Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/05/2023, 15:05

230510-sf581sad3x 1

10/05/2023, 15:04

230510-sfnnzaad3t 3

Analysis

  • max time kernel
    100s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2023, 15:04

General

  • Target

    Photos Library.photoslibrary/database/search/searchMetadata.xml

  • Size

    275B

  • MD5

    bde5bfb257248613a923e274765b5b4f

  • SHA1

    f98f79dbebede99e48a12a251fad0458e4166078

  • SHA256

    a77ccd2bb53d93c3052126cf2021edf38aa24bc8e8eb74513c0644535a55cd0c

  • SHA512

    478b0f19698aeded9f711b67a3d9e69152cb2b2acd366014096485eb0321c241eb0ed12eecc374c69bf84ffa22342ef8e139d299611656918e4dfc8c1819fddf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Photos Library.photoslibrary\database\search\searchMetadata.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91aba36b246afa20dccbf05fca8401b0

    SHA1

    27fdb2aa89f4ebae1a67a4e74d28488857bd9de6

    SHA256

    223f2b9497cd2eb020feaec6ea641874fe119b698fbd9919d74ba6298a63202c

    SHA512

    aced16115afa8fa7224218db2de888cc1406a7b7d47455631e3ec708fa3a3f809e3a8abe01f2d1132cee5aedd0727d457fb7ac278a6b40b7a45e2887935a070f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a0c3fc402acb6a8309f630432d4e477d

    SHA1

    c03539e98b156a609742be07568e9acc576c22e2

    SHA256

    4ca570003e1f4d21a1fc7f33d249efb05b4ce5614d2c16c8175e71425143f8a8

    SHA512

    ba4848c9ea59c43cf347a7041f170a9dd4aab9c24443d53adb595512ba80b6961c70c56ec77c634c7344ec888a5a155bc921bde81798535ca594a545bc986d21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31890655c9eae0ab0bda6a266ff0ee74

    SHA1

    44257a49354aec22b3aa721a3e67bfa6649e5a94

    SHA256

    e91ca8b5cce05589a162a0ea2146ffb02cc9070f80aba2482b4d3819a358cbc2

    SHA512

    7f8bb6cb1d8da71f35db47827d54ed73a2e4efc23658d1c747b00f9657fb1034438bd37886d1c607c74c3312146e7c4e727ca535b6c09065714b1b51ac121ca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a06d0526cb6c58951b82b14a7f55ce9

    SHA1

    bb48d35f06c02ff7653b722d5d5940947f8db642

    SHA256

    7a700a0ff6d6978874911633e1f281d7773ef1ff37b4c303ed887344b81fe279

    SHA512

    0d3def0852d6d991a92ef6791b40749be46aa31f414ba0c3f53668bbe473925cee5230677645d68d0d46d88c6c3d608abede1bb1ef4b04d7a7d7aa106f5448c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29a3a7de179d9e1dcb3bf5b19dd9df9a

    SHA1

    22b78f8558bb9b82c95bbb595124979ebe76c959

    SHA256

    11e833ef8a3160f4c5c70a8c337373b25ed162b37ea10e8162b1bb0cf05ed53a

    SHA512

    1ff5ef537ba2d9d7df5fcafc5867ea4c514910c08569dcdcd8a926a9836ddcb10688b79fb18e532a55aa7ead972282e30d50f581a4fce30e1a1298488c4b4de3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5048884d00361062c96bc57225082c47

    SHA1

    87763d0e0be2b6d73c48142bc060c36b242cab21

    SHA256

    b283621467fcafb93b3f166ff40f59161237b69feeb20c4488ba390e12cc2e64

    SHA512

    f1faa72462e0edcf8c1cd905ee8988280de047b361a24d4db8711d025fa79bc36b4028807b2838347a54a7067ded6f28ec8788c8b099f5139445a8c3ba2334fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36fe80f4bd2ec54eb0d89fdcf79f2fe4

    SHA1

    45ad8bda8e1358452cf7762ac99c057b9100593f

    SHA256

    b52dd22f0d053677ad5b80f80adfd27eda19f6c4aa3ff149888f912dbd60bb0b

    SHA512

    bc38ab7f0d23b7bb211d59c628ea461225ece3deacca50dd292adcb187c7d82c32045f44ec288b6922a78fbe6e7db6751f25f9333eb2d6431faf3f31debaf265

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a449237fbfd1cafe1fe506b26aec084c

    SHA1

    d933e43a9bd98832d9b9c1bc8c253b3d93059e16

    SHA256

    f4a1a8bab9432c15aa633b35407861732d2b8098c4b96f4fe69725202cc07690

    SHA512

    d1fc646137bf3c03a2c21df5fc92dee5e57d7b341e1eb702d15e01bd23d483f5d142a7160c4a233099f3ce61d7345fd901be1749b99e22f1ef83ff7e3af2e494

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UIC7WQYE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab7496.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar775D.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OIJ1ZIZM.txt

    Filesize

    600B

    MD5

    e6d369e9e33e87f0031bfb6f62382fd0

    SHA1

    467ec02e869ebda1dfc819aed42cf6006df6089f

    SHA256

    52854eea103ed02ce2fa198990604b5cf4c1cdb6af88de4b90d016989b3768c7

    SHA512

    a690a83d3812369bc60f01d71cfbe274fe98c5ad21d9722fe435c4a4eff359331c06fef68d2db12e1dde9ec744d1e73379cd412cc4edfcb66aba43be055bc4b7