Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2023, 03:53

General

  • Target

    TLauncher.exe

  • Size

    5.2MB

  • MD5

    48293521fa1c4f2a2b86b9e6e6025c05

  • SHA1

    c5eca7f45abeab6f945abeb9c25177db3debed90

  • SHA256

    74d99ef558e6f20ae2a2e11b53adc3ebb77026b69d7c24448c9353bc808bb2c1

  • SHA512

    2e6612ec5c4954cc44a1a15a6c0ed6a74f90182fd352bd00f728e68eb20d4aecd349e5700e54e5e8954b77c4241fbab8c2ce8bf86541fcaea6f2d06adea6c1eb

  • SSDEEP

    98304:ySY3jxo8a8xZHEB7fPfaSrytOCXVzF2gxVeAeSwjsgDSQ1ci:9Y3W8xZkFniQytOCXxwgxVe/SssgH

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:944 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    d76562073809b4009d5a28c23e80875d

    SHA1

    51854d1ffb1624012dbff4a6496b1fd06f120ffe

    SHA256

    51cdb2c43a4173625a5cfb2f610498c660326b1dab3704a9355f143372a86af7

    SHA512

    f6d88b1ab86c522acbac20cec34cb036cd991ead401a045e5db3367b67795fecadb05de21c855fa5db194963951af58f0357d3e310db1f05fe70f87ccc54cf5c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    32KB

    MD5

    bc8cbbe887ac0ffab0649010b7d6a17a

    SHA1

    e305855878d56e9e6c4d15f4d026a4070a894e09

    SHA256

    fb5cf685b2bf0957e7701284d2aabeb1139d39a6fba985ed6f1bed7351b28958

    SHA512

    7a42fe88414e69a1b280dec7f98fb71af52e35932d245fc72cf9661e03b2438209d6985c19239b6c680ed5dc991b7a80bf26026c44b925557eff02897b0ccf85

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WPRYDA76.txt

    Filesize

    604B

    MD5

    8d91ec2a96a47888d43d3159f18b8e51

    SHA1

    bc3a0f39eb5801d876734197912e322027e547d1

    SHA256

    bbecdd492e131e26546c25ea32daa9e051707790827061bcbc72cff48347975c

    SHA512

    03c8ce0935550944ed1cdc4a91b8b8f3aef019e4b347ebe133999bb5a75cdb0b73eff05e10d471dd2257de1c3d9b11b7486c1823109fb5611b10c3c18b470588

  • memory/900-54-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB