Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/09/2022, 19:00

220926-xnpnfsbgd8 1

26/09/2022, 16:07

220926-tkzsgacdhq 1

26/09/2022, 15:41

220926-s44ebsbca5 1

26/09/2022, 15:29

220926-sw34lacdbp 1

Analysis

  • max time kernel
    74s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/09/2022, 16:07

General

  • Target

    ProgramData/McAfee/QuarMeta/26fde1eb-5977-4d4a-a552-8267a663ed91.xml

  • Size

    1KB

  • MD5

    1c0103d70b96c380f0a483f39df329c0

  • SHA1

    7f97e6eb2e38bddc4ba7db23d857ce91831d01f2

  • SHA256

    6aae322a19279955a9eb3edbfdf760833bcf36e68b83b4f609d343df1d7f7a00

  • SHA512

    46057c64c452fcc3750b4edb5c1e1d128753c984a5132771e05b5ae0647d90e7f76c48af81bf29561e3ac24ef2a46d62261bd588880cba2258dbc7585c05e340

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ProgramData\McAfee\QuarMeta\26fde1eb-5977-4d4a-a552-8267a663ed91.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3TUY3T95.txt

    Filesize

    603B

    MD5

    9910f03dcc98bc1bf0a52aa6fa8d55f5

    SHA1

    d4009a3338169d89eee96b8ae50230a425459bb8

    SHA256

    95df8582dc80a8d4c40c5c79ee05effb3738272c84fe4a36a3c6cbff4b2218fc

    SHA512

    95dce5e17be81428e02b3cf8cf9dab3001ff5d8fd66a7da206c14fb78a2550bfa0d00820b66be1c32bc3fc6de1d20ab9616510bb3575af6a79149c774547ad49

  • memory/536-54-0x0000000076831000-0x0000000076833000-memory.dmp

    Filesize

    8KB