Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2022, 17:22

General

  • Target

    levels/Monza/art/shapes/NoCollisions/NoCollisions.xml

  • Size

    25.5MB

  • MD5

    97228f1545cc9f2b55b259911b29a144

  • SHA1

    130869718b03d794bac97b5a7b622086fe81f086

  • SHA256

    c933593dd9fd34da761ca5be96b9f01deb456d86af73d30a53155b0ae9d0f934

  • SHA512

    7dd946158398a8b7a4e97489bbc753cb5c4e2f54109004a76cd05b82531d6db033762bc7cd258bee3da3fdf1533ccfdb7fdd37bd86ab8276d122f28c5458c7c2

  • SSDEEP

    12288:oOucRX7yb9rBHXH5DAhDREC+Nn1hZMnxh8Ws3hn7XlWs3hn7X9Ws3hn7XRWs3hnO:6vIyYxjzlOtQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\levels\Monza\art\shapes\NoCollisions\NoCollisions.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\levels\Monza\art\shapes\NoCollisions\NoCollisions.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    460fe13d503bfbb113c3ecee607f5a31

    SHA1

    52df07ae073bae09b9093fe2c60ccbe7e8dc47cd

    SHA256

    dfd7a4b3a98874808e3623cf75216dacd47b4389916e0faad7e0ed289743ce0b

    SHA512

    383f29a13884ec9268eaba1ee47bb73243ec7f4eabdaacaa77bdb2de2b0cde5f000b7ea527179c75cfa30666a06a9333268e06b4cfbef91f4d2b82c119818d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    6cc7ada59cec75d484336d91c835a178

    SHA1

    9e841aed6a85a3822d0f3d59378e6512571deba8

    SHA256

    2cd82cdbb3378b605d5f339b260481f12c3647f9542a70189028c001cae3bafe

    SHA512

    8ffc971412a9ee0beaeccf711f194c84fc51d37c6375935edac779c793d8209812e428a152b441a80d87409b4bb33c5a88c015dbe4ed491984b05f0e3a7ff4b4

  • memory/4304-132-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4304-134-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4304-133-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4304-135-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4304-136-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB