Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    163s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2023, 05:56

General

  • Target

    http://www.bt.cn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.bt.cn
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4680 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4380
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3e4 0x31c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    1817d9f8c83af5a97f742f07f32fac7e

    SHA1

    fac61ba5502036b356304703939a905467a7bd04

    SHA256

    07448a3b03c29db66b8782361cc553ad689bc75964c8070d2cd795d0c03f5268

    SHA512

    b9a071c1eb497a26f837c6826b6c7372cf1403d68a8b7adf1251f069492ec1539199303d13fd46e2fb85692b193ab87492624ed34a51b9cfc92d67ecbd638686

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    7ee8efb31c78f70b81c46c609d04acf4

    SHA1

    e628e933349adabc25c5b0842ffec627f22eaa20

    SHA256

    b750619cc4db7fa65ada7ebc0a16d369be43becbe5287d6333d838b49861bff5

    SHA512

    34149a91233617f153435e7dac5ca474eb256fc7629b8fd96ce02ccbe68117e58fa9bb2f41f9cbb42ef1df0b3d9d74aa4edbd6444f13b4dd8f92b2e9218b2a24

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    4KB

    MD5

    3785979b86571d6f1927d9f0b99f5008

    SHA1

    5d6ac7cfe3563d5d6f13716a1986b91fdd7de271

    SHA256

    b489e58a7ed50c8050de99a75ca422cad23c375728cd9e3ae3f074c0d441fa2e

    SHA512

    7ecc54b6a0f8131ef451396a05d22a862ba8b8aba78fa51ee93446aa35bcf9208a7dab0602fc6eeac1b673924aaf42c531e14d79d22f6a98f851927a7cfc7d0b