Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    16/12/2022, 12:49

General

  • Target

    https://github.com/NET-FrameWork-x64/NET/blob/main/NETFramework.zip

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/NET-FrameWork-x64/NET/blob/main/NETFramework.zip
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:564
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0xc4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1292
  • C:\Users\Admin\AppData\Local\Temp\Temp1_NETFramework.zip\NETFramework\start.exe
    "C:\Users\Admin\AppData\Local\Temp\Temp1_NETFramework.zip\NETFramework\start.exe"
    1⤵
      PID:1536

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      592f656f524fee63d578ceeba9886c73

      SHA1

      3775b7c0f6b8f7aa164321adc28355e039bd8df5

      SHA256

      9d03147d2acd3e62bdd2363661a0eba90721d0d2f02e2888ea323d8477523aef

      SHA512

      c1c4a6a9378770bf322019ac54f6a87e75667513b422d2a4196572bbf63f84de7fa1e775203539a63ae77473ba649bff5c7818b13c5bca36a603ac97a3934c24

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat

      Filesize

      1KB

      MD5

      1551b64d39514533205e070af52bb71b

      SHA1

      b295ad8d26a97da22e48c78abe5e86903c63e91b

      SHA256

      5b1342c0215ff8e9d5dd9d0bfd4716d03807b18d959f3eef3c0dcb68e43b0588

      SHA512

      dda184f35fd0b26bfc7f9bb2d6b65ed6c4d3fb1eb178594184089f5b86d14e86621305ae9aa9fee73088275f60817ad6faf91abe5011e34882aff10a44ea14cd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\46XILC9P\NETFramework.zip.3y12e8b.partial

      Filesize

      158KB

      MD5

      6ad0d1cb0da4f71f25c64871b027f274

      SHA1

      31f2a1359c4109c11da58acdb1e13f8172c4158c

      SHA256

      3389836d9b94dc5f1e6b73f313b09516bbf74df96965e33fcf0e3b5888220f3e

      SHA512

      3ee5f42795814972a0984f2f7a5ab3d3ada13f529df741d611c07deb24a7353620de6e4ab558ba0d13b8357e19bf4e802164b878800ad4bc3271b0b152f3c082

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YYGX4XF1.txt

      Filesize

      608B

      MD5

      05fa539b78ef9b5d552ecd501bff056b

      SHA1

      ef4551791e3388b58e398207b16c48b236bdf5c2

      SHA256

      0cda7802752f3644d2bad02acf278992284dda51bc3297b4461e29eaf626e8b1

      SHA512

      d6f9a271c30500f4ef7dee748ae035243bb4808ad81da3287909fefda73f8cfaacaf7e16ebf5f5857b98aa1ca206aeb6a1efef52e03f6142d74a607367d0b0fe