Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/10/2023, 00:51

231011-a7gevsbe37 10

11/10/2023, 00:50

231011-a652tshd41 10

31/01/2023, 09:06

230131-k21xeshe3z 7

Analysis

  • max time kernel
    136s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/01/2023, 09:06

General

  • Target

    RDR2CHEAT/lib/net46/System.Data.SQLite.dll.xml

  • Size

    739B

  • MD5

    2858babc2a9d70c1ae5a47079d05469a

  • SHA1

    949d6bbd12f1e303888c4ce3a6da0b7f99d05db9

  • SHA256

    cd0380242335f78fe62fe6e288eb9c9f1d3c51ff8d41b3facb89c9b59d8ee401

  • SHA512

    4ba02e408987c9d0b00df38d9da9becc1bd73bc388f625915969c82618842400f98cae1c86d08080a4d9dc89d4337b238d7793444554029a72d17a90890d321d

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net46\System.Data.SQLite.dll.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\lib\net46\System.Data.SQLite.dll.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ee0a37a05b705a5f66ebdd61da30b479

    SHA1

    136f52350f4f9213cd7a3062b4143b64a54c9549

    SHA256

    11a400393192414706b8051b4b37f3ef76d81885d41e0259d17a1517c2ccf56f

    SHA512

    c724734022d241f608b8b9515a6c1c87b4899f2d2dc2ea637a6c2acfabf7f00864bcf4478359f9ac5de31316046151e25eca389b8a9d136d4d84fcd61f9670bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    80e3dfdb80cbeb445221fa115e52db47

    SHA1

    9ec08e57b548c5c9602e59bd54148856f1b16ef3

    SHA256

    64d86e21b0e4cbabd7ce523b7edfe6a87db105c1e5c1b424d37d6f476c5d115d

    SHA512

    f9cd7d8cb4b28117389983438dc2afe890a682845f681a9a83c6ce9688fd223fd765daf7182694a4ad8383eae0d01e0ed7eed8e6dd7c966fc186d7bfd7abf3b7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\934SU0BB.cookie

    Filesize

    614B

    MD5

    a02b920163a4bac7e9b7d0a17ef6c102

    SHA1

    f2a8d1de559e7e243e042f12ee57524df2359ef7

    SHA256

    9e8b6e91e2975402cbb9db89333cbc8d5cb7bbc31352dc0860f19ed33248151e

    SHA512

    eba5c5e5352b0b2a5438b6c69b6c0c55e6f43b7f7ae3c412849e79a7d62cdc89fff4dfe3940d231b7b50c05fbb5dc829bcf624db1ed9920114554e0e4844873d

  • memory/2204-120-0x00007FFBD2B80000-0x00007FFBD2B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-121-0x00007FFBD2B80000-0x00007FFBD2B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-122-0x00007FFBD2B80000-0x00007FFBD2B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-123-0x00007FFBD2B80000-0x00007FFBD2B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-124-0x00007FFBD2B80000-0x00007FFBD2B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-125-0x00007FFBD2B80000-0x00007FFBD2B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-126-0x00007FFBD2B80000-0x00007FFBD2B90000-memory.dmp

    Filesize

    64KB

  • memory/2204-127-0x00007FFBD2B80000-0x00007FFBD2B90000-memory.dmp

    Filesize

    64KB