Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
image.png
Resource
win7-20241010-en
Errors
General
-
Target
image.png
-
Size
43KB
-
MD5
40d95a52e17eedf66f4a584d59eca648
-
SHA1
1f0de068125bb1e82ed24915a6eabe3afee82c85
-
SHA256
cde0b8ad40ebce1e66b1fdf42e6f6af355ca213b3a8b5018b64f62a5d582b6ad
-
SHA512
d32455e174f52891912fdaa825429908adb4034a9a860d36915e0ffa90de5255d1aee19d0e30020b42c5514a87a4980559c0432b42cbabb083d1347f2cba2700
-
SSDEEP
768:y0yjtIOYocrQh3CrUh4YfryHECNobCuJz0nNH/SeoK9X4Bjq25xGBVxE/Ge3:yLjGOurg3CriKhybCxnNH/vo3qAxGPxo
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCE0A101-888E-11EF-911E-C2ED954A0B9C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 984 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 712 AUDIODG.EXE Token: 33 712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 712 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1492 rundll32.exe 1492 rundll32.exe 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3016 2980 iexplore.exe 30 PID 2980 wrote to memory of 3016 2980 iexplore.exe 30 PID 2980 wrote to memory of 3016 2980 iexplore.exe 30 PID 2980 wrote to memory of 3016 2980 iexplore.exe 30
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\image.png1⤵
- Suspicious use of FindShellTrayWindow
PID:1492
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:984
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:600
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:712
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510873d62e26a0c6f32d0f518d13b4aaa
SHA14f6f28b96af40191a44685e77b2862119563bc32
SHA256c6df6eb514f8b39097768613b5c72e13033064070df057d0c7b1b89162124f7c
SHA5126dd86edd8cc545fbde5f8abf835855877c6ca7d8fe0f9d2a96fd80aedb4eff5632cdabce1886530bb653eb043582d0053c2a0308e8b5f9bb32dcd6b10044c891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae6267b1032454626b4182064035015
SHA1cb8055197edf89dae8cf762b21ff0c36363574c2
SHA256eff45fb91c7b89151dd824c2ef43fcf6899e7cfd6852119b9390798be1539a2f
SHA512f672e3a77ade0c0cebcd2be2c7135fef4e5af8d6023bd06947129068cf6735b3000520f6df9d4874673c80191b3852bc2203329712c28be64c9f6a31267e86b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52736dc73d6f5c8efa3b4af1975ddf216
SHA1ba1d0a111a65f23861911a8613cea14516aeb856
SHA256bafd218d4c264ccc9d2fab016d8918c4b0e7d4b1bea0b293e8645b69340864e6
SHA512dfbf07962754ccac3ad244322c05cade523aec93c74331c63924aa25123600078bcf4fb1c7cba72c2c23d8c2c906f9539d4be3f076b72fad589927a6a38f6f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ea3593bdab31c8eae1094b86958014
SHA1cb94c59e141201179277f432fa8f67531f5a50af
SHA2564a334916a52be1e3fdac0418c9813f3cd35843051869c8aa8e41b179ef8525bf
SHA512bcdbe2c74bd94a2bb5caf6405eb13aa7951b5f3c528d8864eee489fc485644f793a68f525c8a3f6b9e31d8ccb3696f67ef0f05d7cb42b38d40159f826447ed1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471b816e612ea714733541b694339e7f
SHA1828565277ca7135bf65f1ded738f5a148b3d71aa
SHA2567b0267953339c6c91cd8ecca5aae9953430c7bd1f28382557ce756a597cb0aa6
SHA51294727a248712101971f7de84e2c9a96a3484c52171daf331ed01167479b4f24f166fb06b2ddd2c766d77e4cc35d127e2f8886da278c9b1ffc75a3731c3be6765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1cb060a547626e14f33d8afa308758
SHA13bb27c09c73c6dcb35ad1fc7fc7082586bf32af7
SHA2569da58f8273088fe31511b8b48e6ef657c357eba74da4349ed31c377cad66bcab
SHA512aa2a50955e2ab7d35be7b7dbc6751398d1cdba69860a8fb50663be2cb7b3fd93e5ee703c3f481e3a7c97804d5f38105880535c6eade30dd2fa48dfb4b92f9757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29de91311ce33ef692e12429f0f8f21
SHA1cfe00e17790e2632ad64c3d0b716fb532df91c45
SHA256b1bb3bbfb5cfd450c95eed0bff54fb06bb5175d514ecb63b9deb5119ff111faf
SHA512d6ef0c979ae8d954873c83160758517c573757f4e49b41024f996d62808a9b1ae6cf014f1a67495f9e7bf51b9c660811014bbbbf4c6b23021975f9858d92265f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b