Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    509s
  • max time network
    511s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2023, 19:48

General

  • Target

    https://www.mediafire.com/file/5z3rfdfs8m1s7lw/AP2022.rar/file

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.mediafire.com/file/5z3rfdfs8m1s7lw/AP2022.rar/file
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4872 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a84659e00d09b65942dd6319948f4b09

    SHA1

    5019ed50b4dc83eb14ee8f741b7fb78b0cd32483

    SHA256

    5883ea503ab00c9fa511bb6ba9f0367ef9e37951f681ed647d76e61646946708

    SHA512

    974b291e90ddf2bea9436bfb1ba6649530a29d1611885fc909e41a99f47211414c9cb86d13cbd30229274da1ca35533ad0da2c695499df77036cfe0b096ca404

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    da3993da641be2aaaa81552def251927

    SHA1

    e4231912a2546580465668b57229262c2731b9b6

    SHA256

    6710b3540130baa4ff562b8848b6194d461af0160b82452dd3ffe4824e9ba13b

    SHA512

    978d7c9b4809c53f76cfa932efa4fdd2c049d1b9ed7ad890720887da025f42994812d45e459edbfe97a722b70e60f5fca2594fe2dba6deabb272294300075d58

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

    Filesize

    11KB

    MD5

    0d227b58bcfbbdd51cf2100dee0d6406

    SHA1

    7dab0a72f5e8b57c5f68fc4513237212bf82320a

    SHA256

    4505a200e3f35bc6809f995ea1884af809978657b693c74a37f07aaf700595fe

    SHA512

    56e3d8abfb47f30c9db2e828afeee64fca694bd8e71bc558975de062631ca299dde66045e92b0b1b6b378fd910ef493a49ddd53f94fba6023e75b52f80b02b64