Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20241007-en
General
-
Target
.html
-
Size
8KB
-
MD5
1871888ec92ddc847b02447e82ba2df3
-
SHA1
b66bb2d3b8bd9b518ce7bf884f96bd7732df2228
-
SHA256
257820e9a4671fda444faa6ba1ba660a6e55b66e3a2980fa82095d7049b444e2
-
SHA512
749c7941f127b92c843edd5f48c0f2be4ad443518cf15945ecefa4c4d98442c3426cd6e157de785a7eae62f9e7ae1ffdf25f19e29bed2f3e75a8f5c6e7113328
-
SSDEEP
192:PN2x2BZg08Ya+Pj8efn+DvD3O1xna0NuHrSDK+yyoN:AxW181+LvsDO1xn1sHz+KN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DD93EF1-89CB-11EF-A5D8-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a0922c50fbc45c32ece31ac08d319132464fd55d02341b42253c1b9fca210b86000000000e8000000002000020000000ff019f057f4aa6b6ae551ceb6dd6929b2155e1b18150e20f79b1224a1c41de3120000000942b94580827e207f9df975b8fc63589d27197e225aff92b2fd9cf90f7f0b311400000009bf95c47459d83d3cd252098d0e3b6f55c7910109444a6729369dc9ad4e015ed605e0490cb5f82f8c7e8213eb3768f509a54d21260a4efd8bbb5718c6671a77a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435031149" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20344462d81ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2548 2984 iexplore.exe 29 PID 2984 wrote to memory of 2548 2984 iexplore.exe 29 PID 2984 wrote to memory of 2548 2984 iexplore.exe 29 PID 2984 wrote to memory of 2548 2984 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ef53d46dcf38e6683b672fa93a3ac7
SHA1efd6f658a798b109b3a2e7b4fbcd2137a4d0de75
SHA256c6605201030db48f06e7b70d22b92acded9f25eeed26441b42e71bb940f19ab0
SHA512487ee398f98cc2590c0799798b45e99fc243815b9394c96c0bb4b8104629ee13755fe161d060ca6c2d7bd653e759388765555ab7d7a916844b85368382795eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a9baffa792353078b9d743bb5262f4
SHA1a78a15305cf6f03858f9e0641aa38e1b6babf50a
SHA256bede011b01e6b8e640d4abb500f39ab0f1375aa2be5a35c7888276d885399239
SHA51299570ab053cc51dcc9ea23a408d82b7813d4f92a3cf129e527b3ccb032041ef1d7ed026073dce1dd26782b8c78e78affd8be6748ea0d9ea9f9ff9ca9b1f0c18d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519341717aec71b016e9f73ac9a73425a
SHA1faa38acbc61da1b639f36a3ae8b0732c274b819e
SHA25643f2ae5530ee279485584cc71d1870440d3db4ac8d05ab1fda7fbe341bf21461
SHA512a9a2a6cb20331e8e31492e7dc018d0bfe101b60c2d3bfc1cad69f65f1578def44d8fab2f05f92e48139b9169fe5b08f44b9ef795960be56c2e9aeb1ec88783b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d322c7d6b13bc74edbabc36147efaa1
SHA1b1eb53c8ec4d8b6615fc3c7384d8965989938786
SHA256dabd25603cfb3d831c706c0107d52d690b38335430e7db949ca991efcca9d439
SHA51250097555373e2d79a492fea2f5c2a921e0ff182c4ee9d5771e928c4171fa52e27352fdaffab6e12b131ef125bd50b65bcae650369192a1a867123bdc991d563d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b18c0ed8ee42cb8c6aa3d7c62210020
SHA1d25d1995cfe597b8e20c34c8c8df69c5f204253f
SHA256dd30b7b396118df542523523a5680ec5a8c9bfe4e680aff07907de68e70d6872
SHA512fa2695362fe3fdb47676511ab9a4c60c21d58352f0634b7038586d4f67428b6f07e2a21bc0d13aeedaf24babc42609a4a6b64c1cd0d4cd43fe3209f857844985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341fb874720dc726f0c25e92db1f2a9e
SHA107f414660b82def7b21654effef64a4278e66ccf
SHA256dc44451a55ebe4516db2cdea66fa03f4b50003981b16c4d8f1c095c80afcb70e
SHA512d3a5fc553439a52d6e8caf3e87c6ea4afb9f9323cdb0d3440aecaa7c22b3b10c2d2dd9a84e48ee5b6250e433eaa189b2e6d0222f6eee4788ecc18af188802dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b69a982c0cfdd6574b0f91efac4c84d
SHA19f85b59dacb675f2204bba83da842cb049ebbaa5
SHA256f1ffba4cdbb4f255ec1a6f7f250f66e5d5a9ea505449b930216221ce853cbd0d
