Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/11/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20241007-en
General
-
Target
.html
-
Size
612B
-
MD5
e3eb0a1df437f3f97a64aca5952c8ea0
-
SHA1
7dd71afcfb14e105e80b0c0d7fce370a28a41f0a
-
SHA256
38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
-
SHA512
43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f2854b1731db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76F5C9E1-9D0A-11EF-9917-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437147241" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000a0aa6432a9c5966bcb6e7bbbadeae7f46ac8eccce0abe05537f1550fdf3f9f6000000000e80000000020000200000000ceec13bced0157332a6c3936b0410dc2c86eaa23f4a7df56355623b1d6f936220000000193672a970d7e1beb63008a59caae9b356d3751086b69a4793fb63fdb567dfeb40000000d7d264fc8ce77c294d94416678390d8e95c07f8e88da885d512e6589250acab1a0f78548be7e51826cb21c5b2b8056e9a3ddae1dfb80bbde9494fad40c199b3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576759b2a6c673b3702030a974e735ef1
SHA162b1ff2da5ad42a6fe949e139610c99611b359ae
SHA256223bc15ac9035ce9f62428dd972b3d6215ac1a24f668ce31c90c185921015f41
SHA5126f80d81f0da0b3213ed5f9c144ea2c95a5d749c5d974e618e2ada2948273e7029db31859f327273d29f6039f514b0b34bdc9328ed4f4d07fc9d592b6effd7156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e234b6a283606cb13395fcd50d93f7fc
SHA147a5f942c4e54a00f486a04d3f7ea88e4778e380
SHA25643fcb96a28aeb1c2796ca8ac2062722e42bb0fe04e6ba5828a1ae0186e01be35
SHA5126c1f061bb31b98fc30a15daa3a2734f5d629fedee4524331f39492a50de74d5ac9f15bf44d5b992a7b868543c56a34de682e5457d6e80631baa88073b7e32c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833f9c881ffeb7fb1f402a4042dafa41
SHA1c45b992203ca3699c480f4a85db7a8204891dae3
SHA2560b9ec3795edd130b47c1a8f40e1062f65979cd28c9235aaa014e948485bd4b23
SHA5124f96c62d0a16138f0af1f04ee2689c3b8c2783ba4bfc5f376fbe83ed30cdc7adecb1a4cb8e0b63f6ea68541afdf68100658d4ca917b8e02c1b90ecf9b4f161ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd4a606496e0791eec71a2728a7413b
SHA17e49c8f71725986fffc07891e971fc1fd7bb0680
SHA25652d5c4bf92f0c5a691715e5a70ccd0186267042fa6e3adbefc6c8e2ef3f88dde
SHA51296489219b41091ccd1c0123b87e44a0e807599f71cd36bfbc71c55d8af6d2a0d743bbf29b777e06d50d9998cd13fe86ed0d7a84c269e1c742ec7c10a1b2c11b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e1a17cb026ba8a7d4e03ba2045df25
SHA14603cd6c60ba3a47a483a0b2b7878ed631a5218c
SHA256bf85675dd698b039a8e59b946ebe1e7de7ed6953a326fc25facebc18cde19255
SHA512160a14459e05af1b7c5b2ae50d9a25141bebc3f9e2bd6c9468eea9b345dce2e486548225546e76806964ac6fb7f3f7adad86b6f6b001d4be9453ea64193b853b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4492d54212c5cf536e9b47c2b9c52a0
SHA1ad15530e9b7082372e165a518389dc71135f56a5
SHA25643cd1a791c74fbb2671e0660497a1cd46ae9ebd4353e76a812750c186cd8e2dd
SHA5121eb6c693b36f3d924a493b1fcfd8f2cc04ce8795382d6e05fc7b8320fdd0f3200c4e38ada72a9472224b916cc21829273d0b30e9d71993497d8d83f7815eefeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962ebc1d6ea85e0b9221a1e2a9e4b69c
SHA1dfe0b5e9a84b8a732b0d458472f1cf85cc86e3e9
SHA256d184eb94784f5d9e3d7d97e496bdd626f3d1b5b8023a5f5efd303db9f01bb204
SHA512fc02566e0e9bb179a09299776bbc49a0f05cebc3d8f46c97626bdd496d97a484428e7c011274a1d0fd573fef535b47cac314c2a0b40a500a11bac92e4f3cc511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe113f138de79e6ec9933ecc5a194b8
SHA11ca03ecd482cfdcd5af12d8fa300372c3b201f70
SHA256154d27396f1c1515c4e65df0b81a09806614c6f7b26abd2aad4dcb6e5fc7c21f
