Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
235632327d82b415fc040d6f11f7ac3d617c42411066ce2009c4859237b0a5a6.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
235632327d82b415fc040d6f11f7ac3d617c42411066ce2009c4859237b0a5a6.html
Resource
win10-20240404-en
General
-
Target
235632327d82b415fc040d6f11f7ac3d617c42411066ce2009c4859237b0a5a6.html
-
Size
4KB
-
MD5
c1f05e13d0224ab1f88fcad1b1bb7160
-
SHA1
470540b7e2c2b0c84da493bf090ea269788a458e
-
SHA256
235632327d82b415fc040d6f11f7ac3d617c42411066ce2009c4859237b0a5a6
-
SHA512
c681538874706655bc580cf750a89eafc315780374b2af9039202d11c8305586e2b7a255601f765eec0dac9e7567358674efd252e62a8bd69474d6641f59ae3a
-
SSDEEP
96:1j9jwIjYjUDK/D5DMF+k1avJADh/pRsaSrRb9PaQxJbGD:1j9jhjYjIK/Vo+kaRADh/pmaSr19ieJ0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03d0815e415db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434156566" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000073d2a692674b61fabf366fd72e32da19af37875583b3e97eda211027b986fc7f000000000e8000000002000020000000f98d9de60c9840e4ac060cec46a161d762c5be6c74a5b7bd278eec8853247bc020000000fdf0994888294bc16169bf8928d010532c3852fd619625babdf0673baa18164b4000000017fde722fe58a4d7f4adcfcc149e18fc8ccb409c4fba43c19f708dce1dd16979b2aeb0013ade5e98351572e0abad173646e900683fae0e3efd122919604a136d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{408C29B1-81D7-11EF-ABB3-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE 1196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1196 1992 iexplore.exe 30 PID 1992 wrote to memory of 1196 1992 iexplore.exe 30 PID 1992 wrote to memory of 1196 1992 iexplore.exe 30 PID 1992 wrote to memory of 1196 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\235632327d82b415fc040d6f11f7ac3d617c42411066ce2009c4859237b0a5a6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff1960c29c9879316ce70bf7642f373e
SHA1751764f3e86dddf2a1901a5e1620eb1abfc08f98
SHA256a3e6ed9e2c7698aa738e51f568f7cc1efe9ccb74f24e2da147cc29a4553a9c71
SHA512d4a745784ba63e231047b50f08382fa8d3533bd6b6933c687048fd1a78af7b53553f956ae0d1fb41118b325a73bd7ea36af0f066b03ec079fe56ff0df329cee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3dcad2d8e1244a376475deaed40abb
SHA13083f0e882b31dfd9ada4ef461048eabddb5651f
SHA256ee056f5d7a9b10780c18f2231960fd4556917f6904241c9b699e5f497c96645d
SHA512bb96cc0b9e62f132703f8256453bd8d1be97774c68048ef5eaed66e6f73b8194d123923a8c1b3dde7a02f8c45538000f9b4e1d25d8c814deee10856848235dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ab5224b083c1840816ddd074732f39
SHA17b3c71e340caab2fce189dcf88d560f75265db01
SHA256c9e0f46d8ec679060eefb49c352564546b2d12d1cf86b6e9c5dba6c88773b5f9
SHA512a9ccc816a4cd15d56f9e2fd19fb28c0266368c234cf01ce4fe471ba21ef03dc47974988c3087348b734fa1a0de76e609b53f544bac7425dedfb8d35a104d0f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b1d9bfff361f53cadc6839eb1bb502
SHA19272efbec4e47013f6bfcb90ef8f7ab90623fc78
SHA256345af21fbc4bd178a1a3504d35b5dc4f2b9a83270266b5b40aad90ff4cc89ed1
SHA512799032e88b8dbad3192073bce0a5628496d5022902f103d1b1f574feaebe6f90b9ae87cc18885b2ac926160df05be2526e9d9eb10f20fe746557b914a770829b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e408d18ee04c4b7390053541d36d429a
SHA1545c5440d9e2bfc97446657c3df299d3fd920fae
SHA25687afc7aded4419e2f713d4a438c1dde39c8479153f707f5eef7d15f0c5876021
SHA512b28d5cce456fa7c92b64d9c629c3492a5d19b3693ec2457ff4bfbbf16775eec507b36e8cbdaeef56cb87108634ad4b1bb4aa884c5fc40ff74b0a654edfd56576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fdda93ddb0b65ca5d31ff371246731
SHA1f58f3a65576ff4642f3f12c9b97cfac444a3bb7f
SHA256930b42e22841dac363b1b9dc6e44213ff2098c2256061a2daf707b83f2c33c6a
SHA5128c3939e8e3cc0dc7067a9ff70d87bf19caaa33878053c6a314e8d730be95c6cd2e75dec137937ae4e4cfd5b7534f637603f4d7d73544dc9a113b7718fd22b450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fc0c267a5f0949e91be55bd7af874a
SHA1879bedd353f5def74e1a24731b43288bf98cc6c7
SHA256fffd997ba79648e68fc615bee6433696bf1aa99fd9593eb7834de2bf2986af2a
SHA5122463c878ca72b4ace7c7fd46e03c6394825e39bc12f5966124c47982ea465ee2222eefc84c5a65ded0b6e66b69db44240eca532c9b28e05aa4a7f9253f52f84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7341013c3643b4b38eb779a6d28d832
SHA1cc354704f4bbf5dea182e30dade7cc74077833ff
SHA256455458ee3e055ab5a32c70f40d2ab27034fd308650b05dcc637bbe57b05b7ca6
SHA5129a99726ebc5f0233f4720a74ba12619976ca3c7481799ef50a932a0cf269848dbe909cfd297cd0bd3a7fb5442fa946ef5084bfa9def9cafd50629f80d2eedaad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546345f384b8550e73145141aa83b9af6
SHA15d69b5fbc13282644ecaee03f16ed2ef5e74dabe
SHA256a5adbe5805cbc41d30b458f099f19ff16dab7b06f863b9e87803873c1369772e
SHA5125a9a7c7b16bff07aa48d0ab1a3a423495f22dec6843b9c5210885b2e777381512a1303983c9d990db39551a49aaccf3fc45cb3cfbc1cac518f9f6326dd671c07
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b