Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2022, 15:06

General

  • Target

    http://aveco.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://aveco.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5024 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:540
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2ec 0x300
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4064

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    631B

    MD5

    54f5dac59e9c2be8229dded05837d48b

    SHA1

    a3a4a2325439daa22af599624c7d07d7eb24391c

    SHA256

    81d755ca9b28ec7f47d0fd4627c55c42840fa294ab7e9987ef88a5f7b1e15113

    SHA512

    aa2b6b442f9225b621bc79b92d3fdbb2c4c2ea69dfc9a4325aacda7f384b36984878d4be71e9e556f2a5c36399fc3091509e7d0421b601ad1a381d8a2cba8d7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

    Filesize

    240B

    MD5

    c4650ddcec2e7a893ea8b17030cf2f93

    SHA1

    cf31f7c216cb65338747e0c7791dc48ca005c262

    SHA256

    2e200454d89007722db018355d55b247dc2b6af581fd8c48c364320089d8e205

    SHA512

    c5a152873fef78e7656222f310559b88e819f15e23370a7c1d71cf341158f68d7f5b62311f6c6b53dbc8e03008ea574f41576dad14d0d8ca46cb3b33417838d8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

    Filesize

    1KB

    MD5

    08740803a06b4680dda4f9ef04c25a9d

    SHA1

    000adab9817bc8bc27c036f789fc54cefcf7eb45

    SHA256

    2c6e03b514473e8487bba6d41a422a7aa0c158b0bb07cc9567c01a7ff343480c

    SHA512

    d5899ba7cc373f7a19127543e35c1e94edaceed40345a106c866043cef4738502973413c3df603ea7a7cd08e7dc794810e6579a1acfc844087d7648888e1cd11