Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
11s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/12/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
widget-icon-list.min.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
widget-icon-list.min.html
Resource
win10v2004-20241007-en
General
-
Target
widget-icon-list.min.html
-
Size
315B
-
MD5
a34ac19f4afae63adc5d2f7bc970c07f
-
SHA1
a82190fc530c265aa40a045c21770d967f4767b8
-
SHA256
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
-
SHA512
42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9421E51-B1E7-11EF-80B1-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2844 2668 iexplore.exe 31 PID 2668 wrote to memory of 2844 2668 iexplore.exe 31 PID 2668 wrote to memory of 2844 2668 iexplore.exe 31 PID 2668 wrote to memory of 2844 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\widget-icon-list.min.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ae8e647cf81779627ae10db95f2742
SHA1dcdbbd0efa27b10987bad590136ae54fe38529dd
SHA25619bdaaa8f138be90099f7db983125a58ca7a212643243f413fed2664320702a1
SHA512b4ad4d30627701af3feecdd1dbdb6a1df7ee237c464007a51d7c587294982c71fd3147571a7cf66e30155d0e029804f361c50b876c344e15c6b3f2cca7c6a049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c8e0eb57d6c8c2878c6568003c3c9d
SHA12db93134ce7bccc635530e0e61bd3a81aa4ff789
SHA2567527de2ca549811ee4a80e74719b99718d216a77d36b517d4c5faef5ae26f67a
SHA5126bbc04d32b026f29e63a73e6580d158d754d4a146fba4219efd93e66a50ab941d62904d22be1d806233c76f43042cbec8015b18b9690c55ee2fe1ab7be61134b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e615ad3b80f164fe63ec4d763a392080
SHA147d7505f4528277358b96f41650157611f716fe5
SHA256f0465a3ec7e35f81acb66a99b911cee86f85ac58edcbc4a48b46ad88f8e4ede1
SHA512d6e4c93ffff8bb2b37017617cc40ab251b6a727037d3d836d05348f0d190ec98144e0dec0c2bbc15f60cd5eb4c05a19f9b57163c9090bd5ffaa6489783fa8f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f097d349cef92bc8cf14332df4426cd
SHA1521d32c745a9fb7c8dd6e9f786ef7d3257152211
SHA2564e6fa73cebd44b4c207cfd24853509ed64ad1c1df79baf5e853796f6a5271fe4
SHA512e5345039fa27467410ad58fc74c626e1f8c596f434df819612a06b41c99ef88020a5f9a7b141b2c69f6ce01d09bd0377f34ae84ea7d42749bd5a8c652614b969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab3d05600a7e6192a6dc9180880bf34
SHA1b987104be708b7f1f91f1d7334428265f7908b16
SHA2568be57be34257d47de3d0e5cb76d10983b4215dd6f97db75e0ff5c7b32a2e8c89
SHA5122fa56ef5f05ad7a59a546af1223a6f21106850f3e846df6f95560033e72da41b61e77a8a2317c31ed6b01a80faf8ab56a659b1ce98dcee4857caa82eb833a753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ef917ee04e9e6623748c6ab948c918
SHA1c3bcb796b7b4c46d1900b8b875e3927a9442eb5a
SHA256a815d73d8ab6819869a3e758b37d611c41520ecb8f8ed0178ce2788aa0fc8c72
SHA5127d6006f2da4cb8b40bb44aaccc2f4374f72f739fca35a1f38ade0269ee5923624234411ef1d33086e8ff597fe548ff5d432c51ab209d28b7f3028631433b0d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0a06efbcbb2e2a6fde51a90ff98dfc
SHA1aef628ee3ddf9d5631980dd9e4fb4e76aef9408b
SHA25600009948e1fe55c6a1c22abce9513447632c41540b9e5f93a3aae8284d4ff9ca
SHA5126438f85f40a338597ae5b6b2ea772cf60883bec767e87993b1fc39e8b12ce53afb4e991d873f26d00e9b797850853f784f64e3cbb4151a0d950f4dd09a861cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d05438b0f200f6fb48f05dc46d0a2cce
SHA1efb48fc5b943acbab392c66ba5faf100d37a76a7
SHA25690d261c23126552bcd862048643e1e015bb192924575b741036193910ce17545
SHA51271c03fd78fbad9e00f5a374f906f1f2e9f88f1769d0b6abc2b408320ce6f03cbf2df6a76cdabce2f4ac5e277df18081a0ff6c79d6ea0365e3a4514a3a6becc45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b2ff88c9c11151d314fefd58ebfc12
SHA164f9e6fdaa9395a204a238dd4f978f2eff001f91
SHA256f66bc556cba69c78545f7939961235c356a148abd041b6c3dbbdb7e181beba96
SHA5122ef9e57e1ede8fcb5fc08604100249be6d7dd16de39b51f7fd4bf7af54661d071c041b4e45dfec3d2c763c7561d96e64fa6ee55c4e98eeedc560e3aea69d10e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b