Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 16:26
Behavioral task
behavioral1
Sample
Screenshot (42).pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Screenshot (42).pdf
Resource
win10v2004-20241007-en
General
-
Target
Screenshot (42).pdf
-
Size
18KB
-
MD5
ce07a5048fb23c861fda81ae59069bfc
-
SHA1
1798b5b6af36225cdc8308d8cf60c6cd86ebfdf1
-
SHA256
72a4bdd8cdab78f9bcc9b8b38e953fddb5d9047db5d004ea0782ae005aea61c1
-
SHA512
77004737a0c0b4b15e2360af7d47007c1379dbd62d210875b3c0361500fce231f9cd07771acfda6ad8912251cdb06346155070eaa12bec7bde4a074a5d206e92
-
SSDEEP
384:dcjOlC0rofWZW6i5P6gvpR16KCDYjLcgJJ1bQzCUSsIWxqyNn2ANrOqQUG9LTT0M:d0uWJJp6bG9JJFQzpIW8yT8j9Ln0M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E975A81-8A49-11EF-94CC-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a5d6f5551edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435085079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f2070f261af01bb3b63b9771f8fae7118ab861825108b6cad4bc61d009b0a723000000000e8000000002000020000000c9e188869376f95cdcf0f72ed707651cd78aae5553198cb8649d3b6b6c494d1f2000000010dfc5e6d99516e66b86dd60ae1817b7d24cc34ba7f23bd54c56d0026724b7af4000000012104c19056b0019d79c228c78013a1fa9a9cfaed3c81bdd88442d909c6c76466bbdff2d44dad77f0fc79418fc14cbd79ac0b7728b10fe5ff2fa5ebe15b56182 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1484 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2056 AcroRd32.exe 2056 AcroRd32.exe 2056 AcroRd32.exe 2056 AcroRd32.exe 1484 iexplore.exe 1484 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1484 2056 AcroRd32.exe 30 PID 2056 wrote to memory of 1484 2056 AcroRd32.exe 30 PID 2056 wrote to memory of 1484 2056 AcroRd32.exe 30 PID 2056 wrote to memory of 1484 2056 AcroRd32.exe 30 PID 1484 wrote to memory of 2752 1484 iexplore.exe 31 PID 1484 wrote to memory of 2752 1484 iexplore.exe 31 PID 1484 wrote to memory of 2752 1484 iexplore.exe 31 PID 1484 wrote to memory of 2752 1484 iexplore.exe 31
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Screenshot (42).pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.readingquest.net/materials/blurbs-volume-1/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa07135cf45f80a4f4d382a2b850d31
SHA1df4ec5fd65a51244f00a387c1a59ee9c150e88b3
SHA2564c4b3c6398974ec0d4403aaa664e9a5f72e9e66978283a7b180134f8c6551522
SHA512569950e9efedaa094776c1559ba778b62c42eb9af6d041cf29e3a280cd90e9ae2290dd17a24efa8f23d119666fbae805b33288a391c3d59f35ec22c0a9ed0566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58975b12e02a4b0b9afdd4926625a08c7
SHA1b7a81294dda8661352b8d2398ea86efbe7f2e295
SHA25669c37a54a29e3f183a69c64f6060c9932dd694dd7bc1ed222c8fe2074d0af3ba
SHA512afa0ad0d4272c58c3b2c8e23ce6a02766e683086abc506dae3df688ce74de15dad462b6e983a3a5a32221c4cdba07638cb241dadf423dbee724ec7879017169f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce82ab010f623792ac12ee162582101
SHA167600a4485e0b679637655fbaa909549acb45336
SHA256635bc0075323946a2d159f2efbaad4ef4715c9165e42599a44541516d97ae3a2
SHA51297ae5ce93f29e2e32d71694d5cda4f36ad4c98d44a14000ec8253fa55a5136b5987305adc28c24ee23bf754fd2ed147889aca278b10e93e5825ae05a96477ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bed9ca1f3b603409f4133f1629eb474
SHA12a4faf607b696652442d1ba9a2522770cfa561c9
SHA256b8b452e764aedcd4e3ec8bf334cd8ffcfb7e9ad1d86413456ccc683315b19d8c
SHA512b344e8d9d8d9a93ec732896bd349e753e073470c1dc91a769c3a196487f5016c322eff0308305dc2fbf850592792ece75185aae4f78a7776947f8b0160511b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aafadcba608785939bf5bc0349d4a92f
SHA18111525e925447f1da72ef77e11aeab5e05cdf9d
SHA256e8ef431c99726673544d6aab653669a86f4f9c0632262c0cb27b70f801372755
SHA512c96a7f8912cb9ae6a4a35f673cc9053df4a293e3b76fdf6d18540aba5f78d54a6550da03b25a65568b067b5a551dc7943886a9df25546fd18f07b902cdc8b45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad299a9a86e8d86d138d89b26be3bb41
SHA1f59870dc16e1daca2b510c19d730899cae8a69bf
SHA256cecb9db264ac2413ac2eabffd1e4db3ad7659b7616d2682b4cd20f5c000e3a9d
SHA512908044e4134e5d31d074aefeac690fe6e812544a1d20ec47f23767033028df61f15cd439079d18070569b396d5d751b601998dc9fee328ea2e16ebe171cc70c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6072cedec7e483206d46a73c73e3be
SHA16b6d243c457bd748623470cb0d1a0927e73cf1a6
