Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2023, 06:40

General

  • Target

    3736bde1f3ada9ed4ae25fea5d09f981aa33eb25de80470a90d6f29a6ba3ed14.exe

  • Size

    790KB

  • MD5

    7665c9280ca87f4fc6cdd7343a8a169d

  • SHA1

    67fee1ff3bb803939af55713eb4bdaf3e2cf4a0f

  • SHA256

    3736bde1f3ada9ed4ae25fea5d09f981aa33eb25de80470a90d6f29a6ba3ed14

  • SHA512

    5e0388320852a1745ebdef28df22377c769734a54b857acd4444931ce3bdb09dd7fe4d9d64181cf999b6981c10216a62e095e414bbf5e303014006a27447123c

  • SSDEEP

    12288:AqzXbaUrzJRmKQiKyl+G7LdDy1GPWboTlG4Oe5IWLBz:AqzXbaUrzbvQZyoGXxy4P8oTlG4b5bL5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3736bde1f3ada9ed4ae25fea5d09f981aa33eb25de80470a90d6f29a6ba3ed14.exe
    "C:\Users\Admin\AppData\Local\Temp\3736bde1f3ada9ed4ae25fea5d09f981aa33eb25de80470a90d6f29a6ba3ed14.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.oneptp.com/ax/?uid=507801&ad=2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57

    Filesize

    471B

    MD5

    1b52bce0d5eb764e6a9161d387192246

    SHA1

    1a0afca76a2048b7ef3ff2616ad75630a122eef8

    SHA256

    b23acc86950aec7879e44da217352e74407d4016ae3f1b3ac11d06cf6f316578

    SHA512

    edb07a8a0f23baa69893e8fdb5d9065d5127171d65f61647ec33d8cf021009029105afa917945880d434ce0e4483f70319fc500fa762a97d991d68d464ef0141

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FA0A17BC17FF10008872A7205D0D43E2_608DEF97DFACECDA8E97C6F270153A4F

    Filesize

    471B

    MD5

    8e94c67afbc8bc5bf72cae2b7112acb7

    SHA1

    a43bc7e3997d1e2a791baf773db98a0ebc753b7e

    SHA256

    5e0c646415d73dca8ab2e45cf5ae925e620acb6eca62fde449f286fb014ef387

    SHA512

    a3070d5ea87e504b3e6749b52196f2d61f3dd15cba63a47e71f47440c12729b3b32603354028050c324d73c467e68b9ecd56e5ae45629b432ce11425d51ccb94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d3fa71da8000dc04db0ab1730e05746

    SHA1

    4482729d87b7ca6ffb3da408aecb4fc38258faa0

    SHA256

    fb4d4f858425ab5c072eed3246c6f87cd3284c4307b22499e6795fd261cec38f

    SHA512

    a4e843846a531c9bd34d7a120a67f2001e6b04e71e9099a5581572c2d1f2268a8eddd43b41c1902a031fcadadcfd49d9c16c11958f62ec8f6413e3895e2acabf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8b8d3c9403743216b31badb477b7c7e

    SHA1

    5dcb188de334bc8b47491169377c816dc47a2312

    SHA256

    5531aa8bb748a48f76758f48724c64d54561ef84d59ec1b4b8d32189de4e34b9

    SHA512

    183df1c493e82ff2fb4ab2b7380574d825c39f5b70376a8b3dfb35d6fd18edbbb84bb60654e23558cb4805c01fd1626e5872760ee2faa01ad8b6974372483cbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a616a2da6912d083acba7fc8d64e058

    SHA1

    3ee67b626c3ead96f5a9e179c50b98df4464c5a6

    SHA256

    cac688bc472961a0d9a9b472358f555b685409ff9994c1f40f9181c8b3d04b70

    SHA512

    fc714b6c30cb9d6b455725d9cb93064df25ca07da6300fc13ca4b3daea76961539488d704a3c6173d5e30a19099a9cbb61cfe57dd0ef2cd0f6c4fbe512cd702c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f78ce166e5e6c923c09698bc84dc3d4f

    SHA1

    aece9c5dda92055b0ae6d36032e3c6bcd745a888

    SHA256

    c3ffe0eee1e3b4e79339e1049f759fb0a8089e8cd7565485f493bc8a224605ed

    SHA512

    e55b9780bfa478d61408d10628fefea3177ab6aab8bb756c79fc8ce43e2473ae3b6a06b53ea1bc8e19bd46ccda8a36b7d8c45d0091f2b0d291a584e7a1753d97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52691f35c4408b4862e9662a6aba7183

    SHA1

    43f34de7c4e225fc7d1299c66644ce8abf22fddd

    SHA256

    05eff9d848569606dc165daabd6551fc5fa607ae8bd332d2cd527a19ad338472

    SHA512

    a7ef56c9ccdbc0e9d5fc88573d59834fc18539e7d1dc39713549518cbbbb2b5b80b3ba31e46e3f990ec4ade5e28da92b9a8d45b0459e05774728343424d37fae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38c2cc95b58f81e5536851093963b5a8

