Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/04/2023, 18:42

General

  • Target

    13c9d075c7c3b13d485abfca05a30d41836db65215e1b32667a7873a3de452b7.exe

  • Size

    2.5MB

  • MD5

    6504f65879b56be341f75424b59ee5d5

  • SHA1

    b1ba821de70023c791484f0c4356df20f61e0117

  • SHA256

    13c9d075c7c3b13d485abfca05a30d41836db65215e1b32667a7873a3de452b7

  • SHA512

    9e1b8c10b3aa93ce04b883dd08db85f9f26c831963c9c5ca259373d2f2a6d8084483bf61bf0a0f7e982eb7062b004e8ea474744081b4df6a2284adeeb3074293

  • SSDEEP

    49152:1ZExdo9yrzUQ720BSesld5eYTrk1ljj33NpzVtp:1ZEztfUQ7TCX59aljLzzVtp

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13c9d075c7c3b13d485abfca05a30d41836db65215e1b32667a7873a3de452b7.exe
    "C:\Users\Admin\AppData\Local\Temp\13c9d075c7c3b13d485abfca05a30d41836db65215e1b32667a7873a3de452b7.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://jq.qq.com/?_wv=1027&k=wR5aGwVM
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    622cbe3f2c00dc9b316bce13a63d1d09

    SHA1

    9deecf60c88635d2bc6577522de7a584a04cee66

    SHA256

    38687a66f56017614559a8e37c3159399df33430781c5aa059257652da4f5d14

    SHA512

    2fb7202150df466e72097368dcb768222601daf44fbd112894d025b8fb059237325c3e725c3189e92c69659f43bfe0b9c82ecb97f7593e3b629e0f97cb7dc7e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63a1d5b66a729538058cee406ffae6c8

    SHA1

    b2cd5299028a0a7ce141cf728c3caf614246a55d

    SHA256

    de0f342ac06a11779ed88817c679c5c5de149b5089f1301badab2b1a679dfc74

    SHA512

    9bd35e03cb816bd50475385754bea0bf2c8387c3988e0f923ea681f6dbc79e822e8976a3061362b64d86620c69c3ccacdb4cf05e4d8218ef5914e877e64325e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdaa13364a1faf08810ed4f0d680e6a6

    SHA1

    b8f375595752d90de020d3abed57bef652879551

    SHA256

    7eb20d0c352152bd974503f47f7908d14c67f11bf2d1d73995bb6eb5e31c5e81

    SHA512

    53d06a1f018659fa7472e5b6e2aa58de75cb737c173e62fdd9e93563d05cf58b3efc3d12ec3a290d1c6d4519790f02c0453c9fd4b4ac0c5fb37da5fa60409000

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da54284430853bcebe30ca4ec72c71d9

    SHA1

    3e3d4b74eb9ae8f779c7f9a8181434663b317aae

    SHA256

    a81c29cd4b5a5ba087f78c6676e276454f4e68c174e074647f9b30d461bedaab

    SHA512

    7a7b3ae88b9aa8762199c24bbe94e40a31325f1fa816488b0b095e578a0d8ccc89cb1e23bfabbbaa77202027ed29e17c6ab73075ad12dd1a5b4e8dbc4303cac7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a16c958ea7a2db38b4fa1e6d0a12d4bb

    SHA1

    b603bf513c4fa2dbfc60b034277cd818b26db499

    SHA256

    48b673375add39412590532d77f88012ca622ab85f267657946c5759b9987b71

    SHA512

    2efab308a17fa3c13ae9324f7bf42aaf12adafea8d479963100142b017259996d0329bc3ffc4e8e2c687fe2bf7ffa6ebfcf92b96f1db7007f3f855f95cbf1ad9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ae0a8275865919a52dbdce97d0e5b84

    SHA1

    1269e6864a234eed088abe182fc19ddf3242c22e

    SHA256

    600deddb1372f4686858f092e16191924bb24b5640717b90f7ccc775380ec49f

    SHA512

    ef8c0d214691e171c6f37dca96f8179e630a5670489d95077f207cf9f74cce91d9085b296961c6b102649bab5439b705605f861f3e04f5ea8dbbfdc29b4875a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bdb81ea720dccc063a81a30b1d31378

