Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    79s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2022, 17:22

General

  • Target

    levels/Monza/art/shapes/NoCollisions/NoCollisions.xml

  • Size

    25.5MB

  • MD5

    97228f1545cc9f2b55b259911b29a144

  • SHA1

    130869718b03d794bac97b5a7b622086fe81f086

  • SHA256

    c933593dd9fd34da761ca5be96b9f01deb456d86af73d30a53155b0ae9d0f934

  • SHA512

    7dd946158398a8b7a4e97489bbc753cb5c4e2f54109004a76cd05b82531d6db033762bc7cd258bee3da3fdf1533ccfdb7fdd37bd86ab8276d122f28c5458c7c2

  • SSDEEP

    12288:oOucRX7yb9rBHXH5DAhDREC+Nn1hZMnxh8Ws3hn7XlWs3hn7X9Ws3hn7XRWs3hnO:6vIyYxjzlOtQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\levels\Monza\art\shapes\NoCollisions\NoCollisions.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9WX31OIU.txt

    Filesize

    608B

    MD5

    60a144725202418afc5e0acf13302fd0

    SHA1

    6591d6fdb9bccb381d4bc4b2a928e5abf89d6fa1

    SHA256

    23b0cda3079cc23f396c0e7b5b6219479924ab1e3f345eeb7dce14e7325c7d1f

    SHA512

    585a7956a3edaa752ddd6ae3223480d43901c0339ee5fda2cce1ce3238fe405816d9f1122c45291f91d8cfa80cd9d6904e2a59d420576aca3172905661f27b16

  • memory/1044-54-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB