Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/09/2022, 19:00 UTC

220926-xnpnfsbgd8 1

26/09/2022, 16:07 UTC

220926-tkzsgacdhq 1

26/09/2022, 15:41 UTC

220926-s44ebsbca5 1

26/09/2022, 15:29 UTC

220926-sw34lacdbp 1

Analysis

  • max time kernel
    91s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/09/2022, 19:00 UTC

General

  • Target

    ProgramData/McAfee/QuarMeta/26fde1eb-5977-4d4a-a552-8267a663ed91.xml

  • Size

    1KB

  • MD5

    1c0103d70b96c380f0a483f39df329c0

  • SHA1

    7f97e6eb2e38bddc4ba7db23d857ce91831d01f2

  • SHA256

    6aae322a19279955a9eb3edbfdf760833bcf36e68b83b4f609d343df1d7f7a00

  • SHA512

    46057c64c452fcc3750b4edb5c1e1d128753c984a5132771e05b5ae0647d90e7f76c48af81bf29561e3ac24ef2a46d62261bd588880cba2258dbc7585c05e340

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ProgramData\McAfee\QuarMeta\26fde1eb-5977-4d4a-a552-8267a663ed91.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ProgramData\McAfee\QuarMeta\26fde1eb-5977-4d4a-a552-8267a663ed91.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4764 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4300

Network

    No results found
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls, http2
    iexplore.exe
    1.2kB
    8.1kB
    15
    14
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ec21d7b0db946b7ecab4c4ead789e338

    SHA1

    b708c1a90566be72204ed5340bd05d7224e51403

    SHA256

    e15133cd7594e706cf5141df1a4780c26e101c85c68262346f91b38d546cd47e

    SHA512

    d34772501233d31566db776e19b58a4d5b0ee4a76613ac0e9960edaf42bcda35af3d83592f71cb53a1ef9f428ea6e67e0624bd1c84d29f04c7a360ffbc03d1fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    5a98f579b50ba8cd944ab3f76eb2bf0e

    SHA1

    3eece2edc06ef2a64d4c594924ebf829795d01db

    SHA256

    e20a7361c49e3014095b344100fd4ece7d9060a8e47792be7d5960278bea58aa

    SHA512

    128bbb97f9e76fe2c93b644e2e05118323cac4047975900fb3c639625878e7426b2cc3fcf0808d346bbb2e632fcd73b2fb257561d6edb84abe2a3554b1b37294

  • memory/4600-132-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

  • memory/4600-133-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

  • memory/4600-134-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

  • memory/4600-135-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

  • memory/4600-136-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

  • memory/4600-137-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

  • memory/4600-139-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

  • memory/4600-138-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

  • memory/4600-140-0x00007FFE5F790000-0x00007FFE5F7A0000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.