Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe
Resource
win10v2004-20241007-en
General
-
Target
400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe
-
Size
4.5MB
-
MD5
71d2a48b6ec0d4703eaaa9a88a271e8b
-
SHA1
2007f1674028c5a7d67993ad90d6f5dd19cba328
-
SHA256
400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256
-
SHA512
ca27391eb5fedc7a134ba67e66284a530191e19c3549901bae7f408e926a9ff2c31ec4155cf8a4d30511d057d8a78922e9d7a23861e83a0e798753cc97cf52fd
-
SSDEEP
98304:ecLf/XJJltae9TZ0i1/HwCEKIJS4PkigJ:ecLHZJ5308/cTSi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fa40d3d720db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE7AFC51-8CCA-11EF-83AF-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435360762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000d1aa7e4b01931d7cf5e9a2bf4624d55004c803fbb0a85bdd2c4c23d8e3aa094b000000000e800000000200002000000033e38d795abfddb2233e074f5cd3a6a126bd553a1ad4e115d9a6ed81cd80fcea20000000c11696442a994ad6ace6b52ff1a882017fa73db4fee038b45d1a0c8cda6690fe40000000f2a07ce07235abd0824138b0b8bf2166222609c284b54d2d650f6b6430336fbb0df25fb51d9097f963f31bcc9c4a799701ed0116ff0048e9554f59c805bc9a47 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2784 2404 400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe 31 PID 2404 wrote to memory of 2784 2404 400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe 31 PID 2404 wrote to memory of 2784 2404 400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe 31 PID 2404 wrote to memory of 2784 2404 400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe 31 PID 2784 wrote to memory of 2584 2784 iexplore.exe 32 PID 2784 wrote to memory of 2584 2784 iexplore.exe 32 PID 2784 wrote to memory of 2584 2784 iexplore.exe 32 PID 2784 wrote to memory of 2584 2784 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe"C:\Users\Admin\AppData\Local\Temp\400fb4b2e26244e74ae7c98701e8adf13deebf7672dd8c8372cd92df4715e256.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://telegram.me/PhoenixSecurityy/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec85675662f1d50a7051f822077d5279
SHA10b6339709c88ead4340daf5fe77dacfbbfe2c629
SHA256ee35487cb2955db4c2fb6960d4f0c20404e655239839c43f9988b4b0e95d3af1
SHA512bd23ed105380d678705077ea4e14e7e530462085e0a53e1283cfb6a681449e361d9bf50d5bfe99d1ba9e2372c6589b8806207047243efad5f24fda5e994637dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516845f68fb1af0d6f3ce722c7e642088
SHA1317543d40425300700f9574b2f1f2760c773c909
SHA256b433a01a1cc23346d57ce60761169b845cfd8ae34f50f32c20cf06d657497bf6
SHA512065ae296ae1d5f6a5c052d8eb17abefe2ad39a546f17843cab7556d345f8560c8185ed08a061f3ec9c7377e236d27dc7377fd0c91f20cdb5b0c576b5b74f403b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568674a9579ebf0a212cb15e88d06b85b
SHA1db945f155956deb86b3c221764eda9672481d6c5
SHA256318c67b56036b947daed212a2305b78c1692e39690e78597d657c7da08013bbd
SHA51202f685d6511e5c77c30739c58ed7776f0db9d6019c50a76cc4f5edf9018eebe36de93997f4032ae515c74479f42e5ad42636f6e4389c729582aaa74f5dc68e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2e5e46628a627b0ea258c57a6d894e
SHA10870cac0fbddc2cc24e3e416ae827d0ba44e0be4
SHA256290722154d84906f0b9a918378b7e80e2709175803be89ed74ee104b8760d019
SHA512e1140b9a5eb8782a4f27661fe9fc257450c24a1046ee53ab3abacbb94d1434fbbdf0b462402095fb2cb06966b7f96dcb774aa1d631ba5fe6ae47ca036ce9ffc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560057a9243ca06eef93ca7b0342011d6
SHA1973f56ac61af94dce9dd37d4658b067044e81e33
SHA25645e45da6b0fb6e2622eec065ac57e7cf7b4d9e5d0881c0f59c5d768b4d4367cf
SHA5125cf281089bb8141f116f5890c9640d660ac298835df76f101fc169f1e2a250a6ae6da351d2ffc8f0f40a3164cb5a8063747150884339bf29472d8a5fa2b917e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6b122c39667db3697a82b36af753d65
