Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/05/2023, 06:49

230530-hlblgsgb5s 5

30/05/2023, 06:45

230530-hjf37agb3x 5

Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2023, 06:49

General

  • Target

    【云平台通知】您有未完成的安全培训任务,请尽快完成!.eml

  • Size

    4KB

  • MD5

    61a1f948b18f66cbb36d5581be980c04

  • SHA1

    11db1bde4857f75811ff86f587b2a1ac037b1aee

  • SHA256

    03740bd1a6b984e6466ab2888353d85a9a1c113e1b73f1d59f5995b38d84de01

  • SHA512

    f981fc8fbb6c40686a093a109c865370cd2ea6c5361f877bbf58d44b2652e79fd66eb4a3891415fc6e1129340e1b4ded029770ac1ffdd2f670567d7ef7ae5f6c

  • SSDEEP

    96:/o32JXqE+ooDoIrJxmt90NONgvQSTSzuJxcaJzB/AFOJfP8:1JXqXVdQt90NOmvJeymCzBYs8

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\【云平台通知】您有未完成的安全培训任务,请尽快完成!.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1760
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    b5fcc55cffd66f38d548e8b63206c5e6

    SHA1

    79db08ababfa33a4f644fa8fe337195b5aba44c7

    SHA256

    7730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1

    SHA512

    aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01e84a8d9d9ca16498f5740ca62e86cd

    SHA1

    a76e96fa7be6850f960962419ab4613874750b61

    SHA256

    5e54081985a2ff9601a8ee9c8ce9f3b25c22a54ce92815255126027c274df2e4

    SHA512

    0f5dcb5339f86ae455420d79fc1c09796957bc935250acf248d98b6a13e82159ac398ceda582350bf774905eb026d9c1c1103340bd86144681e5b80794161b7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b7b44372ba18d4cb9d0cbd9164887c2e

    SHA1

    9f61bfe21b29d3c596608672bd606e8f0314d395

    SHA256

    7ae946404e17b02f72731a6d1a7ee8204bbe97846b4001103072a5ae0ff216a0

    SHA512

    191a6c9014d4ac903cedb0d202683ce0b7a6bef106f80a8e3b8bf6899291ab0cef2b90204ca862e49630b6e4d9b59275a0f23ca71919b9800b41a615adfa0c3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e00de8c9b34427464bf6cc3c1e21bc3

    SHA1

    1da5a22dd71c15de524a41f845cb8732c2783223

    SHA256

    a4f6c8520617e5d9236d82a6963d294a106f77cc4a8a0d4074282f26ad721ce6

    SHA512

    e8473eac6eccc2931b1b502906760b7d5f6d8ff6b711e2f4f47cc5d1d6515d33398acf3eb3f9b35d3311fa1e440c18224a43a12d58b389d74d6e7f5f32c402ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97d68fbed5f9875fcc79ea753c977abc

    SHA1

    f52b52ba94d25aac43ab1325dfede1306cd03539

    SHA256

    da502895ae6f9c20dc6a240faa30b21a220b45b4900860b0f2eed7b902e2d7c8

    SHA512

    f1899be71e37514742259aac1f40a34a48cde3da09649ce1e5970662ee04c1a252a0c2a4516b060cb91aab6461faa8bcaa855f726e5dac1979ee8a095792efde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    49618d999231baf37cd59ac8723f6432

    SHA1

    4f80eae060b0c7c2d936158c959fa64a8cfb8957

    SHA256

    ad82941e675a8a75b6b4fd8e61603d2c63570a30e84f3bbae8d52377219529f7

    SHA512

    0b99755508b5d61b27f30d39c9c5407a26d3eb70e41b59b22776278e6df4ec4cee71c7f022a994ef5e2533ffbf42e61616460e200b04fea573272917fd58b9d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c6124d5c3ee78500dd794c1a133ac68

    SHA1

    e114864cf7efb0c1b820cdfbbd17ca9c079a7c50

    SHA256

    607ab2750bd5479a32dbecff26311fc9d7606f27c7ed4165f639fdd323fdc75e

    SHA512

    a2e245728762b80ae79691cd9798ec585d1c391249f7e94b51575713d333a2f5214cab7d886799218aa9b742b9c46278b1840c0dd9e2400d5b88e381430e8044

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a72714ae8bff2b028c1217870d78c09d

    SHA1

    cae8d2e3d4a4df619453a34ef80d1b13c8f0835e

    SHA256

    d09dbaec0071f25279993d6b96cd6a0cffcb4910991de9f777a89c8bf5ef0fa8

    SHA512

    632e55b0525884313c6e92dd19bcd360dd3f708eccb5c363c239b591e8c32e908581f83b929a495700f5b5705398410e378bed43f6e8cc6f00c8485b4f35e2c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13d2c32deac3ae0125fda2881bea474d

    SHA1

    6a1e1545f83accc66a55ff878522fbeb9740c1d8

    SHA256

    8562bc8017544598ddbd5afa63abdb96a148f1de3d535dd2044b8e9542332147

    SHA512

    82ac8dd3047f43ab007611c2bbc011170ba453d14932dc6b9dce163b6986cc0ec54e44ff075ba4f8aa024c983df54a48641897d0e369d02511c1ca26dfc180e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f28aed5a0b284dd4d6fe503a86a1828e

    SHA1

    298ee1cb5191b2c9c6b6cb1c23b045c6a0d6c82b

    SHA256

    9cc9d60a81781ed323ad0b6956d5e44f3f29734c741feea425497bcb664c2adc

    SHA512

    fec52e9e41185a5259283bedd864b97f42ae92a946c4d151801cac3dc092ddcc32c986ff2e07d5dc006f1572d44dddd2f0ee278447f1b842c61cdd2767013b46

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T210ZMR0\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab32A6.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar34E1.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\Temp\{0C58D0E4-B566-4906-B34B-D58111508B33}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1760-222-0x000000000A720000-0x000000000A721000-memory.dmp

    Filesize

    4KB

  • memory/1760-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB