Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/01/2023, 15:26

230111-st6fyahc2v 1

11/01/2023, 15:20

230111-sq37eadd28 1

11/01/2023, 15:14

230111-smrn7sdc95 3

11/01/2023, 15:12

230111-sk7yeadc88 1

11/01/2023, 15:03

230111-sfc78shb61 1

Analysis

  • max time kernel
    146s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2023, 15:26

General

  • Target

    https://github.com/LeandroCostaAnalistaTI/Ferramentas/blob/master/Planos/Ferramentas_UsandoRoot.sh

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/LeandroCostaAnalistaTI/Ferramentas/blob/master/Planos/Ferramentas_UsandoRoot.sh
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5b8ae3095fa2d84849db0f1557a4a07

    SHA1

    dea1f533c7ddcdcfdbb15824d35cb665dd87aef1

    SHA256

    d13019688abe653b4290da495de125ceb80f6f6a5382774fb3ea3d387ccb0d8d

    SHA512

    19cd6a3f61c551b4ff56d95e36aff6c805f1dfa13ea03da085b8e184935b031a04a413c3bb656a79e37bafce89bce89439335c5e133d8ee5680206a0d123218b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    1KB

    MD5

    fa21d3b5d013b37e32b1ce73c102d1be

    SHA1

    1f7033d4313351c324957e7e19edb6f6726b7034

    SHA256

    086ee82db3beaef138e24572d8beba05e3070ae4be628ae36a03fbbd5611e901

    SHA512

    09315fc0711de09debc654f707718f6dcb2eb029e2f52f1b7cf5983286548f5279f17002d7776ca35dc26a530dbcaeddbaab955507d411c7d042cd6f136f0d0c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4HQDI10O.txt

    Filesize

    608B

    MD5

    aa9c1b89fca6c113d86bbccb168afc25

    SHA1

    c1dcd44188833142c9627d5edfb2f2edb34cfc37

    SHA256

    3645565273c4a70916a98a64d924f0e7c399f92d688b304daecf8b193e27d2a4

    SHA512

    dac1af5649aa5d9bd2febeebf7950ad444feacec9d3ef7acfbedc87a3541b91e69ba40992746c6cc53255ec1020a2a277399af7b5c03d8c9f48c5520f4f3824c