Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/10/2023, 00:51

231011-a7gevsbe37 10

11/10/2023, 00:50

231011-a652tshd41 10

31/01/2023, 09:06

230131-k21xeshe3z 7

Analysis

  • max time kernel
    136s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/01/2023, 09:06

General

  • Target

    RDR2CHEAT/lib/net40/System.Data.SQLite.dll.xml

  • Size

    739B

  • MD5

    2858babc2a9d70c1ae5a47079d05469a

  • SHA1

    949d6bbd12f1e303888c4ce3a6da0b7f99d05db9

  • SHA256

    cd0380242335f78fe62fe6e288eb9c9f1d3c51ff8d41b3facb89c9b59d8ee401

  • SHA512

    4ba02e408987c9d0b00df38d9da9becc1bd73bc388f625915969c82618842400f98cae1c86d08080a4d9dc89d4337b238d7793444554029a72d17a90890d321d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net40\System.Data.SQLite.dll.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net40\System.Data.SQLite.dll.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4244

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ee0a37a05b705a5f66ebdd61da30b479

    SHA1

    136f52350f4f9213cd7a3062b4143b64a54c9549

    SHA256

    11a400393192414706b8051b4b37f3ef76d81885d41e0259d17a1517c2ccf56f

    SHA512

    c724734022d241f608b8b9515a6c1c87b4899f2d2dc2ea637a6c2acfabf7f00864bcf4478359f9ac5de31316046151e25eca389b8a9d136d4d84fcd61f9670bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    177f053c2adf5545e21b57d7cf283ffb

    SHA1

    02e850c9f9b3b7ede66b98faf06f0e13e58da758

    SHA256

    5d33eafd03a2e76d0d21e1f716d36b09b43b52eb47d20fae0fcb401d41fc424d

    SHA512

    219583e13aa831633da249dfa2b8ae8d8d6a5c456701052f55263ff780b5430f2c63c4d174f5d8b9b25c71eb6cb84bd6cf392c2170063d3655bd1805103e4bed

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\BSHIJONB.cookie

    Filesize

    614B

    MD5

    5bee1b0c7d3cdb976659cda194ef016d

    SHA1

    f669d2c9e9dfec5209754e047de875e6bdbe8bd3

    SHA256

    09cc056130a346d5283f46df1e9d5b6a93a6db6683e16aa33cc6ce9d3383965e

    SHA512

    4da06a5368ca1c3a7e839469ae0bc2f90bd61b27725f9b4b1d47b8e340492ce5f24edbb9ef6f38dbc6560663d05909ab10fb6a1916a28730a7c47c8aede3e34d

  • memory/3764-120-0x00007FF99C8D0000-0x00007FF99C8E0000-memory.dmp

    Filesize

    64KB

  • memory/3764-121-0x00007FF99C8D0000-0x00007FF99C8E0000-memory.dmp

    Filesize

    64KB

  • memory/3764-123-0x00007FF99C8D0000-0x00007FF99C8E0000-memory.dmp

    Filesize

    64KB

  • memory/3764-122-0x00007FF99C8D0000-0x00007FF99C8E0000-memory.dmp

    Filesize

    64KB

  • memory/3764-124-0x00007FF99C8D0000-0x00007FF99C8E0000-memory.dmp

    Filesize

    64KB

  • memory/3764-125-0x00007FF99C8D0000-0x00007FF99C8E0000-memory.dmp

    Filesize

    64KB

  • memory/3764-126-0x00007FF99C8D0000-0x00007FF99C8E0000-memory.dmp

    Filesize

    64KB

  • memory/3764-127-0x00007FF99C8D0000-0x00007FF99C8E0000-memory.dmp

    Filesize

    64KB