Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/10/2023, 00:51

231011-a7gevsbe37 10

11/10/2023, 00:50

231011-a652tshd41 10

31/01/2023, 09:06

230131-k21xeshe3z 7

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/01/2023, 09:06

General

  • Target

    RDR2CHEAT/lib/net451/System.Data.SQLite.dll.xml

  • Size

    739B

  • MD5

    2858babc2a9d70c1ae5a47079d05469a

  • SHA1

    949d6bbd12f1e303888c4ce3a6da0b7f99d05db9

  • SHA256

    cd0380242335f78fe62fe6e288eb9c9f1d3c51ff8d41b3facb89c9b59d8ee401

  • SHA512

    4ba02e408987c9d0b00df38d9da9becc1bd73bc388f625915969c82618842400f98cae1c86d08080a4d9dc89d4337b238d7793444554029a72d17a90890d321d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net451\System.Data.SQLite.dll.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net451\System.Data.SQLite.dll.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5040 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ee0a37a05b705a5f66ebdd61da30b479

    SHA1

    136f52350f4f9213cd7a3062b4143b64a54c9549

    SHA256

    11a400393192414706b8051b4b37f3ef76d81885d41e0259d17a1517c2ccf56f

    SHA512

    c724734022d241f608b8b9515a6c1c87b4899f2d2dc2ea637a6c2acfabf7f00864bcf4478359f9ac5de31316046151e25eca389b8a9d136d4d84fcd61f9670bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    0f3daea40a2bbff0c1a8d6f1ac33055b

    SHA1

    ee4bd47718898466eadd2b7c19efcf545e2dc355

    SHA256

    199a1ffea28dbd82a60bc3d46b13038ff6d30868e4768105058b312d7d57a690

    SHA512

    9ad07aebd59da76c57362d80db99207f8bb227c95a48e3faab64631589fc79dc01e6922d4633a2931ebcce83722ef3c1ac4d3200302ec3ddcd2157a932baa21c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\2DT4ALZR.cookie

    Filesize

    614B

    MD5

    fe79e1a9cf02d2119b2b2055e203ee76

    SHA1

    8fd233a0170b4561fcb5dbe623d9811d74bc99ef

    SHA256

    388bf5aed6055ebb0fe89e0232f26374b8347256f2ca383cc2a0dbce3e1d6f93

    SHA512

    5f6fac1010baf5c0444bac9e0f9be7010eddccf9e94633c77f20276f58da839c023bf3f88f6ac4cd8dea1d5a52167a33c6ecb0c7de41aa371444e1aecf4fa4a4

  • memory/4988-116-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4988-117-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4988-118-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4988-119-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4988-120-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4988-121-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4988-122-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB

  • memory/4988-123-0x00007FFCDF550000-0x00007FFCDF560000-memory.dmp

    Filesize

    64KB