Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/01/2025, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
DEVG3SWyqKpJcgd9q4.html
Resource
win7-20240729-en
General
-
Target
DEVG3SWyqKpJcgd9q4.html
-
Size
39KB
-
MD5
f41b82718cdaa9248e40191eeab8a78b
-
SHA1
96af473f0ee1d6473aba290b8aeea715af6c5873
-
SHA256
38df6a2b5a58884cfdc1ad6f6c2d644a85af9171abd8cd64cfe568c29988a300
-
SHA512
cfc5aef9ce1633726058e6fd467a31e708e2d5a831792da3f9619cfc4544b55c12d0082ec63ef51231f2ea7fd3f9aee453b1ac2ca332cc42b427cf1af926dba3
-
SSDEEP
768:mOIfRIKQFP+o6e47J/bj0OvqSvIePeffUS9+3oV3AY8iwY2dGJbtXDtebqLHIZ26:mOIfRIKQFP+o6e47J/bj0OvqSvIePeX+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{444537F1-D483-11EF-B856-666B6675A85F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000014bc17e48c079840a0c2eaade533223c0000000002000000000010660000000100002000000001c865bd00fef3cb92a5e0aa03f7aeb334156ec0fdfbd41b905a0c60f7226151000000000e80000000020000200000000ddab03145621548c02aa56b28ee23ec60be50fb59c2e6dfd47562bf86f1907e20000000503e647446ce7679e1925fe81286bf112ca0b393f13e7f44373d8255276087fe40000000ce3c322aff1dd19f4036610919d41dd36e556279d0b3eb80c8377dcdf38627ae78902c71193a16d6396d2cc1cbf4ab33352251c86ea9e1b001b322c1b8c7674e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4073d5199068db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2576 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2576 iexplore.exe 2576 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2132 2576 iexplore.exe 29 PID 2576 wrote to memory of 2132 2576 iexplore.exe 29 PID 2576 wrote to memory of 2132 2576 iexplore.exe 29 PID 2576 wrote to memory of 2132 2576 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\DEVG3SWyqKpJcgd9q4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd31568a8c88a578e155ff1bbc11b6ce
SHA1fa14119f457fc2a5b1753432e252c68bb2397282
SHA2566aa03cd80f87313171124f68fcff12ea9923aeecbe81512422077f72d59023da
SHA5120f84a434d41cda2bb7e2374e85a5853dc5877a8011f9202b10ebb2a36726498637a58a5487c1af9f1e957bed2057f9dc272936d704955396bea50d2a82696208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d585f5ddc6c70c189fa755d90905e39
SHA19142a46238a21ad37d560db06636c1a1a8512d64
SHA2566e424feb01340c55952fb127257b4bc5fdfa02ae5473de2c533735f899b354d1
SHA5120eb1fceca2b798734575ec3f25e17503e3de46a4100dbf7a69ec9d03a63ad7afea48e5b4d30ea579be151c1bdf626f607ecbb5d39a7869ecc3ed088f1cc09550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739547bd1d364818901435aacd2c0fa5
SHA1297204862f8cd34926805a6eab5baa5faa94803f
SHA256e99855342becd0aa1af5c8d64eaa33ad088b54d784a313b0ac8da1892fa9bdc6
SHA5128fc29d2c11d8db5dba9d06d3bae9bacf099f18fb15771ffce2c91c496b44ce88d9d81e68a0fa22242fced4a6ffc95c456617678ad6f3190efd6120047c074368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f04c3d27e59a047bf4bf0b9a152d383
SHA1d6f7705161c68912c3f21c5dcc0a89dee8b872f6
SHA2560b2829c045b32871df8708530cba40c9b212c4b064202be6a7154b86b553114d
SHA5121d81e327181476b53aaba0781e714739a16030cbb9e1481e8b46f008dce156887aebe8d8ff86cc7f3ba1d49ca2847f87620bf7ff9b4a37a5b4564a706cbd595c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c010b3d476e938a45f85909dea91d16
SHA1389dfe2c76b7bf3263383b67bb99fa9e725303ab
SHA25685f98784270b6ebcca97e7e015ec7c40b989be05114c091cab6cb3b674700c66
SHA512c8406b57fbc36e254544eb5eb582e58cb1f1813590a3cefa85cfc2da3057a21c25ff6e08d0d0045a8fcf7bb1d777ba8f582e9ce0dec88ca658f60150d667b939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ecf2ab2e5c8366eea3e49a6c31ff8b
SHA1ec238edbde603f240b60e553a0603602989927df
SHA256f2f93d3875035b8ab738c19cf95530470e0a286d88a43105613973a7b5c04b0d
SHA5127858113cccf3548ca47501c58ac51cd4dfd444ae713a4f1c7f1a710ef09dd50020c1b3fcd00756f40d3ff61d6a7090b9b475bb4ac17875cb9de1e3a620627ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a4352ec344751e97b0f211fafe2e0c
SHA1ed5f8593a97e6b0a072e0cbc5f68c0756b638871
SHA25609ed46f60e1802998d29aa29e8ffdd374d21484c9520f629f3bcbbd7c89dca1b
SHA512104b835eb8adabd60051c73083a5d89456cece0ed3a9ce4266e6bca804fa76eef310178115f90658f4d34cd3a3e703d149a30ac5009d3fab178eb2e07bbe71b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c0974d6125fcd65161c5090152737d
SHA13adb41e04e470e855fba39ad470537d3d0650079
SHA2564d8fc1692bd9978582f7d3adcf40b2d9c55a3c1c8f69873657b50d56fe365104
SHA512a113e9c9698409d30a347888ad8343f3011213078c26b109388096628fc8af4ea5f9017bb6eac0c21ffe0074a204ff11e313a593cd884271b06755b3d5a5e4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6b097aca1a5526ca6abc28fb45d02d2
SHA1c36f9a5584a133821273480db41e8a99cf9fa322
SHA25644595ec1ed8e29c471be5758e25ccc4b7670739cf8a74f9592eb6c25bea427aa
SHA5129a80a4e027d42becf3d18a2ef79b645872590afe0408e2e8ab243d91e5549baf72035ed1780fd6987a279bac0a15b37722443891f5017346833c4c36489d5df8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b