Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/05/2023, 15:05

230510-sf581sad3x 1

10/05/2023, 15:04

230510-sfnnzaad3t 3

Analysis

  • max time kernel
    100s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2023, 15:04

General

  • Target

    Photos Library.photoslibrary/private/com.apple.photolibraryd/appPrivateData.xml

  • Size

    413B

  • MD5

    96443bb78acb322f03ab657a42a08d92

  • SHA1

    e420f83d4a90d0a7f395e83ddb0187c59a537895

  • SHA256

    35d8cf32ff8b1bbcd960e92383d0f5c587ecfa1d9c51c08c54a2caa41caefe3f

  • SHA512

    ca764b1932e1047153993e29baad286b44927c5a1cf6d32bfc064fbf830c3e914a6e948ace012f4031595188a3f5d976b62518bd5c3538e6dfaf46f407e2c58a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Photos Library.photoslibrary\private\com.apple.photolibraryd\appPrivateData.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:556
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f39f80682f5143a279e0f66d0a625d8d

    SHA1

    f4836b89168315c87ac168f16d6ef380b1929030

    SHA256

    44249363494f5f244ab737a809e6652237d0ebe1577d66e52c44ee75e3a45abc

    SHA512

    40968a9f30210351e433797ef8e8ea9c5f4432bd391f496d3db20d97a4af406c3dc6f4f0694c0a4fe4b7860dfe59aef37c1b43c9a46c65f9ae8757faf699aebb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3670d66611cc187ceb3cc9395847269

    SHA1

    7abcfb5e58ed296674d6332042449b464668bd82

    SHA256

    bdba23c97c5e8fe287c7a2fca785d56d64f704830370d109efcd8c43c30809b2

    SHA512

    717eedbd07a84eadcd0cc9fbee0cddb0ab8fe3f0677a45c083695617b2c9988584c81cccc1d5eb378801e16659889fcb3e22d78c55c71ae46807e5d666f940af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c45442151e8d33073e02d23015b0c484

    SHA1

    293e3740e266455ceeb60c0ab905f3a87232444a

    SHA256

    8ead88133b9d4dd86d7b514183fb6515c42a05fe0b5261afbd8b01b0a04280a4

    SHA512

    dfab8d4c99c755ce71a1d5ad53df30f66f0c9a09aa9af9400d461020e9275cb364aaa4f259d4cabd9c157cca8d50af4798d93ae05d388b50e91901fa4a054458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c6221d453635953b9e81a7d7f3da6e5

    SHA1

    f69f006c94fc023fc3907d7ba7c7d8ff515f19d7

    SHA256

    d6ba7f8eb3fb9d7e804e69d5e70d8a833fe84375551a8d7e5d6b6c6a5e162191

    SHA512

    aada264fe996f870af57d9aee9fc51716b3b16cffa6faa0732eaf555b57b206699c5a61e357d0f0cbbe851d42dfe79fcd4f3bfd077455644e6c2592d958434e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ee2490f02b63eacdab3631fc41d31ab

    SHA1

    598d52fa939099de9786d0133bd54de52199b103

    SHA256

    0859d800573a7e1a982cc393f5d490ce6f8dd82d6a3377b8f53d13f54aa4c24d

    SHA512

    36ae2e58864b35020260f11e36f1c7ef80d903eae39efed5283526c29ede0d17692e1211ae581216463633e2d4071056c6c9cb7f4168eaefeaef54655bb0f5ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee6cff9adb5c20f9b1945ceba3e17b8f

    SHA1

    2588a439b2ec198d2f2083a8d36f87d23ad81230

    SHA256

    03245c3054f6babb37f233d54cf6df8ee7d7e9f5ecee5eca5b9456c5d98db0f1

    SHA512

    69bd80f89e90c8a48f6dd0694974aae8ba1d6629b77819f9af212c1314936cfc60f0883eb4b83d62ae9e7190568684721a37027a3ad7b5820eedb7566efbba6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b2a7877928ba5e3b4b07df15f55e211a

    SHA1

    5340e89208c46230a93f363f3855d84a10d296c1

    SHA256

    9ce448facf983bda6f12e4d4f8e0c359a8bb2d772e6d6858795e9a8c6e194eac

    SHA512

    65d4cfcde1dc823e2401afcdac5e813f49fbe008ece5c113878ececd7c98f67c5566b80c3aafd6957af4b9030c9450cd133727d1483c11e1ff3ab68bd6de41fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    873d3a09850cdaa026d1e3d7c9be15f6

    SHA1

    76d01ba133472c1804fcfd587d338a09b4a7bab5

    SHA256

    940bc1873f8ddd99b7959705d35abda03ce36c7ac74c71c3d7fa4844728c9dc8

    SHA512

    961361909c8b3e9ad06efe3f3de9b1166ad837f1ca8458be414aa3c57e754ce6465fa54db7a815ecf2ce4dad3da768b659d2b67522dee3e6f7ff40675e3be36a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0c1d15e90d81a0d4579433efc5ecfad

    SHA1

    ed175b4ae82c5086259afd648999e7f4053fc75b

    SHA256

    fece733cd57b7722e7582b19a8c84e7d46baea90bd4f4361a96ee769a0097538

    SHA512

    1fcb03d1b6932a6f7145cab528b7b888c90b14a87768572a26cc6d62ddaab878edd9e6ea92a8117715132252dff91832c55d2df5904069e493b03df7baf3eb9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6fdcdc078b6d4969aa6b9c55618d19c2

    SHA1

    6bec3cee2a5f8f46a27523536f2d54064de23ab2

    SHA256

    42d6899e1c12bfab6d70fd4bc66a8f7358d89b65b1764ac4be7886ff196f50b5

    SHA512

    b7a1d5e751263c00771097a5bc7ce54bd913f10e6c6647e1ffe68f1f45df5ced2fbd0c2c8a73d1895f7e3635ff240cb8b611e98c957bb26ad0226904826da506

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53ede289e5a1b68c332789f8aed5ba87

    SHA1

    beb57028bd60dd6dd9965c1cb8cc5dcb7e3bcbe5

    SHA256

    38506e058aa178072773c3f974cfd4bc925d81e4a43ef4289db408ed7cb404ec

    SHA512

    8811edf7c15ffd020d56468911daee1784c503097bd5706b303f73fe7b25920013f02e4a6382980758562ebc1ff0d2ea0f9015f534cc6ac0b660738a45cae51b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0165568ecf5162351be710a2cb3ed6e

    SHA1

    e39e26160fc1748c86c4dac8a39a585b6e9050e9

    SHA256

    50e6a5e13db91e8c64e4d1f59853dfa7f94a5fa590dda6f4dee09c635054adb7

    SHA512

    92180045f352a2d4639cd3920e597a3ede67f1e7ab3b3497026298c40ca91247bfdf250e78237e672d8d28f1a31445f3082bcae38ec3c0f28a2b360bfec73c01

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AFOBZ3YS\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab9A6E.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar9CC7.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C16PJYT9.txt

    Filesize

    600B

    MD5

    0ec51036dc4573040fe9443dc334a1de

    SHA1

    b1b450b3bbc1a6cad58ab5e30448506b5dcc98c8

    SHA256

    63cc861e146e33b02646fedb783b3cada8f524d6111edb905d1b5e08907afe7e

    SHA512

    912ceccffa2b8539154d93fa9e15b282717ded3a233c71ffad22b8f862669cedda36a6853b2ce83744d99d35801d676487504a9fe9ba8d4026a85c7e4ece198b