SHA5125dcefdaaac2a66b0e404f151414cf2a0bd597615c2df7162daba0e56c2b8250f86eb533232dae9cb5d0b39527e406bce66ad67c48413ea7b50857661f6f9512f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ccd8cfb51149334eab2a7be1c1bb46b
SHA10193cf7c7b52e41abcae99253b29c3899f6cc178
SHA2567b1265065eadc0277671744ed63a7824001ee590a68a65916257959a5f09d8f6
SHA51256e17b2a83d8162015494a8fd3258b9098457bf57bbe2901116133501f49497b67ca4ae34cf5d7f033b4137d0996c2643d7f777faffaf987cf3187c70fa284e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81fbb910a5237bed4926322712a9e38
SHA1cd8544bbcd878c89736349bd42cadfee4ca962e5
SHA256696b6fecab21ededbd8d7fc1dc6979488a714c1f2f9ed4277885b6a5e3d2b2b2
SHA512cc899301dff0ce72b06f114b0c249d604a73ebd52518bb2ac6ed764a32db7d12d9d044439373f0c44b0701341c49e82efce9c77b2ec27f6df38c5640ed7240ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9e35768809e0d55fee1449bb9b037b
SHA130615715317fed5ccceb9bc428a85c8dc0adca06
SHA2561dc5adfeb08e4640ed07a255c0c3991be77715ae500bfc7304bb012942efc21b
SHA512a7daa2e00f5b661cc2fb92c6dfca8d5b80a18dd4d67a3a3f7883d6d974ac3a39160a209e50c8e26359d5f4b324d718bc6df7c824c087d0453bfd2523d8736b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c2fe114869ae95e3e2ecb5ff50d55a
SHA18264953211c8fe6fadd2720c54aa180902d25139
SHA256d280f3224fc287b5c1d6d23725452f88c72465c5177d7d05ea4e222fbd418db2
SHA51283c8d2c73566ebf87e43eddedff6a421c04d43ec71d11f17f72ceeb94b882990f919af0bd5fbdd32b4b6a9e7ddbb391c54be3fae40a9c2e23e2ede9498f63d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e27df8c151156231236d34f73d23d1
SHA194d43fa88865dbaa4e1f61eb575d2659db787109
SHA256023abc98da6db6000a006ad51dd90cd99e1423527bdf3da2b5d8aadce91fb7fd
SHA5126124a354bb64483f6a5bfd30091d931fb6a5f2374aa31732f1c3f4472a051b6bb04ce6bfca8362a7badda11b586df6503b8e59acbef21e6c11e0d58807717334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66d948fa79085f84d6fefa660325042
SHA1a05f66cf518e643ad946662439d63295cb050e9e
SHA256db5a27a9982e6ea47325fedb8cafd4b5f8ca22c87f54242f04c8dd65d0ba75f8
SHA512ef8e70ee6cddebc819ecdc2069f631ac50e7a9531280d05ca105712852bb67200115dfcc2e090df03c8d2da2ab948fb9dd59701e14db02082d3db85fa9e69e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e998245048904d7030ddb9946b61ba
SHA1bf3719e1abe478e1e4c0b34770e9fd144c6582cf
SHA2562951fdc068a8f4a13f76a26536ac641e1e83916c74d063d182de1056da02eb58
SHA5126b4bd752014649406a9d1248e2583cced1fb76c8296522a9ecbe2eaad5de1d7da0e8d92348fc4cff237ad048eb0d51ee2b2b7bab0de6b9b3820b603620438770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d77f39a04434ba32b0b274f56ad7f4
SHA162d044390704ad3656db4960cab8bdc1645a635f
SHA2563fb433688ad1169e198b5dd5e22b72313ff0de53e6a2b1b40413d749287c59a8
SHA512ad0772d60c8b23791bf0b980250a8f9b34c1e02caeb0b48b68b34e67a21943bf671562d69f1df1a963fba16a00e30a417d7006543098a9057c2f3f8f3306dca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07056f4ee03f7a7b59112bb3ffe3184
SHA1c6962c50867da83f4613f9c93d1ff7a42088dcfb
SHA2561c70dbe300206f70c15b4528a94d5bf11561596ef0ae6d339b95f18a6bf2659b
SHA512a64f2a8607cade3286abf400daffcf06046d6d3050c836e186d2c1d6c3255a44729c288094aef00e7864bfba1610fac08f822aad53b71af4c75d4a9194d616c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558795506b941775d8502ec395dff488c
SHA16aab68a4502cfa827b3cfffd0ce9d05c257c3fd6
SHA256224c418ff611d112654e248843872efddad9d8bf17e19bd367b030653afa4217
SHA51255e856e7a3de15fb41f7eba7f444ca119751969f8d3ca9eabcdb4748563c199c88eefedfe23c842dac2678ed5c7024ea976a9c10f193f0b340c2e063214bc359
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b