Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2023, 00:42

General

  • Target

    TLauncher.exe

  • Size

    5.2MB

  • MD5

    58e22c0ee91280156cdaadacac7acddb

  • SHA1

    189c552c94a9b0ae0208763bca77f2801debc224

  • SHA256

    765cab48564743844b057e21eab768d5d84194a635b09d02d9d2909f632f5714

  • SHA512

    9f510c896d641919b037e201f5ba9de476241e7cab1004d92a85df4b9240ff947737619921b1223cd926c8c5a6e667dc76cad37e818d2a9d144b826836d562c6

  • SSDEEP

    98304:goW7Z7Wqa9a652L9kLttcV3hMfLOoUawcoU5Z/wx7ctxst7G8zUu:tWd7WqHxL2PctKfLOoURBU5Z/c7uxizF

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e00e790eb589118c883448abf24bdc3

    SHA1

    3f46e7ff84c441d4b15de04d7dbbe4ff1346b698

    SHA256

    710e091c39b03d85d869fa51ee4304899658b544ca61436b088cdee6241708a8

    SHA512

    c819048a9c5708c87af9013611a5d42cc3a78da80f4d678f8bb779ee1c82cc8d3159cca51411462729264018492a5871a869937b558c4ced514cedf184f2db95

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    28KB

    MD5

    71a7567956c40bb945524ea2bdcb16b8

    SHA1

    7d71a5e287df881f398d64b64c4196a8a79ce792

    SHA256

    22e24246b8cc2ce617086175a0bb29bbf07cbacdd9ab7e91eff0881ad66db4cb

    SHA512

    2bfa21fd8e153e6c33daa53c50bf0cab90591df91b49dd1933724fc9020a05e87c76042d7eaaecfe1f3d39b07b3080ebb655554ce32745fca0bacd356ba3bb1d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OV73KFHY.txt

    Filesize

    601B

    MD5

    f2171e19859151611e841e6013598326

    SHA1

    258a06ae48c507727f0488572849de5589151fd6

    SHA256

    805276d94f158a0d44af1fd2c0ca35c5b7cf6a83fc0af1e8a3a90bc6376f779a

    SHA512

    3bf9c73ee3c2e870085556644dd0ab668c3ede52e4967b36cc108f5f1be625343122942cb02238c1f975895b1474fa056a14e8d85e823226febe163961586a6c

  • memory/1588-54-0x0000000075BE1000-0x0000000075BE3000-memory.dmp

    Filesize

    8KB