Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2023, 03:14

General

  • Target

    Greenshot.exe.xml

  • Size

    423B

  • MD5

    607cf0cb207fe62914afb1d252002de5

  • SHA1

    7e9979e5244f6cd3640cf5bc429c29ea9f80c656

  • SHA256

    e1f91b7391b071117b03be8e8a21fb644e83a624bfa9ea76a4389e8f2ea7027c

  • SHA512

    552c0b846b8a9a487aa27a9158ec01dc35f47f4cf932540adbf3bebad34ed85422213e73ab9f826648d9340ab0d867eab71d23c4b7b06ca1f0775aab9683d096

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Greenshot.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f179a76af8324d0416b9455d3634c79

    SHA1

    937206070c1c977c1f7f13d573882b7abbd69a3a

    SHA256

    a4eaceecaefdebc99a4562bd7ffbc179f55678730234dc855bed4ec0dac68006

    SHA512

    4831d3adeef47bc89d269db3e53c1b04e0e2146f3963c17a5ac6702f20df93a1192fdd35d1a70137c525ab087923555b886852dd2604a47cf1be8acead566ca2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8de5be9862289870e42ea66ee78b074d

    SHA1

    dc8aed9afe7888ee12e8a8ed41646f9330f68eec

    SHA256

    a502ea37696394259066a9f13eb93b8ca5142c29ada1ecd78ce45453e1f27f33

    SHA512

    dece475aa013ca5fcb9f93c1fe8c6549438fabf5fe2ad63158dadbb92d313d5c1aaa4f288fd0d181e15429089efd855ed53dc2305718d9a537a29cfc679ab774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f8e5fb3467f1772478bca619e16c9b2

    SHA1

    926e72ef2cdb17a21983b77f31453766e0c85e87

    SHA256

    c20dac063ffcf05a4497c2e89d8d6c2792244005046acd4be3cee3650d9c1dc1

    SHA512

    ecbdfd6edb8172f69a5bbbbdc0a0a04343c425b6e0ec4990cc6618a3de0a3093616d33eafab8c0e92de0534d0e5ccd2f38d9b4e2945cc4b60ceac6b217c97d36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bee61fdcab85b95c20c5a867537eb54

    SHA1

    8cc5b0c87173a2ed8839e457c21cd83194bc44e8

    SHA256

    d89480f623c706835792725717f84514c18211c3da39889be7153096e6e143dc

    SHA512

    15e9a1c62da9645c665944b8eb33fa390add94eb32dc68fd13c5fa5cc7a5bbcf8ea085c69faf4faf920f551265fdd960389b959a774194adbf01b8c9c5b52a8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23d21833e8eca871ae72f61ad4222f56

    SHA1

    b514b1eee3d32277073c9f1d4123b78dca3d50b3

    SHA256

    4b74b2d2bb8b21d88db910c0be2db63647ac0947e5280ca2910e09f5d6d08c99

    SHA512

    70a281591223d88a49d55183e9aa3e0c94d3c740ab27e28b495946c6df526d7c6fe7a4dede7d13ef688bf8e80fa2d56ebddf2b993925ed27205a09b20f5f7348

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3a72ff460a66fb018d3d28dd49feeb7

    SHA1

    b64b40e6c5219bd8d117b1c76918c6ae98beadc5

    SHA256

    95d9fa79cb8cf622bc73e63e6538c92268d052e4b9c57bf665b36af6404a3159

    SHA512

    9531db70a2477bb23a789d02378b66b91cc595dd6c32b12b4245cb3a1dde8dc906699420bb6251eb42a771a915df553208cf87adf01c27f7562c6e2d30c98ff0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c0cf10ca37c30c84f91b6482ba588ee

    SHA1

    f8a015b859bfadc361212ca6a044bdc6dd84e066

    SHA256

    65c7cb4156cb94dd17c7eeee7fb6149c39cec20e7ddc5b7ee4b247d5de6f93ab

    SHA512

    c9c0d6324beabd7acaab1bf186f3917e7b2cc5bfbd415784fa95e52b354cef49ab170c59e5da677541fa73cf24ab11b2e9953dd6533ca6c4c287afc79bdbd3a0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UIC7WQYE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab6847.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Cab68BA.tmp

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\Tar69F5.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XMRP97DF.txt

    Filesize

    604B

    MD5

    631070ecba36bd0a6b15a90630c09921

    SHA1

    a77cdf7c207f372fb15e09682e805fd12c3ce70a

    SHA256

    40b06dde197f99fc02e3ede3525a5cac0087007a9a28574b2bd708831e68a8c3

    SHA512

    e88a995455c9a333bb57a846107d042822b75ba0d4870640365c411dd95473035004d70e2d2041e8b0084226e46ffe75ec8a2a8508a01483050c308f789caaec