba10
SHA5121dfa06ac72611b896eb5aafcf36b8d3a5ea17cb7582ff79bce9b4f76ef3404e49ab0cd3d76582ff1610c7348e898bdce868e8df171090f8b0a416e24a0a716f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a89ea8622e162e7953a0702ae985619
SHA128b421828362d81e68856f9c57534cfc3b8a4458
SHA256d60a698ef6f7b22dd2780e842f9a8fa3dc4e49a41e1a1513b31d476c55b762d2
SHA5124688af06177597e48c1d1b966945822b50464309634d95874e003c34a601aa59b0f4064a0b35e005481cf157bb66d2cdf36e48aa1ea8fa552026b64134750d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515564abab1618a2f7a2411e30e7a05e8
SHA1405585342336703020fe665f10bce3d8ab2fa389
SHA256a8dbd05627978fcffb55ea334838d2c19488dfa420b9238381fd2f0ec74ca837
SHA5125d294b280ffc9b512c3c4a0b617b0fc315a42494b9bcdbecbd3622defa31e817ea674f601b84276d8b318ec995468d92dce8bfbc6bd70a6d7444eb7415137c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f520a21aae50ebc3a533a9459d0be95
SHA1a5188bc9c9977399518e715233dced64fb71781f
SHA25676a970b577d675195dfbb765dca8438491a8f51f911027779ad07047eb5103bf
SHA512327db1bf0d02756ab10ea51a37a31b39e315923504fce40964841ae074b0cf5fa2623760e41e23c8f6b46b7eff43744205cf4756169f308b328a2e6a31896943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb859a9814c9d95b9ba1dc4a877fe8cc
SHA188f514138918d59c7f8e2f1c7c2226471ca8d135
SHA256f0b2dae1fb4510d9145307cdd4e3c3b4f281ed1c1e89cb7dd5d381cabc44e4d8
SHA51236ce3bd2520289fd734d843083b5f4ffe7a3eaaaee926e13066c10eb9ba9dba98e99712a0226e13cd50c95ce6a4f55a4cfe61ba27759bc7f567d1fa5636fda0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7bbf8dce07aaf6493d65a50b856ed1
SHA19d47902ea009d59b5a68cefb8d3e473edc53873d
SHA256471d797e903879d0dd0bfb7f63f04ba0e5a7d45986079707cd2495cf9d2c33d0
SHA51240dc2531f1303035631d97b199fa25e8f0c2df65eeb017932b5c1a61602316136828b4e1b62c3f8e5530cd493720987b2a799067e157a712d98158e637d0ba57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec66862cd2fc5e17f7132b9427a8568
SHA1c781eac63b1021b8684f1aa19cf7691bd158724c
SHA25669308ce43f3a35aa723aff7e197037490cb7741dd51df68672ecf1c4ff520f5d
SHA512daf13be7b0d2fdeb351018392c7c861134c422704b62f394521022e23d31560570529aacde9edeeb3a6536cd61e2f547e2fca9173815f2b720cb9fad99082dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c926f6aa7709c878a811d1890f4da25d
SHA10bb457036460f913df8a316f9fa0036ccaaad53a
SHA256458651d8520b8a551b7f78a5940d28eb76ea0020210f30ad06eec0342ee7b9eb
SHA512a6112db288cc6eafd2693b9691c803a49afac1b28d03ab2d4f4143a4988695fa1285e62c5ba2f66e7b89cf8e0dd1568f1316169c0aea6196f8dccbeb26f1995d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d999e6160f9c31a8025f38d9d06e35
SHA1cb1f5b2fb679d787541f99eafe0226752991d785
SHA256efea68114e69b65ac5215c9449bb930d07a27d206ad7ad5d06bb8b3951fd536d
SHA5121dae9a7b68fe1147311d3dcd20ca2fd920485de25c7ce562eca68eb063a7fcb41c8f01de07c3ebe168a09faf9791eb5418ebf09dd74b0eeb1764a8d7ed4cfe4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6d94ff3d86cbb1168bb741c2229e74
SHA14bd40f9be4566a68250367be529f51a4d29c88a6
SHA256693cbcec3d0b4851c85bcc3a8f4da9b080b44faa1b1785ad6feab75c2c78617c
SHA51282889da0c7bb891ffb9881a7b00e95e2003aef901ab9382177e9d33687f48f83970eb1ce7b1ed6c91ef3a877d1164b05f2a142961dd190310224c0c4b6464d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b35d41e4a03cf359451d18663a87f7
SHA132c17dbf6f4f6bad86b960833211279f2f8934bb
SHA256218c870a82f4584b113d47ac4c828865cb185e6be47ea78f72b59bdcef386846
SHA512f38861da089e1c109886690541f7be22c93da098dc7ecc81cec9a22d8ce12b945123f5f5c2886e1b7415ebb0f9765eda2e9ebaa32d55c329c80e30cfcf2fd670
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b