    SHA1

    b331aef09bf2d048387b744a15131e271dbd483f

    SHA256

    9c03cf5d38e3d054a9d441f5231026a3302416835e8407b6febb2ee505b25e4a

    SHA512

    3a2ecdfb36b9efe6d11085b05cbac5cf1e82bc289c13550fb374db8ad0bc6df5bf25746115923692079e4b02b174dbf45841711b08d0d32e4a39b6f125fb331a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c804ddb565386970cc9e73b966af3c6a

    SHA1

    8fe51fa6a4b63b4956b9ce3fc127eb3389f6b791

    SHA256

    01a43e6608301028981d6707c1de277a2a1fd2040d5f46ae68287196d26560db

    SHA512

    58cf57f2b97789e850343c69def7949c0b608482ce48a9c9a43fc3f8686fc0549897b3bb1356149c786f4060dc42229b5976ae22a5666b6f1a6771f66c4afa33

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\PW0TC68S\cheku.xcar.com[1].xml

    Filesize

    118B

    MD5

    53930829cfd6a3a1d5d00f868f20128c

    SHA1

    f1724ead59aff59d594d64efbfc3f0f7d000d773

    SHA256

    5ae015c33618dce5e2dd4a0b7aa93990cce399d0eafd0b4270f04f73af7cb109

    SHA512

    b3d4e327a8f8fd230a3957d5d7acb6a84cb62b2575ecf89a3b988e2d0040423d09f993d6b047d364bf782d73305d4ef209a015b17978fc33a731ed7bc36b3a70

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jo5ozfo\imagestore.dat

    Filesize

    8KB

    MD5

    305f0f91362234e5e8505885c1d13e49

    SHA1

    fdc5280b0bde44e405d4c805700fff0774c5cdf6

    SHA256

    0bb1f94b047888581afd344a2beea495aa9121535d3ecce9f10cb179c9afd4c5

    SHA512

    21746fbbd7bd489f7b4b567ff89ce43cf5661fa5e216e13e484016d50bfe5c71bc4c192e23de1aba4754bc04cb2af438963183d1654e490608954ba6eab82e78

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BA5D7P93\a[2].gif

    Filesize

    43B

    MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

    SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

    SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

    SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYXN1WWD\favicon[1].ico

    Filesize

    3KB

    MD5

    baaf7611a4a89d0821822dbc61cd85f3

    SHA1

    20ee71cd9c8ace0490b5bf1be2a0529b0c23b683

    SHA256

    da5ca5a924da32302ecc8c673e7e7f9fd73c25d6c1187d06f610b7caa8af5232

    SHA512

    2780e8f89a5286a9dd5957386836c27bdebd0dc9384a2abde0c079c3f6aa3dac089276d4d4fa7448ae34a5810e412be6004ec8d81da6f5f4c02bdaa1270d8147

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYXN1WWD\iwt-min[1].js

    Filesize

    23KB

    MD5

    be15dd4e71a35e54bb29d50dabe457bf

    SHA1

    519c2efffe3158379f0c6d21e75a7729295bbab5

    SHA256

    a049cac5548c3c5e4fcf6100c888b14482f07bb5069b12a3c0444864ac3d7672

    SHA512

    e390089b52cac719b9ec79102bbacb13564f91cba4e511e838d7a0f601448bbc0ee8cd2732b866c1062bef2c625ba73526ee494b2879db01529b632dbd3f354f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SKXYVKI3\994_htm[1].htm

    Filesize

    65KB

    MD5

    3795e20f48f4b1ab85c58646abcc7711

    SHA1

    4566a7ddd745e8e587950702ae81b6ecffac6083

    SHA256

    8ef2dcce5f169f9e3748e04306afaa3ee3477588d30eb396f9c92e7dced327bc

    SHA512

    61302bb072edb790d6b9ef3f9666944f85113155fa586bee0452846147d0918fdac11d7c0c6606c59acfa45bfcf8745061e5cea5be344a48b8bbbbc46361e191

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Tar14FF.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1TYCJPPJ.txt

    Filesize

    604B

    MD5

    47df8b42d3171542777fb6861480c746

    SHA1

    e7e37f8a4df5baee1b2306d9e6e47bedaab77c65

    SHA256

    aa651e610c19c66d3537877c96855202822a0967e1bf0d51bcd9c29506b273e7

    SHA512

    1c152da9790f2b1dd9ca15b88dd207d1438ef92fb3713f895bcacdc3d263c0584d32c3a3b127d6ced236cf4b4e909ab1e0235f6e967446366db6279dcdd4e91d

  • memory/1732-118-0x00000000024D0000-0x00000000024D2000-memory.dmp

    Filesize

    8KB

  • memory/1988-117-0x00000000026C0000-0x00000000026D0000-memory.dmp

    Filesize

    64KB