Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 22:03

General

  • Target

    8338021ac3ad9f6ce5bdbacf2ea0d9c9f275a35c5d9c88d13e07b809b63e3394.exe

  • Size

    1.7MB

  • MD5

    a78b35c9f9108d299c3314425af24fd2

  • SHA1

    3cefedb171869b27c44b20661e96faa8eabd796a

  • SHA256

    8338021ac3ad9f6ce5bdbacf2ea0d9c9f275a35c5d9c88d13e07b809b63e3394

  • SHA512

    7de4d59eb2215487a9958715cfd48138a15a2126ccb9b40c81a72bf352c650c1b3b4338c588e89377dd58c53a919ea5091f21cbeb052a4235f0238b2f0ff2802

  • SSDEEP

    49152:FkcKT1qDjxwlwjUzdJX3mXO1pcd2ubR+ij:dGwfqltVuT

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8338021ac3ad9f6ce5bdbacf2ea0d9c9f275a35c5d9c88d13e07b809b63e3394.exe
    "C:\Users\Admin\AppData\Local\Temp\8338021ac3ad9f6ce5bdbacf2ea0d9c9f275a35c5d9c88d13e07b809b63e3394.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:4752
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:3540
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3596

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      ac572cbbc82d6d652cdbe2596aeac4ee

      SHA1

      a631b27cf33fe134f42ed411d7ea06c21df41ad5

      SHA256

      50b6d8f62150a7bd25fb3e462130e8e054a0f1fb619487e8c426a4c8bf6bdca8

      SHA512

      070095ec83e4eeccae5dcbadcb3132f08fd0aac50badbc42cb72691236b6cfcdf14ce275fb1bf5511896bb4dd25c2121e044341003c1a507be8fabc0b2b1bfff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      6272ee13c319e45cd3319bbe93683442

      SHA1

      1d464e3cb532c2041fcbcd852d2b1dea3c6252cd

      SHA256

      07e3cf26d1e9694108359573dd986a799a6d6f81f82c8c37a558cd48c3e39756

      SHA512

      0bb51947542f5efd7678f5996641081762e112287af33db8438408d2aa66df95c10562246d748d4072eca562a8250e2afe5db845c30cc2151be66251b621842a

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

      Filesize

      1KB

      MD5

      364548c08267daa722a96fbbba260614

      SHA1

      1556f6c579019eb81c84b08de1dd0d19e1eaf405

      SHA256

      c42b09a236436047eb2e3eeb19d4bc5ef307528a0fd67415efe81ef914f86410

      SHA512

      2708d9bdeab437e894e4304c57907b688c68bbd7a2b9bdb12c9710120e655a640c0ed8f92e8ed3779d665e949be72b75893025f2158495714901873acc72e883