Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2022, 13:51

General

  • Target

    https://hlcs.cf/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://hlcs.cf/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:537617 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:860
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:112
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x454
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1984

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9da2856082f317076f575326dc35ff0b

      SHA1

      4b29cd6875780f52435797428e6765bce0515127

      SHA256

      85b79a96ebe4786dda257dc644cd4bf7d50137273a957f38c275d88aedc358ac

      SHA512

      5d0a596ddc8650a615e8a92db8a3ed80464d6f76c412ecc9558dca937545f02e3b48fb93ced1f55345062d59aeaac50d0237b150620c0e23f21f66889eafa1a8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      05ffd0b675595ed7984e44b28b79726d

      SHA1

      b05f79b28f4b33751ee29715f738bcbe52ee0d4e

      SHA256

      f0f0eb4ed43119043101adaa97582b5e2de7eb61e7962f4331e819ef0e7d0dbe

      SHA512

      5ac5e65de4980a15a90c045ec3aa54a927edb699cc59ac2a1f6e00c08e734c816356d9465876dd0161ce1fd480b3606447ddf381acd9f8950142b3f799677315

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

      Filesize

      8KB

      MD5

      b72f7e3edd8c63bde5f2eedcef3447ce

      SHA1

      cc98117b365c726556cf31dc6194e923888c64bc

      SHA256

      348e772bed29ef2842c00f36320ca015edaef8cb9f8d34e814222b4ee4b5b382

      SHA512

      10b0a766690a2baaf63c7ee718e7a66ae41f05236b0e47737bfe51a9466a463355aee3e90877cd17ee51da4820d78975e5c8e0178bfb5c7b7a6c2ac46b6ab4ba

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

      Filesize

      9KB

      MD5

      6dff6fae5d494c8fdfcb0ba7a27713b0

      SHA1

      1ef50dcf188710f18197b405ce68f410a4b7124d

      SHA256

      ef98e1902dc9cf241009423a0ca2664d1f07510c155ad11ab016f9ff831de744

      SHA512

      f6c3694e74b411cd10b5d99adc01e320c7951d88ee7b899864181d23c1b9105d581a152036ec2c56652a75544515c951d9f46157fe79e82779058edc117a9166

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

      Filesize

      13KB

      MD5

      a300d4ca5cae3fab6e8657aa693a06a3

      SHA1

      01f22076f4e5190b330bcd7f6a2f4b15ce478be5

      SHA256

      730b7ef10f74fbe5f057ca8e3299be656511d29c218dfdf93cb3a2b1433c6815

      SHA512

      59c3b9849409da9a90087210412e345a419128ecf5a5449d940a74b54af83f458ebc1cdc22b7a81247a990a9bed1a11848c1d2f297ed3d68cec4a3492ee9cfd5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S523NGIL.txt

      Filesize

      603B

      MD5

      ec7eb359bfd323c5a50026e06297adc4

      SHA1

      2dee907de4a0f119e7d9cfb2335a632229164584

      SHA256

      9c4cb81fea6572dd5b371577de6e9d55520c08ba9e1515f2eb5150ed00692a7b

      SHA512

      5e680a181adf1c9f16dcfa12acc1636967812b093488bd66c76885fc122c6527a15ae71f2db0b8bd1342ce85f3c4724e89e449ef6acbcc6c5200839427efb0c2

    • memory/112-55-0x000007FEFB621000-0x000007FEFB623000-memory.dmp

      Filesize

      8KB