Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 18:37

General

  • Target

    2600e4f57bf7d773132529b63a5e7177d12a556d1afb131eeeadc3e0bab3ac62.exe

  • Size

    812KB

  • MD5

    a4561a8db3594b1c058f3b19358b37f7

  • SHA1

    2dc8fab3c8dea61a1a355239321992d60fc7051a

  • SHA256

    2600e4f57bf7d773132529b63a5e7177d12a556d1afb131eeeadc3e0bab3ac62

  • SHA512

    073ab1d7276101f7df963fcf268df570ba6e7eca54ea10b9a4ebaf82f226fe4ce9a2b1cddba2ad91c5ca37b347fb5a0e79b4c67c9528454c5640ef458c8d3a27

  • SSDEEP

    24576:szYXUMumu9xWTC0ROyC30bq72yI3YBlWsFqCfH39q:Fk/HWTFOyC3MM2y6YWsFRPg

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2600e4f57bf7d773132529b63a5e7177d12a556d1afb131eeeadc3e0bab3ac62.exe
    "C:\Users\Admin\AppData\Local\Temp\2600e4f57bf7d773132529b63a5e7177d12a556d1afb131eeeadc3e0bab3ac62.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:3880
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:2740
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4660
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4660 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4932

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      f8f8086f87156d14091b152fcaadc3ce

      SHA1

      fe3cfbf9e2e871c948300473593dfcf189013386

      SHA256

      8d92f28b70ed5265fafad8b37ce049b0b8ecad038745173acc35a21b8222bf56

      SHA512

      1235be77513694a1478459e999631920be42183a6993dc1f93333831eaa54ea60c7d8617029289c95fed2f861fc7aa79da551c128df4428d23752044eb68ba7a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      b280e2792dcdd4ee7f5431b2a91acda3

      SHA1

      4b6b058281d99ea5e5324c1d9124fccd7020e5f0

      SHA256

      638598cd725489871c09f50d0c582b7be4dfab3af443ddffe6cd22d6c8d10ff3

      SHA512

      4f1fa0e799a19d7a09dc779c1d0a909d2f0a8f85ba7ad13d6da64b2753fa55963f5d857e1207b9c540da5f057220bda7adeb6f4d437ab6b8c45cb966ebeda1ba

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

      Filesize

      1KB

      MD5

      f10e406734db0a9ee10762cca126d1a4

      SHA1

      d30c11b073f55030dc6e79c39a4969fa614088ce

      SHA256

      f002fdf366dd2a661da3e7664eb781da28c68a313e573763139a1bbdd2470c5b

      SHA512

      85a5f580a029e542efd3f3ead335aea392a85a373169d353d3963d7ec9bb1e9f4cfaf854a595d7ec8a7b1c490932ff41b08e677702f8ec0dfc0dbefcabfcf144