Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/09/2022, 19:00

220926-xnpnfsbgd8 1

26/09/2022, 16:07

220926-tkzsgacdhq 1

26/09/2022, 15:41

220926-s44ebsbca5 1

26/09/2022, 15:29

220926-sw34lacdbp 1

Analysis

  • max time kernel
    74s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/09/2022, 19:00

General

  • Target

    ProgramData/McAfee/QuarMeta/26fde1eb-5977-4d4a-a552-8267a663ed91.xml

  • Size

    1KB

  • MD5

    1c0103d70b96c380f0a483f39df329c0

  • SHA1

    7f97e6eb2e38bddc4ba7db23d857ce91831d01f2

  • SHA256

    6aae322a19279955a9eb3edbfdf760833bcf36e68b83b4f609d343df1d7f7a00

  • SHA512

    46057c64c452fcc3750b4edb5c1e1d128753c984a5132771e05b5ae0647d90e7f76c48af81bf29561e3ac24ef2a46d62261bd588880cba2258dbc7585c05e340

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ProgramData\McAfee\QuarMeta\26fde1eb-5977-4d4a-a552-8267a663ed91.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\A64FBQ60.txt

    Filesize

    595B

    MD5

    d7b6242e89842a10d2207d3ae9179206

    SHA1

    c78a6dcf8d6dc6b3748b848407a65595ee019513

    SHA256

    11aea02e8b0efa811340799bd3dfed9736df2c59377df73e0df6558203ec445d

    SHA512

    a3dccfb8a389e71239ecb009952575a3e71331410ffbfc2948230096cc39744ee2c83cbb3d013f50d759de958382804dcb6605fe2461155e99e6a3ff1f8c0584

  • memory/1900-54-0x0000000075A81000-0x0000000075A83000-memory.dmp

    Filesize

    8KB