    SHA1

    214996ebf796985fb714fcbb0e0a28a5a6424260

    SHA256

    9cf4013cc8eca39795c04dce39f97f12d110a61531ebb563e4de053b3eb245a8

    SHA512

    7a740c92ded6cbcbc0d88f251e064b1c95631edb3174e17880f3aefaa9e32987ed4f007f5c10069d5e59090b09fe4aa7a0857cbfd8ebf57994bab02dd8f04990

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edf87ee6af0479268bf7eb6cae1cbb6e

    SHA1

    981b19d8722f3c942f96780113bda9dc75ae2cc9

    SHA256

    ff15bf5a9d9c085ab0dbe16950c0f52f1d203193d25998a9f0afdc6e848f07fc

    SHA512

    0d8ce9bf0963b135f9d675eab054de6d241df673f7f24eb8cb6869dc755757611e232117edad6b54a00536796a420fe3a61c5512ef9faaf961ebf278fe91aa83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    696ba7640e0d5177525b4bb61100ace1

    SHA1

    6c5643c66eb6e12200b9c32fd2ed0fd481b6c080

    SHA256

    9f6dfca3fbb7a95893bc20e97ed3ec970973411291dfdeb7015bc8a7fe388e73

    SHA512

    b40fb24ffddd944876d187bedb1b842cd4521a6adba70b0f78b43a228341d7ea86f8b87407a469f90ba00e40c19d446d5aa79c8fd687e301d60c629e9387fffa

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabF357.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\TarF359.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\TarF581.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I6VMUN6S.txt

    Filesize

    599B

    MD5

    16a89ad96b51bf0a4524dd5fd9b1a5c8

    SHA1

    9847bb7544c5d8fbd2b2004fd4cc6a6ad5664860

    SHA256

    ec27c65a04bb12d15f0d9541e7e2019c65cd1c39ee595d09ffdaa68559ca3833

    SHA512

    fd1d8816dd8ea30473dac428bac5a18215e61b567abe1ec9a0069515f4b472b2a810bae670865263dce767a53973338fd5f3c7d44aa695fc3e6300afe3f46a80

  • memory/1424-496-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-504-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-471-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-472-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-474-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-473-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-475-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-476-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-477-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-479-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-481-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-478-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-480-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-482-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-483-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-484-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-485-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-488-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-489-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-490-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-487-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-486-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-491-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-492-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-493-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-495-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-494-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-470-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-497-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-498-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-499-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-501-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-500-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-502-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-503-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-469-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-505-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-507-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-506-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-508-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-510-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-509-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-511-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-512-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-513-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-515-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-514-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-516-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-517-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-518-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-519-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-520-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-521-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-522-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-523-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-1385-0x00000000021C0000-0x00000000022C0000-memory.dmp

    Filesize

    1024KB

  • memory/1424-1386-0x0000000002360000-0x00000000024E1000-memory.dmp

    Filesize

    1.5MB

  • memory/1424-468-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-466-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-467-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-465-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-463-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-464-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-462-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-461-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-459-0x0000000000400000-0x0000000000655000-memory.dmp

    Filesize

    2.3MB

  • memory/1424-54-0x0000000075A00000-0x0000000075A47000-memory.dmp

    Filesize

    284KB

  • memory/1424-4539-0x00000000021C0000-0x00000000022C0000-memory.dmp

    Filesize

    1024KB

  • memory/1424-4807-0x0000000002610000-0x0000000002721000-memory.dmp

    Filesize

    1.1MB

  • memory/1424-4808-0x00000000024F0000-0x00000000025F1000-memory.dmp

    Filesize

    1.0MB

  • memory/1424-4809-0x00000000009E0000-0x0000000000A81000-memory.dmp

    Filesize

    644KB

  • memory/1424-4812-0x0000000000400000-0x0000000000655000-memory.dmp

    Filesize

    2.3MB