SHA256594ff288251345cbc28d65a5e7ab482c435ed75a60e3f2a10b5d47907e2ae5c8
SHA512b7ec229731fe35b3a45622f336af3b48984d645a6f372a62e33a15d046272c9d7d8981bfdf5ee5ba49bdda1263b17690b8102735b4a2355897eb83919f78c64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f3adf613b1366a03a474a6e61896fa
SHA11dacdd047990f006db20ca08d1d63f782f97c026
SHA256658b59d585da8ff87ef208528cdae159d867420a035fce071a431933fcd82d2a
SHA51237aa3172b252e7a717b3d6ada48ed04c9d3418bd80ae07b149b54900caf84ad8ae727d7f39c6b86154c80eb08f5ef1c76567f015f34405213cd658742126106b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb16b5d6cba79cb42b65de194021f15f
SHA1cadda7d645c257fc186a5ec7bab32c79bedef833
SHA256bb2a4295cf8c9708230597b4456ba1c40b0a663b55b5381118ef1e1d9d94533a
SHA512bbd14f49ffcb2f308445cd2ad7eb3ea936f0d6874d19870e242a61d6e4a199f8ce32d750d88f9e587f64834b9654d96d6e0fa106d070b0b4b184c21d930748ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c60a00090e4d3142c3a66dc4832f413f
SHA10a77782c55c754972f1f4d14496c4cc5afe8feb2
SHA256939ac33e6e29d06ea5fe35210937d7a25cd4e802c0e06d50ceceacdedb7e274d
SHA51217faed2d5dd80e876e0f3b1ee1e4b6bd72087053ffc65383d780ff4f8a5f37ccb2ae876a34375fef7d443430a30f953a11ba6ed282470832dbdb1ddf26833533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527cca98648fda273020574e594358114
SHA1f943de1d1165eeade72a44486baf4eda8605f5f0
SHA256dbdc127e802d4652a01376339c58f50dd5cc59681ee60aeae4e4004d78b21e23
SHA51270a8998ce2b7a70cb661ae9c5ab7b5713ee389a27f88742eeb3c0f7915764f3e14f2ccc58a520809b097ddf1fb2b9003699937b17c46bfe7907dd6d49b90ebda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0729a5bf19b2aa9b2046bdf0603e52
SHA12ebcbdfa743cfa4347dcf0b9efb8bbdd925b6998
SHA256dc4fc40522d37e3189d89604ab3cd80c8db0dd3ad6a0fde2c1714d50a7668923
SHA512cb292c95bcb8bc305ca28d68ca9afd46eba1d7238f650fde2effdd1d36d24882d7933202db2d4421f7ed2d384fd4e9d676b55771709be7de8b55ff428e0127fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1092a8f3d7f6b56e0bd6c7f7ed9572c
SHA14511af053fe965e2b7367cc7413c26402dce0be8
SHA256b80b2c9ee6872ba857017477c6cea99fa9df5e42a79406c76d8619bae07d1e8c
SHA51231754bb1d253689006c02c7dad5f8ee0674e7bf41a1bd88c161a768d25a6c63dceaff0c0524b9d9781a1e3dbb508a19062097047cb3f452ece9b966eb6724868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485160413ce643a9d7397ec94f98dad9
SHA1ce7b26c574c8fe854249ce338cfaa29ed976af83
SHA2567da0066d0bd01cbb7829008dde63eb0a4eecf76023c21aad8c106475b27d0a77
SHA5122f2d16ddb1be14b8d5eb4390f0cc2e75f1f536626b56f5c9cbf2e57cc9c60f1eebf697ad3287a62a95bdca69bd5780772c8a70015f89fffe48322eb3f42cede7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565877992c65f3b793cddbe9c95883580
SHA1db1d032ea049d4badcbf57bbb850ed23d736b9fe
SHA256cd042424847ee35120313d5fe8230406ecc0f7b304e3a4b65625ed7309f0e04c
SHA5121f1b001d32bfb92d582758f185e573e4230caa9113f67d2c793279886911825bdaa08bdb521fed23e83fc4994d6f3f13fb42eb9016c027b3bf11d923ee9bc2d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9436e82c2cff1df8b326421c978559
SHA1097b4355cc61d9ef19c3594189c5bff2aea1e797
SHA256be4737ad46cb5ddd8926b2dbc5c6e2ac2d7535f774786a15bc629906e4041637
SHA512f77781df2f99bbce7985683a6aad3e463cda8fffaaac060f9bfe3ff26109cbf5d54f925be9cdbc3dcc688b9429b0135f3a4a170ad9909b9b86764054a140cc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ef78df14b4976aa3f3ef14a61f4cf2
SHA14b129cf245dd853a23ec35d04a5480399fbba0bc
SHA256cd3d6fa6e5a0baa5cf1a37085143b7acbe86661d2578c5f9e0c3ee985f8e71e1
SHA512dab2a7ef936c6aa18e56a09415624e43e6412c4e75cf472b45689c9f39f758e15d7927fdfedcf877f3bd66f40fd0cbba024cf24750d65d3cfcb1bea22aedd2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50112463c143d7d90c289fb88d3193f04
SHA1f59f7985d7aa0e34732b2c6ef31443f5c5e83f5d
SHA256093fda918ca69d4b5cdfc0dd5298ef6ffabb2c9d623239bd4185d689e1b02e51
SHA512a32befc47f927f9520d260ff4f81ee961d2387940bb533a7816cc63d31784db0c9a21c819f790e37e6cf2707f517ada81711f5c1390a886c625ba8509688064d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD5379011a53f091103c18dac86593b62ec
SHA1f059b602c4392abc9035a83aec5090f59c841cd6
SHA25603905a800e1960ed64d17c6f784d72447812c816e3ca1466e149097eb455411d
SHA512b71d86d18565fdbe26e5abdff73162d74366584c07fc3888b21a38d84d4c6a32fd16b98aaa1351fc4cc48ed6132d775103fdc60b17d543ce223f0079a37ad0d7