Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 01:24

General

  • Target

    a08e6363613e43ef47b09a346777ec1952e78d497363db95f2a62d0e6d8ba1e1.exe

  • Size

    31KB

  • MD5

    b2e3d6edc48b407885eba93e6a5980e9

  • SHA1

    7dcb00176317431cb11ee6f19d44c180a03edd7e

  • SHA256

    a08e6363613e43ef47b09a346777ec1952e78d497363db95f2a62d0e6d8ba1e1

  • SHA512

    40edfa1daff0c86fb555a367651d9ecabee31f67f63c3df4fe0e997f868aa20dbb75b81a12adf25f4fbd9e4cec2fd1c40d276301831af9ca6cff16236a44c60f

  • SSDEEP

    384:7HRq3OevRQWh7WMjHVbv/9SwLVblgG9BVbf1TOpCA4V4fl6dJxb0sjonaWigemcd:b0vd9jHFv/FFlF9BFfYRoJxb0CWignq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a08e6363613e43ef47b09a346777ec1952e78d497363db95f2a62d0e6d8ba1e1.exe
    "C:\Users\Admin\AppData\Local\Temp\a08e6363613e43ef47b09a346777ec1952e78d497363db95f2a62d0e6d8ba1e1.exe"
    1⤵
      PID:5080
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:1052
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4208 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3672

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        a62e66dbd157955d60808bf89987bcde

        SHA1

        a97e8478902ac7db7fd904300304944a41afee8e

        SHA256

        d34e72ae586b00a60e3526f1e75677dcffa83fd33860a771ae592e7d8320cf25

        SHA512

        2c969c621bd5881acf47e85b3a2977b1c43dfa80887f0ab447327162d143795ff647b8ed1aec174a868c0faf1e09eb8baa6a67ea42764b65fe4416d2168e81fc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        5270fef15df833cf0d8706840d18ba12

        SHA1

        1956cfdef42d3ac66b98345ec812e9f59a0b7dec

        SHA256

        db943d75caf36828f8b05520571153624fe42d84c387110c01e2b5ee1027489d

        SHA512

        e47f3757e1301b1ce9534e5e68b478bdb1b1a3f3dcd000600b4fd2fa13906ba17bba801666f0ed91d4b8c0f257280df9961487d784bb940313e3a6f4c87effaf

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

        Filesize

        771B

        MD5

        e017d187068cf1f5ef5099d83282c771

        SHA1

        7ab606bfcb1382daac1983bc47584ae36578bcb9

        SHA256

        48aa0ff2facb65102cb2ad2ec46bc03eaf0f6027cf440a72130300a06b80ca84

        SHA512

        ca89c55a3a638b7ba056832823aa75f95ccacad61f24a57f7f9535a34b948ce68adf56697c55ea37a95ac43b56ba513aeb932dee1a49da0af64da3ff16f88488