Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/10/2022, 00:57

221025-ba2vzabbel 9

19/10/2022, 05:41

221019-gdw2saegg3 1

19/10/2022, 05:38

221019-gb4c3segf5 1

19/10/2022, 05:36

221019-ganw1aegf3 1

19/10/2022, 05:34

221019-f9raqsfdbr 8

19/10/2022, 05:29

221019-f6qj2aegd4 8

19/10/2022, 05:28

221019-f6b2msegd3 6

19/10/2022, 05:26

221019-f45wyafchq 6

19/10/2022, 05:10

221019-ftnjxafcen 9

19/10/2022, 04:53

221019-fh358aefg9 8

Analysis

  • max time kernel
    1578s
  • max time network
    1544s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 05:41

General

  • Target

    http://we.tl/t-ZRlwhHea1p

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://we.tl/t-ZRlwhHea1p
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4520 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:5108
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1816
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SetHide.3gp2"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    460fe13d503bfbb113c3ecee607f5a31

    SHA1

    52df07ae073bae09b9093fe2c60ccbe7e8dc47cd

    SHA256

    dfd7a4b3a98874808e3623cf75216dacd47b4389916e0faad7e0ed289743ce0b

    SHA512

    383f29a13884ec9268eaba1ee47bb73243ec7f4eabdaacaa77bdb2de2b0cde5f000b7ea527179c75cfa30666a06a9333268e06b4cfbef91f4d2b82c119818d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    6d4a2af255caeecbf9d2192f6cec0882

    SHA1

    b25f48eaacb2cfc9754e83dca4c3c30117418471

    SHA256

    a1445b5e54f47671bd0230336ac4e58a7b0d331cd0958f1bd85d54c161a9e9c5

    SHA512

    31a52f44700b6709e0a0950f9116c4a1b480c2d76372afd6fbf13473dd592924ede96673674e1be1cec7cc15e5bfb3eab34b66db963f28c669fe3487b5eaee88

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    9KB

    MD5

    de672d18d7b3b88625f9a76891f1ae2a

    SHA1

    f29e7e3e19809549d150483da0122ca8ef085e3d

    SHA256

    fa30008134066685ecd145afa9ebf078aeca43c14cb0cb9ab8755be6281eb712

    SHA512

    cec60f560f75d1b200d1ed55e54afa76f8d88569a43ff909fb56dd46b39f4836753bdf584d5622af36dfd9abe39b0b0639a192235811e137dad52e03c40f427d