Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 08:25

General

  • Target

    f829e192a431662c6491498cb4db4443b2b15cf47ed13bd892a99c3333eb1ef5.exe

  • Size

    709KB

  • MD5

    460eb0b509151992b2174d66c8cb8801

  • SHA1

    45e10d378b129ce1063b0ad0c272c62b97e1a887

  • SHA256

    f829e192a431662c6491498cb4db4443b2b15cf47ed13bd892a99c3333eb1ef5

  • SHA512

    89f4adfaf0754a3d1d67b33546dfd491343d8c135d5bf104b6c20de4ef34f9e9b253213fe4e58686d7271d837bf7aa84119ea707b81188f25279d0b772aad21b

  • SSDEEP

    12288:CaP6ys+NgzZhkDjhPrlZLPU61Nc8djLr994Oirhlc/BngbHm9IqZtasjnY+7Dym:CuBNUfkNUYW+D/4OirhQngbHit1/n/

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f829e192a431662c6491498cb4db4443b2b15cf47ed13bd892a99c3333eb1ef5.exe
    "C:\Users\Admin\AppData\Local\Temp\f829e192a431662c6491498cb4db4443b2b15cf47ed13bd892a99c3333eb1ef5.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wa300.com/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4232 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a62e66dbd157955d60808bf89987bcde

    SHA1

    a97e8478902ac7db7fd904300304944a41afee8e

    SHA256

    d34e72ae586b00a60e3526f1e75677dcffa83fd33860a771ae592e7d8320cf25

    SHA512

    2c969c621bd5881acf47e85b3a2977b1c43dfa80887f0ab447327162d143795ff647b8ed1aec174a868c0faf1e09eb8baa6a67ea42764b65fe4416d2168e81fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    a07d232e30857132a6a6e08341f7f003

    SHA1

    1c651050fbd2d53f70113933f440a9446a49f12f

    SHA256

    1a91cfbebb6936719d4adf3537a891d0d000d9b92ebf8217139138aa048e0a44

    SHA512

    4c28c4ae0874acc3d31e8a14030221a0ba9b1e02ebe1eb5d31a4229a7edb75cd7603f2c9c2b4b9d90659c3fd8dbaba8c54117ff4057aae2ff1e48925a97f05b7

  • memory/1268-132-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1268-135-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB