Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/09/2022, 19:00 UTC

220926-xnpnfsbgd8 1

26/09/2022, 16:07 UTC

220926-tkzsgacdhq 1

26/09/2022, 15:41 UTC

220926-s44ebsbca5 1

26/09/2022, 15:29 UTC

220926-sw34lacdbp 1

Analysis

  • max time kernel
    426s
  • max time network
    428s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/09/2022, 15:29 UTC

General

  • Target

    ProgramData/McAfee/QuarMeta/26fde1eb-5977-4d4a-a552-8267a663ed91.xml

  • Size

    1KB

  • MD5

    1c0103d70b96c380f0a483f39df329c0

  • SHA1

    7f97e6eb2e38bddc4ba7db23d857ce91831d01f2

  • SHA256

    6aae322a19279955a9eb3edbfdf760833bcf36e68b83b4f609d343df1d7f7a00

  • SHA512

    46057c64c452fcc3750b4edb5c1e1d128753c984a5132771e05b5ae0647d90e7f76c48af81bf29561e3ac24ef2a46d62261bd588880cba2258dbc7585c05e340

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ProgramData\McAfee\QuarMeta\26fde1eb-5977-4d4a-a552-8267a663ed91.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1376 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1184

Network

    No results found
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    753 B
    7.7kB
    9
    13
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\L34QN2G5.txt

    Filesize

    608B

    MD5

    bae485ad4d7812b2a9695ef79dcc3d6f

    SHA1

    6494f9852536f3d62f2942c3bc8e0188ebbf3e4b

    SHA256

    31a18243043e853c448f6a8ccd8110ba1b4f8d3bb58552e67049419d0ef45ffc

    SHA512

    f0968352781ecf3cc35fd1d54ccd291512a7d89437a92e2ebd146b51cfc11e2b6d7f26859ec3d3e03fd4b83317c894f7bc446a044658d4a2c94e8397ed6b9bd9

  • memory/1576-54-0x0000000075B11000-0x0000000075B13000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.