Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2023, 06:47

General

  • Target

    0e3d6d2d-06cc-486d-9465-9ef3bee75444.ps1.xml

  • Size

    1KB

  • MD5

    27607c878a76a47669bf4f1146202a20

  • SHA1

    bda1433749cdced36d5a9cbe4f58fbcc0c847107

  • SHA256

    be71cb9f733bfe2bf9fd99581cb56aef55b305865e333f52045eec4aec6ce7f6

  • SHA512

    804ce0bf1758dc343d5135def17b486bbca6ce80b081718d5b3071d71c54f981413c96ff39fa5f81fa4e9f10197211cf51347ae790fde24acdd3d80b5753ac5a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\0e3d6d2d-06cc-486d-9465-9ef3bee75444.ps1.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e3d6d2d-06cc-486d-9465-9ef3bee75444.ps1.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3180
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3180 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    d215e8f258878362467ca56e881e503c

    SHA1

    bde8ed9da4b8297b2efeae31e307b3a724cf6c26

    SHA256

    00898cb46fa389fc4fbb5965b2d5a4a19a7fdec1988491a7d6b66a45e2032770

    SHA512

    241daebdf2a192eb34b69b36af731f78fa241e030633777d4a3ec37d6ff994e2e7f646d9aecaa7ab8a9fa91c4db135ad22c7ff585b0f9d52231bbb22245b7144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    ea9785759015d95c16daad987305568e

    SHA1

    48cff63d6d51540a28d2604db533bacc3df746eb

    SHA256

    d3a1709b82cae0bca321e68a4e8ac14ce70f4ece59b9c233e1cbd44dfb4d2256

    SHA512

    d86bd94fcff617ed8f67be57f309c6f775759e68f1fb4d06973bfa96e47c11680bb6ff649f9dbb79e4531e1d1ea373b32fcf93ce7a917fbe383bbb98904de374

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G1ORIWBN\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/4524-134-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB

  • memory/4524-135-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB

  • memory/4524-136-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB

  • memory/4524-137-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB

  • memory/4524-138-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB

  • memory/4524-139-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB

  • memory/4524-140-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB

  • memory/4524-141-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB

  • memory/4524-142-0x00007FFE81F90000-0x00007FFE81FA0000-memory.dmp

    Filesize

    64KB