Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20241007-en
General
-
Target
.html
-
Size
8KB
-
MD5
1871888ec92ddc847b02447e82ba2df3
-
SHA1
b66bb2d3b8bd9b518ce7bf884f96bd7732df2228
-
SHA256
257820e9a4671fda444faa6ba1ba660a6e55b66e3a2980fa82095d7049b444e2
-
SHA512
749c7941f127b92c843edd5f48c0f2be4ad443518cf15945ecefa4c4d98442c3426cd6e157de785a7eae62f9e7ae1ffdf25f19e29bed2f3e75a8f5c6e7113328
-
SSDEEP
192:PN2x2BZg08Ya+Pj8efn+DvD3O1xna0NuHrSDK+yyoN:AxW181+LvsDO1xn1sHz+KN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501779fcd71ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27F402A1-89CB-11EF-9333-DEF96DC0BBD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435030979" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000a5c606e633cdc5a259582c3a732b5c05c2d0f449d1af53874ba4b829c4398d78000000000e8000000002000020000000e82db0e296d416b2d3414c958960b79a4ea390751207bb2ab40fa4daf6e7ec1320000000d55d22922eac017226b1bb5b6e6fd16642cc58e4f3acf300d1889e7d71fe4e70400000009375a2f35fee5662629f72f748d263564e29dd5176e84857ecc33d71a8d626757cfde8e6d6397c56bbbbdb90dcd5b0cb10b94bedc8be39705fee9e0fc26e3314 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1156 iexplore.exe 1156 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1712 1156 iexplore.exe 30 PID 1156 wrote to memory of 1712 1156 iexplore.exe 30 PID 1156 wrote to memory of 1712 1156 iexplore.exe 30 PID 1156 wrote to memory of 1712 1156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5f02b83d482501dc8ea4e8da45f2d3
SHA169465f715db4d0c89dca0c12fb20b18d3de125af
SHA256ba51002368c41c243a05dd16d5657aa9d8ca2b4add018e207c3c6cea51476ea0
SHA512f2390440d8ce51cd1291392405b0cea812e760cbe864e3327207e0b5a45a92ee0fc7afb1c1c95368218a89092140f1096f9ce2e98e3f5b66be1ae1fb8fdddb25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66c2763529b51e743f46927a900fc11
SHA1ee04710953835efe383550614f6bf4d52b287288
SHA25628f1b6d208e18388778329acbb0f349777451e3f1e9998f68f2b4d002b2810ec
SHA51241afc63b6d35312e5a8ca202677eee796a1dbedb603f5c93cc2eecbc08a1445b8c509eef22758e06058161fd2c37d0bad2dcb1199c378e03cae2cce3d0bc285b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbf3eecb349ff0943d41068b00236e5f
SHA11407130d93dbb04f463abe7cbb955211baedff18
SHA25634d053a6a129c12ba6d1f79b6e72c626e330afcc19ac802d60019516e4930efa
SHA512e7c250f3ac59f0ed8487658b651f570946d44dd21223ed23f2f9ed6dfa541873f3d4fb204a75a0bca0ddc3d1f11f7ad04e55582a56b75c34fcc163d10978135d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549010612fd8dde8b836de4bc24c5ae24
SHA1ed0f163bea9763bc4fc2d2dfb200b796c5490ab2
SHA256c74f59203c366fb1a3ff05b04f3e6827e49910899873a64ebe49c7732fa873d5
SHA5124a08877f7198fc254e6157669503042c4527b2a537b25f92bf9a623abc4d232fce062e61c13576632136540213c1d6fc0e211040146d9ceaa50d87d4b73333ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef39f198403e93dddb622f8c09caf103
SHA1b08fe498a3df3cf539b3c93636f3b6be1c53a91b
SHA25632431380c92ae22f3079b6df546ec44139746c9eee39959253fb769b4d46641d
SHA5129476d8e65250a10b4fe96d8c4fcc5337daa93c986a24b7c4e9eb0c0b2e0308a06b335e976272ff1e2488444f035be6d9bcceeba64f4b5de64ab2a37553418fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ea7065e7e5aa82d6821b072e2713d1
SHA183985e908744dbf0a7b593f8c50276bcf55cc54c
SHA256e5295672620e91e0c1743b52363f48b7f269d0ea5b351f247fa5fef81d208aa2
SHA512ce48c9c797714e161a23f5f0c3e3f747f77579ca883d00b4a047666c90ba7ab71a4bd3c1e7809dfac07b432a428f81488c3aa96b7f3dfb64a1e8e14388eb7d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2e9906391b763903ee47a3e637dc4a
SHA1783d99f7def1a607a0d814d4ca0339b731c25c1f
SHA256f02b8e2cf24c8d057753950ef1507546b7ce688c516c81bda6c16f9c5763daee
SHA51257b6b0eb05c8bc4869b74ec25ea26f8a4db761a4f2ab3b492651c80b18e116145ddb2df3deab26a8c273ee12a13ee8adfe6ddae1eb8f8e8c10196e3d5c2f276f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177084798a58e5dd3e42c5dc55381c02
SHA18511f0ac6e94b1c24c8e70a27fdc6d89d9c4eed2
