Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/10/2023, 00:51

231011-a7gevsbe37 10

11/10/2023, 00:50

231011-a652tshd41 10

31/01/2023, 09:06

230131-k21xeshe3z 7

Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/01/2023, 09:06

General

  • Target

    RDR2CHEAT/lib/net45/System.Data.SQLite.dll.xml

  • Size

    739B

  • MD5

    2858babc2a9d70c1ae5a47079d05469a

  • SHA1

    949d6bbd12f1e303888c4ce3a6da0b7f99d05db9

  • SHA256

    cd0380242335f78fe62fe6e288eb9c9f1d3c51ff8d41b3facb89c9b59d8ee401

  • SHA512

    4ba02e408987c9d0b00df38d9da9becc1bd73bc388f625915969c82618842400f98cae1c86d08080a4d9dc89d4337b238d7793444554029a72d17a90890d321d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net45\System.Data.SQLite.dll.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net45\System.Data.SQLite.dll.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3320 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ee0a37a05b705a5f66ebdd61da30b479

    SHA1

    136f52350f4f9213cd7a3062b4143b64a54c9549

    SHA256

    11a400393192414706b8051b4b37f3ef76d81885d41e0259d17a1517c2ccf56f

    SHA512

    c724734022d241f608b8b9515a6c1c87b4899f2d2dc2ea637a6c2acfabf7f00864bcf4478359f9ac5de31316046151e25eca389b8a9d136d4d84fcd61f9670bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    371a0bf7fd981b02318558b2910139ae

    SHA1

    78f3571c68450d23a622488d7eaa68cb0c0501ad

    SHA256

    356a4a095e26f32fadac75bb4504e8375c3cbffda6e63eacece8775f35376a95

    SHA512

    d00bc81e30ec1b3dd5c8886ba849abc4ef21cbc67aa52e50ab66b534e8d2124dffe6651930cb18b53e30c1b5df3826e23dd390e38d66776eb75ca924d04ba520

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JCZCQ0DG.cookie

    Filesize

    614B

    MD5

    746ace9c639cd3941383b7ac7ee88750

    SHA1

    0fb465720e83a141c91e564c838ca322a8901014

    SHA256

    64ad30b932898fd40b2efd6f809a22f9fd6c19c0d0907dad39c05a68b25d98db

    SHA512

    079d168ea1d351da2a71e464b1efbfc4dc653a045c7d5a25d0c22b971deb784dc296f8a34361cbadc51b243e3a2cc9b9141cefe0195c9b4303fbc94d66e6f728

  • memory/4672-115-0x00007FF838960000-0x00007FF838970000-memory.dmp

    Filesize

    64KB

  • memory/4672-116-0x00007FF838960000-0x00007FF838970000-memory.dmp

    Filesize

    64KB

  • memory/4672-117-0x00007FF838960000-0x00007FF838970000-memory.dmp

    Filesize

    64KB

  • memory/4672-118-0x00007FF838960000-0x00007FF838970000-memory.dmp

    Filesize

    64KB

  • memory/4672-120-0x00007FF838960000-0x00007FF838970000-memory.dmp

    Filesize

    64KB

  • memory/4672-121-0x00007FF838960000-0x00007FF838970000-memory.dmp

    Filesize

    64KB

  • memory/4672-119-0x00007FF838960000-0x00007FF838970000-memory.dmp

    Filesize

    64KB

  • memory/4672-122-0x00007FF838960000-0x00007FF838970000-memory.dmp

    Filesize

    64KB