Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2023, 21:01

General

  • Target

    e5e0fbdcfb908f68d901b4392759ec0bd835c28f57be6fd25bf7c6d7aff7aaa5.exe

  • Size

    4.1MB

  • MD5

    0faab9d78060b3b758fb60ca3590f296

  • SHA1

    dcd5ebf0bfe2518fb8f5caa41260a227ed3644b2

  • SHA256

    e5e0fbdcfb908f68d901b4392759ec0bd835c28f57be6fd25bf7c6d7aff7aaa5

  • SHA512

    1f35380ec375b9c1379248185568515f53b7925f7160b55fc446ae21a2b02b894abdb657966faead723f50f1b1e5a418c205c61a9f1d8658e78e44f0038faeb3

  • SSDEEP

    49152:BwljUQVLUV9doisFOga7m3SB+st795DJe7xyjGkEKyOw56tuFKpcMxYywETUzx/y:GvUrqiuOLmCVExSFu/YwETQ4

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5e0fbdcfb908f68d901b4392759ec0bd835c28f57be6fd25bf7c6d7aff7aaa5.exe
    "C:\Users\Admin\AppData\Local\Temp\e5e0fbdcfb908f68d901b4392759ec0bd835c28f57be6fd25bf7c6d7aff7aaa5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HMCL-3~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HMCL-3~1.EXE
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://java.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ac35464413b0632f98db03213117719

    SHA1

    cba645db748ddcfbe1d1d96689734455e245ef98

    SHA256

    c359351cef6046d82cadc46665e7177c4818d4ee3ca1092ddc57fceca65f27cd

    SHA512

    16609dfa3107915e5581504a34921e5f3db05e6ac8ced14383242f283bb1575907f54c576bcd9fc8cbc84ff1a69d2e6eb3d570a6109bd0f7dcea7a3b691be1b3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat

    Filesize

    1KB

    MD5

    1c9ff0481bf2a3315aea5c5304b36995

    SHA1

    7feafedebdce13778d02bab721bdbfe79ca5cd25

    SHA256

    8c9b59d22f7a1db57600adb1b28120b5ca8c3d69a5aec8e77b16530ce8413cbe

    SHA512

    3cd762a051f4a954065a9a7c5ca0a9b1918f2a0a23c759770461f079dcae8b2b8e9432a726c992cad3f49e2725bc52846323ecd48f2753bbaf35eb5ac0873bc3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HMCL-3~1.EXE

    Filesize

    4.4MB

    MD5

    a29167e249e8c1113a92bc033335b998

    SHA1

    71d097d12491a6e0c9e3b3bffaf98065ab322631

    SHA256

    bd7c8ea1eea5054a5a5c9c29c4a001c1b8f33036fccbed309801dd6f9e59234c

    SHA512

    f7aea383587840d34cc3eacbb87a33afb40e76f768c170407c4ea3694451f83d1778fa66647a50ef9a656e098443e1acae192eb66287a426ebe9743ee97d1738

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S5UBJETX.txt

    Filesize

    608B

    MD5

    84ef56927572112145360992feefb407

    SHA1

    2ee15d6f02d0662a0caa8ed63446458edcad576c

    SHA256

    1fb617987d3bb0c8213b6b0aa485fd64bbf886601563dd9e541e20df2d55aa36

    SHA512

    a6bc3ef05c2fc1932ea29f8698637b37c9de2ab352468b687a31f212f69caedef9bd954df335f60ef534a9b200311610c82eb7d203421b941088b36411b854c1

  • memory/1176-54-0x000007FEFB5E1000-0x000007FEFB5E3000-memory.dmp

    Filesize

    8KB

  • memory/1228-57-0x0000000074FA1000-0x0000000074FA3000-memory.dmp

    Filesize

    8KB