SHA2567b38c6fbca3e39c2cc9fb65edad58a7c020a383133f52d988796f8b5bcde751e
SHA512ebad9600e1d612e3055eecb4d4a388e8b7554da3d95e44d8f5f4a215dd7dc635f9dce9f34c447944e2c9ca1f771e5f968efbcbfdd13c54b5eeb6569932ecf27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecafd9aa10fc04feee26724e8f5ae723
SHA1adc558f1e02ee40663b35e658f9aec13e3cbd0c9
SHA2567c8006737dfc09e047ca247541114b8ad46361ed51645ba1ae16648e1ff1eddb
SHA512e31c8800f8baeb0fc0840451a6b7d0c284750b9b8d7a5269cf13c0cc4b161277dc6090230435c99042b34c85141fd49031f4aacc87e995ee588e80d4f1335bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500a601eec1a3a01f148a46b1d1a33d0
SHA12f3714c37ef84ab3328b916f1771ac78606cf4a5
SHA2561d7aa313702511af8bad0067ad02b6f63e9645556ef8ab4122f4f11ae4bd0fd6
SHA5122a68ec05bb7b3a6e20c3ae7bef0045fd046c926a5ed901d5f2c63f2b4ddfa5b0026d77d7454eef299dc2aea2fed807feb7645dd8a3f96375aa9b5a910550b3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d4baad1d59f0fd92d000e0076bd7b4
SHA1e64d2879e849b1c48b7af2eb0422334ff6a2a2d5
SHA25686d513f304dc561ae3e01d9f648a2a1a8fe787c985c013b18fa876f69b116a30
SHA51205f4387f30764c8735be00c4642195ae22812f18f0167ad2ca061c1cc351fd1b63eaae2d6eda5e509b7c85f15a2298a15761f53efccb77966c4543323e74f156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabb551c373d52a24e4c7c948ae8c97f
SHA131fb2205e22c9db702c0ab74584e8f7b296ee1c7
SHA256e18b4d38ecfb312bd9b12b46caa5abc2ba15d0e8a41eb12a5015a8e062146b96
SHA512e9c5a38cfce27632c73d23765cda146ffba50399089a54c042d7429c333e1673bf1299288a86ebe421dff0b05d78c193b6dda3ce0abe564b1bd6af9037e79d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01fb5d97512f06b8de6118075c005cd
SHA1966d8438ac03475f574b95e8db5d0cffbc84afaa
SHA2564ce3a1329a2c4ba30a32b1953d20cd046ac81f32b64fa321ab9f6c23faeb4d79
SHA5123c2ad85a1751a1eb60b6e52d898ed922c350a50479f9f876b74f6255429121bce7c2aefb93b0a4733b20b93d34b8cbdbcf4cc9221ebda7da93da54ddd65a7a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593cec893792dc413086e1f6195d7e637
SHA174e4150964a3a111a2f7d10bcc3e2ff94961d9c7
SHA2560b70685af6d8c70b12c2c04a68422538ff84db6a02bda40187d01021b29db81d
SHA512a0ce3ce74ae3f160164926fd747a5b706aa68f17fb98669e9d01e3dbae5d34fba8a4ada50674220f1eb6e957303e92083650d52570df801a97aa8db0059bf00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670a1b7de8ef2de2d3e09ba647248ac9
SHA1952ce96d2e320003ba189e36444231902619ec9e
SHA256a583f54eb0009a69ec66d9f030b2427ca0c3547499e49508feeabd564ef70ca1
SHA5126d9036dc9a73bddf0e6aa414856a24d8b3f44357a9bd447855c77e08ec980762e67f92b2db298387278e03b04da3920497fe1718ad63108b8b412c412453a020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6e75fcd76f769b58e9f73741cb3539
SHA12fc5a6c8c209bb3eca5a975efa7d5ad5b9efb69d
SHA2568fcd4b610aecf11cca31ec07dabb5102a7348cf370266fa88fb3731f044a13d3
SHA512b59c4627ed684212aa24f3a40719ea339b60720388aa3ca2db517818f19408f45b3f062d2964b567138b16a592beed9df06936e8e3d42edaf65232c9a4c37cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc8551ce036c87d58bc4fca2e62716a
SHA1045e173850f3cc323a8f39182e3934d5b0b50b9b
SHA25612d4a9500cea1370c6ec655039625ce16befe047f4f017f398dd2bbc531f4c3b
SHA51220f0ee7cf7e639be3253547d9ddf6d313a61106dac84ff788c829c7902860ffe5683247f518850d7295e1e97e7e2f02300384b6ea39c78bf6738fd7464c4303b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6c0a7f7b1fb8ac5cce286429022aed
SHA10219c2b785cefb58ef94258429deab65691802e5
SHA2564e90ff97174c2d668d5cb3b2cbcf41d4a0f460fec7fbfa922b53d96b08b100f6
SHA51212e0380ef6e69e3f6c52bf1e8d3d02af6695c2a30e3e0329a0e2c5dd33d12f0b61c117da1ec7d8fff72c00d7a880ac803986989628bcf10736c464e5cca56a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad9628bbcf4b3fe4688468f31466b7d
SHA16ef62f9a78b773970d2df75c25c3ab341b4b6f91
SHA256a3ca9d2aa26f2c9a6d65c7bc868c3c983c07fe6622eb854938050ae20e691f2c
SHA512f4ef9210e2ac5963ed4aba5297a0e3f3ecbb0492827d24664357a59d8b581a36f035a512ddfcf119477914dd0b1695e1cd8100ea071b43e69e9cb4283e690b41
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b