SHA5126ab463edcb96841e017fec82f1020a62d2613dba3f0a9d152aa39c3e58e268508160d2d2f7cbe58b95933ea36fee382891e9f3aae3008318fc5f209465bd2b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9eda0cc9bd4b7ef2603e497ae06911e
SHA1b96654223c0fe0da6e2e6f700d62491f3c2c1a1a
SHA256ac84aa60482ffaa350864d0dc9f7d1d3031a5cbb3df0295c7fc1f4c7d3222096
SHA512a73b16a820a1b8b1915fbbe445fb3a569cc4d4ba22dd9c0192de92e8c0b956b85e4cf598a7e059c447e83bd85359ffda75ff1c6b7e9c5b2787479f98df4933d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575dc03eec5d7168806f1433eb95c00a1
SHA167852514489f18734b3596e4c1b8001b8e8a2cc7
SHA256b9f549933d7fa9fae3688ebc6d33c7d6b71049d11a2edcca7aee82105d803f88
SHA51247d62982470fb0a41a608ebeb6502268ace862ca24a0f8e8a3b56c242c294b05ffca78945cf60094f82b4ff93d82c74e27622e91f1974a257473d4fbaeb4ef3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d6cca3ded72e4879727abd89e58ca0
SHA1ce9f130e9a3a01be395c525d83c5e332a1bf908c
SHA256adfd83c051a28e8e457a07fb17edf3bcdacee707fef8a35265ce1dbb0083215e
SHA5126a5c8876560e567e2103cae7650b4bd7128bb6f11c85fd8ec3327f586661590de2350a37c8cf50215856af372a69767031d12db26028cbb47d0871221efef2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57daff2cc2907134ead8b441b3729acff
SHA1aceab8bb5871162e085bbf4b118ac3e18113360a
SHA2565f2dcda9edda3199418034f495d5e360fd6d558a792321456a4e5eabd7a1203b
SHA51264579445100dbeadc497ceda3e077f44106cbabee06c416304a5a9946a1da1bda287fe42ee5865e4958dcb1b817eb69735caead4a8e42fd8a7729c3495da3d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff443303aa510f60db1f186db59b8a78
SHA13415137a34f7af6c2cea75cb710f5f01023b18d7
SHA256801e996a8c4a44d7afa80def9c0796efbd1d2eb1f5eab0b1e811bd71ee19e184
SHA512942b20a76b52091c924aa5827ff893ab24bc573797643fa7c9e9a9fdd511e46c4f7f4076cb84739e5d2855eb55eadc91245602bc18783ac6551e0e2489d6d993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e55712f31c29fb73130ba67db9893b
SHA19876edb9cf9929417a7c48f445fe5ba326ad99a4
SHA256fe611e870a7850a7302363a78423dfb325482d8000db59969f058e8d2a7524a3
SHA512d42ae9b67d4df34f1ebdbe711a14507e043ecff649a07a0bcd8e16752766667b726720035469f22c8efb5a8401642a60d4969729a3193dd18d0709ad46cbef13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ffa424c15aa087ed42d536a4f60d5a
SHA1fc287fbb19aba4d55651d8f698e8cdbb12098cf4
SHA256745965afb0c8ecea81e3cab6b0b00f875a169395d596108e3529e2cf8e40a883
SHA5122c69dd031c9c27fced76fa369e5ec7206f72d9de2e72061f307a484b6010b06ee63c8d1e09a07d1a34e8f6c5d27525dadc112d3a6d8b40998c9cf6749bcb7543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c0f6877965943b6d11c623dc17e5a70
SHA1e831bd7d91ee1eb5d5ee16374efc507eeb790d58
SHA256961ae2805d72f388ce0324b9bd0c6ffc106d3389cc288f57991b03fa831afaa9
SHA512df806e5910b1fe5d603f6f5db5dbd36910bf696599785f9325b9dac8af9f25756fae1fd337da3a76a685f86ea3a263ffee4d24533aa36bd011c577993b942254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6eecd8012576b37cde1873c2062a940
SHA12df33debc976ca4aaeb4bdf1cffcdcf07f8a6418
SHA256bc83a9a3e79f2e6e16f46578bb90200157f78959c12f704af876d717d5a5788a
SHA5128595d6935d2c4d987492017e029b804490cf02328653fbff5192bd380934d3889e716c2a1fb6ef780342201ca59852e873e3940c4097531effef06c47da8503e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5716f54a9501942b6e08c81b5302008be
SHA1daae997f1ab5b6c721ab1c4ab0a8b02bb648f127
SHA25697e80d9efc2c34e1d9ebe5fa6e3e04468a5475eae2e463eddebdcdfbf2b5e777
SHA5123136bbd5eac55457abf167ef18e34e93ff0eabf1e63503ca2f89ce2367a57aaa7cf25441e28fb575e1469f85a62eceff0bd0935a2433a50539250c9551a4f001
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b