Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 13:28

General

  • Target

    e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe

  • Size

    426KB

  • MD5

    1269f325cf85ef7661e389965bbe9f20

  • SHA1

    2f387f399df006f2980495a1cdbf06a63f794f3c

  • SHA256

    e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50

  • SHA512

    6c5ae3456758f082744cafbc300695fe5f2cfcbafb824510e2c040975688be3339c3e38b7ab1a8dfa065a4d1f7bcfcc4e8b9bfcb5d2cd9d218dfac7264dfa87e

  • SSDEEP

    6144:ycD0z5qh2tlU8Dv7XRzZXUjdmj7aN3dJ9HaT7Ov4zmRBchuLAAk6ypDvxxoRAU+m:5YtbtfDzXl0sjONwjaRB4RzpDeAUVv

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe
    "C:\Users\Admin\AppData\Local\Temp\e4837c284e99642172c0a4f061c0257e59a7427e53c6a8400a2ac614d37d5a50.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe http://www.513cg.com
      2⤵
        PID:936
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.513cg.com/
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1528

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c9f45c9cba425e090f2bdbe91337afbc

      SHA1

      067fc4b157da0d9bae74e6a6f5199e844074582a

      SHA256

      ce60db1a66428fafc5ad11fcab413a6c77b7a541d931f4683b969126b3853e07

      SHA512

      1c217358d9032d70c1f844aff3c62b6c47f51e187daf7b527d34aeab6c422fc139f51751e4dafcc627b905070eaca824c6354a83436dc286436791fa77e38d1c

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

      Filesize

      9KB

      MD5

      6aaea0bafebb858930eef3aa65ed02f9

      SHA1

      501d4406b98886614a16cfefadd31413fa62d8ce

      SHA256

      1bdb2438bf1969ea5f6e3ed71a7f99b48a02ca60643724aa19ba8c1eb6b21bcb

      SHA512

      8e2fdc54fdb5fba0cb60271133453b3535ade94275bf0fb3f76366b10c7fc5009d05e68ed997b870965fc5ef8579d66ab82cf1a0fa1711b0bf88f0fc1ae9cf43

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UD8VPWV0.txt

      Filesize

      608B

      MD5

      96bab604eceb375a01bfb2f976a40c84

      SHA1

      5f095e5eb0cca66f3150184e00c6b1c1b6d6b502

      SHA256

      65e1b40e9ed2f23397c9b6c57f57fe24f69f24ddc42485fcae91454b504f3ecb

      SHA512

      8ebcd24f1e3e5b638d5ff58a7a60fb215e6d0182000b783d8d0189fbd75bc48ee4c273a095b0d9f2b998ac33f104d1e4651bf7f011a2eab0f4b8c0376714c633

    • memory/564-61-0x000007FEFBDB1000-0x000007FEFBDB3000-memory.dmp

      Filesize

      8KB

    • memory/936-59-0x00000000749B1000-0x00000000749B3000-memory.dmp

      Filesize

      8KB

    • memory/1064-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmp

      Filesize

      8KB

    • memory/1064-55-0x0000000000400000-0x000000000056B000-memory.dmp

      Filesize

      1.4MB

    • memory/1064-56-0x0000000000400000-0x000000000056B000-memory.dmp

      Filesize

      1.4MB

    • memory/1064-60-0x0000000000400000-0x000000000056B000-memory.dmp

      Filesize

      1.4MB