Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

04/01/2023, 17:31

230104-v3ze4aha38 1

04/01/2023, 17:27

230104-v1k5pacd4w 1

Analysis

  • max time kernel
    173s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2023, 17:31

General

  • Target

    http://sicecorp.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://sicecorp.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2340
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:17414 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    1KB

    MD5

    b85f62f461fcd8f88f843d27366343ae

    SHA1

    5f869f942757e78de1d1886e376e350ecd303180

    SHA256

    730e67179905dc17b5ec06fb3d66dcfe3116faf3415b45478d6905d4006b7237

    SHA512

    891c4d1094bac5ef613636f49f30156b06a0b84ea8cc503e6d75cce49f1481e32a61c3012402a42521abbd6d130a0e8171585fcc7b0825f2bf782940489950fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    99446fc0c7f7d4b12e462a96d9aaf7dd

    SHA1

    84c6f8ae5ee2370c549af11c93fdd27fd0edfcc5

    SHA256

    37f9bfa1c3e5af64ecd96ec2b31665edd3d62211123153fbe4d3339ff0556f8a

    SHA512

    fdabad9e26ee09498e38711e3466c5a5535a75d1525f2764bdd587742407e5e596767195089a3f6aafd49ec001d9137b571372daba0c0cec1149d42ef6f0f64b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

    Filesize

    446B

    MD5

    438b0d85b65cee05613110eeeec4c9cc

    SHA1

    f967eb0d3ec5b8b412dac29474528e3e0e5de36a

    SHA256

    ba6195b6844fcf38d9c0fe15348e5c538a59cd6a57fbceff03b9c9fa4d0ae458

    SHA512

    2089ee95747025e60fd3496ddaa49217405a9c56aa9deee4672913685acdaba926411d6352649051462606d8db3485a5faddb24c189e6206121e381ef165754f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    37de2d8e22756476d3a0ec797aad819e

    SHA1

    0bcf32f533288f2e050e5404a80362991ae275cc

    SHA256

    a8b8cb00f8eb50f7eebbfb06fbcaca7045787e080303d9ade086537f162e95fb

    SHA512

    6c95334d62bb0cf1f5ab3c72fb2a84f54f1e03e82d62e2ea35620218a905eb8d7cab831329fe58d5506df4be2fe1276ed1d2da2bd191e61aa93d827f2a49ff97

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

    Filesize

    34KB

    MD5

    c49d7c2f2ede8aa03bf2e826eb0a099b

    SHA1

    1ba9fc2660342af4efa873e508571e7be2ac6ce6

    SHA256

    a98ac28812ea2d02c43bde0b07665dca04efaaad55f36b889680f1fb12cb3590

    SHA512

    ef47882e159f2e3dc0b72afd900145037ac0baec141b1d86116b1cf02c8d86ea2721642f022c165e4f6808898bc3fd58762335137abc309e70131421ad9d89e6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

    Filesize

    38KB

    MD5

    72d209615a20e4a1f3cd257368bcdb33

    SHA1

    00a6e55b0ed08b7620b3d9bab6dc9972fed0817b

    SHA256

    90ddd20fcd194ffe2901d5645e6a32d7730e420bb22cbc08ea399af3efa0fd92

    SHA512

    72951e5df7194b48cd1ceedc8a2b352986983a403583b46abe2c7a3140eabb0331194f4c6b585980efe69c5dd11cbb7a2f26cdfb4d46143f6c51f05129657717