Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/10/2023, 00:51

231011-a7gevsbe37 10

11/10/2023, 00:50

231011-a652tshd41 10

31/01/2023, 09:06

230131-k21xeshe3z 7

Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/01/2023, 09:06

General

  • Target

    RDR2CHEAT/lib/net20/System.Data.SQLite.dll.xml

  • Size

    739B

  • MD5

    2858babc2a9d70c1ae5a47079d05469a

  • SHA1

    949d6bbd12f1e303888c4ce3a6da0b7f99d05db9

  • SHA256

    cd0380242335f78fe62fe6e288eb9c9f1d3c51ff8d41b3facb89c9b59d8ee401

  • SHA512

    4ba02e408987c9d0b00df38d9da9becc1bd73bc388f625915969c82618842400f98cae1c86d08080a4d9dc89d4337b238d7793444554029a72d17a90890d321d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net20\System.Data.SQLite.dll.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net20\System.Data.SQLite.dll.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4748 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ee0a37a05b705a5f66ebdd61da30b479

    SHA1

    136f52350f4f9213cd7a3062b4143b64a54c9549

    SHA256

    11a400393192414706b8051b4b37f3ef76d81885d41e0259d17a1517c2ccf56f

    SHA512

    c724734022d241f608b8b9515a6c1c87b4899f2d2dc2ea637a6c2acfabf7f00864bcf4478359f9ac5de31316046151e25eca389b8a9d136d4d84fcd61f9670bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    d81c394d1960fa434e9b880d892cb9e3

    SHA1

    692eb853efc5ef8b2a9d93401d5802deeb684f3b

    SHA256

    54f5178f4667e5ee8c36a5fec7e555cfab64423dae6dccdbc0c783a48df0f6b7

    SHA512

    75c3f032bb6ac52fabd53859087f08e6a28af227d5a3c25f9593644965b54f9731d300df01baeaa4b28aeb94bccb0f48389848017daaf4919af03164546a19b1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5VV2GG3J.cookie

    Filesize

    614B

    MD5

    feda528f14124f275cc5594b979c73a5

    SHA1

    4b3681c223746047339503fcbbf1227e32821aa8

    SHA256

    c2b9b59220bf481f4e9ca46e4414640e1898c61c339b10e2f0ca70dccb8c0320

    SHA512

    9b5e1295fa03b82af3688649ac69b4c2306fad93f93aa70c9090e71631aa801e8280ce5598978b777640cd77dbc118def25be07daae8f0f1bf677fd9da63f928

  • memory/2700-116-0x00007FFCA50A0000-0x00007FFCA50B0000-memory.dmp

    Filesize

    64KB

  • memory/2700-117-0x00007FFCA50A0000-0x00007FFCA50B0000-memory.dmp

    Filesize

    64KB

  • memory/2700-118-0x00007FFCA50A0000-0x00007FFCA50B0000-memory.dmp

    Filesize

    64KB

  • memory/2700-119-0x00007FFCA50A0000-0x00007FFCA50B0000-memory.dmp

    Filesize

    64KB

  • memory/2700-120-0x00007FFCA50A0000-0x00007FFCA50B0000-memory.dmp

    Filesize

    64KB

  • memory/2700-121-0x00007FFCA50A0000-0x00007FFCA50B0000-memory.dmp

    Filesize

    64KB

  • memory/2700-122-0x00007FFCA50A0000-0x00007FFCA50B0000-memory.dmp

    Filesize

    64KB

  • memory/2700-123-0x00007FFCA50A0000-0x00007FFCA50B0000-memory.dmp

    Filesize

    64KB