SHA178ac7245dc7bba334ced1dd3022f4f47d36fe27b
SHA25670b78e25a991bb96541de5eb856d2261d95921f33c2be99e246c4884cb745acf
SHA512352bebbdc6655322bd135189115f1c476b99395f4b908bc4c9f43cc0f3403d92cc3d1fbb2b8e42b91fd2d97126de15c1bb3531e26a030a7118fce28522726079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999f4f2a8642b3564f4ad9dbe0513151
SHA1db9400f06732b376ca1966589ba2f605dcacb1b2
SHA256ffdfc49a0a5a4f136caaced387ca9b64ce589242dc8fc24d1fb8336a7d8305d5
SHA512acb522b953a3f67c5f9539cbd1c91bd1a93ba5cb63dead3e97d806417b31acf6b65619077e018ddc7e2cb512d2bf621107faf123dece673b3bb1961ff2457c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4bfff8586d409463ac6fb256b6a0e8
SHA142dd017d8900812288e812ad3ec84514618dbef5
SHA256b5b603dd21f730c5d0da218854b8aebb25e23d8ba3eed1d0486d5f3b46bd1e00
SHA512360cf6ebad32f20ff19e23b973a3ef9904bf19fc8f606e780e0bc44ee2f61f7cfeb481a6e20f12afec3cf67fcc5eb04b2c7b4d19a304eff66199229ad232e9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931ea3f6aa2f66fe3cd6dd56e341292f
SHA1d8f5f615c47c614828393c157d451ca86cb1de2c
SHA2568c81886cb74e84b0d11cc19a9ff95ff2bdcb52483c57e3f4d0b9d4aacd34bbfd
SHA512b0abdd60e8b99fa3c980b4e2c6808ea2e3cc098834255fff661a25c2f22b1dadf1b1bb86c788ec684b71ce64c7f91f419b3c4ad99af6d5dde815419c766e7852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf09657d3b19d237eecfa6329825365
SHA1035b2c0f424fb997772a17507efc596ab28e45bf
SHA256903da3848e8de2d7b3d018edf36a8a0ae78b287f406ab0276e91d490682318ea
SHA5125a77382391f7cfa2eb94f97cb825a24455c80929eaed01773a0b5acdaeebd856e7c513cc140688a2984ad5841b30920bdf7a797f01c85a98a1f9b8171cd98a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c4c146e0d6741d6b1cae352afd4bd5
SHA13077633f2db458272d1ef6059b37867c84182922
SHA2561a3e28adbb824f7350f35b69dbd98f3dc98f65caa610f8a5ecae1857b5c07749
SHA5125fd9ddaae92b379e9564be187ecc55394d96ee63d7ba4e86c5d862f871d183a57980e7d49fd73c39b9fed240f042356672eae0453d3263637622ba66a81d2ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe61cbdc1b194902cea787d16e0dad0e
SHA1469a0b41a8360a66ae3e4a999295e917afdc7319
SHA2569cfeb3c4b1929c7e8fe3c7726200d6cc1c3a2b2a58c0c19cbdbc58a63cb56f4f
SHA512af1ddecb077f4024f4b27b60192dc4468d4c47489adeccaec79a9cf695a5700f84c3519ea9017ec47e8d58485f9e3a1586a3f595c007632d2f142dc35dc7ec78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df69a0a60e604cab38ca7e0f5755f50b
SHA15bf501d257e952bff7a4664b2ac432ca432c87f7
SHA2561d38974b8a24908d6e30d81da12b38da49d43dd300d232022a0e3c2d5a8e4b1a
SHA5124b3eee9ad4e29f9c52d588d0640702d47cc1141adbb0b69aa5907771a8cfde16fbc3bd24ce7ae86f08cbaaaf7d16cdc1bee34f8078421479492e8cc4e9469779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dea6e87550cde8bef04672e6bf5faa2a
SHA10ce2872e759163a68b1638284bebcd96931aa9b6
SHA256a80fa8c766673bfc3b6e1f0cc4ce7f8455f790794d502a9737ced754bc739718
SHA512f2bd1f3a14f72714d896ff8e0757e89b4c64ad9107932627afbde4b1097689dfa364a5a4a81d79abff435cadd21e0141c59a65cbd8b793b5974e3381adf3f894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641bfd61be274cb750efff5c7530bd9b
SHA12b7f1b70717927f03891f76b714500cfa9503a8f
SHA256d6c2cc7e2c0cf7ad38324504b4d3741224edd9932bb7c5e434500ada5a90c8fd
SHA51255e5ab40299b3f888ff06c9e6579311b33e9544e931f1fd7b2c01a75d152ad34c31452d79fc8ffbda05a0a0494a4d74ab0b8bd4dfe250ddadef4947daea937a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332596feedebe286ff0ab48f2783457b
SHA18d90b8194d511d52b0f9272d4d6c6bf9a2482271
SHA2568b6039d15728f320915b99410b21f0d939a4bcf4e20cd0e7d293b2bbe5db1777
SHA512355d4f1539e0220a1b6472fde0a43019dbb6cc3015ed43e07f3784f4019c37b5e5a42c6089fd2a14954503922f41eb44be7024ba11aae771b024da5cd74fee5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b