Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    903s
  • max time network
    905s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2023, 21:13

General

  • Target

    jar-infection-scanner/JarInfectionScanner.exe

  • Size

    25KB

  • MD5

    f953be311c44ef80366ec2acf8e2afdc

  • SHA1

    215bc84d8d6d93b47e4c164d5eb9a65290f9a557

  • SHA256

    94fbc2ed1a96f78ef82c8b452c2c445cb9d882eec2a8cdbe637595452e9e6980

  • SHA512

    7a1be2551dfc0f3f82f3990607df12f6b796cd6ce16b53eb79e469bd5efc4b9bed674a5c16ff8ce65fb185264689d8471d5232ef8049e59f72b2581168926531

  • SSDEEP

    384:asSxezDbi7bmT1xwjvdBmd5UEGLQP5fGfIYiPWsav8JN77hh3wJI8S:asSSSKRxdAGUgYiPz3hRwXS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jar-infection-scanner\JarInfectionScanner.exe
    "C:\Users\Admin\AppData\Local\Temp\jar-infection-scanner\JarInfectionScanner.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=JarInfectionScanner.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b29ac59b6fb06341363667a8fa5052b

    SHA1

    2722adcc98409f039380f93b148d0e77e6911239

    SHA256

    c2be5794b06c11aecf4a4e40f2fad97581c0d27e256d5206e5bd2e28b7c0fa8b

    SHA512

    783726bf8fd67748309c2bc4b9db1ebe5f27d2641eb11af5dd03ee66bc46be063a7ae25a339fab1331715a3944c6811c59164065ed44f27490a460a7f5dfb0ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d5dd4c16680003ebe27a5bcf3a427859

    SHA1

    3c7cb86b8e0ec2a204b8f608dfde9350445497cc

    SHA256

    bd7679655f550cf289fc6a1d3a0845d21525c9e2dc664dd13632942533e25c42

    SHA512

    9647cf577b9be31b5d628bfe0d08a5bf16c0eba35bccab29fcd962724d016d0cfe4759de8293f254476e4de4833b962ee77eea26914894eb4ae3539c00d1efb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b43d9c43fc33403b72a1773202b957af

    SHA1

    467fc65e8035e85d30a20ae4c914af213985f8e8

    SHA256

    8019f14e6a82bfc19487c64ee0daa1852059f1d3488864249059f3c81cc5a13f

    SHA512

    596adae917ec47886e415a305c4c83cea4bcef69cb7528144cfe727b191b8898aed11d0cca2896d26214e31a3c39a87631f4fb08c70edcf986f816536b3cd26e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d7474ecf1b402308d5575cc9e16bdd2

    SHA1

    3004d6110651d5906f378389c73a4b52704426c2

    SHA256

    10d066a578ce0acf4248213da055da4ce1bc6d9038e18136e36cc5035de803e9

    SHA512

    e08241c290f0741a87b29a3042b4a5dcdc2b9d9e2dc2a5fc4240b7ae706f28b2078bcf954964d5b816c8bc48ca8ee400e9268b3b1d1ea4fc85f0f604a74ffca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c5824a89f5effe43fab7c60e78dd97e

    SHA1

    0c69fe8002dc2acd8ce625375ec2dff6be62089e

    SHA256

    d0226c4c9a205c3c2892fdf3b6e44ddfc147672e7e986341974066b542d09502

    SHA512

    a27aeb4666c02545dec724001be8b157ce6620c8ccef050c60cf9e8a7eb5c9ef2ad37cdb4a1f9c29fd80b6f5fa5a2d2bc905eca88521f4f8b72ba2835baebdbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c390aac7b03c6d48e301adcfe3868dc

    SHA1

    1e7639f25f107a2577f8ea1ce99c2f84e09b3a25

    SHA256

    d7fb2e21ea9dadacf7885a564f9b822fdeff9433eeded1fa4abd109e1f2bd6a3

    SHA512

    ac40ccccb67fb17b3835ba6a1fe94c9c504678188bf7b8a394f8f271ae636ab4bd32aa8aef2a692bc1b8ff5b8321a27a7fbe6d130ea13801a3123cee59bb417d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ee8949c6dc588087144fbd9393a2a49

    SHA1

    09826641acb960e2c1b9dd01b7a966e484dc33f4

    SHA256

    26a8141074784cad7b662ae2db6ed658833884ee8df3cd70d84bd697c67aa50d

    SHA512

    a5181ca4733b78763ca241565c883ca49f1598f6aa01592feeb2fdd46a175eea2affcb5b735cadb01ce3a60d4a194052e067fef9f7199d52f44697c04d428870

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    05d4720c5c2c599a610b58f8d06a6ff6

    SHA1

    fe5e4d8459c47aca613b9484c2e9271ee2c91503

    SHA256

    d49725cf83b371198b6541c2a99bde9a23abafeddff39367512721b13adaf191

    SHA512

    c9e6e26b5452bebd5e3f0046dc2f88f65f8d94d0b11beb07bdfb58f5c125f419e40b33d6975df44e9f01044164d89445e5cc179b7c61ecb0c4481ba726a95f95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    469c3f539f98889c561662ee5ef2cf6f

    SHA1

    73c937e72157798c003ad4ada9687a7b338dcfce

    SHA256

    20c18b737f4c2d58521680309f280bab6a708e960fc3d9cb8f20c627733d3070

    SHA512

    a30422b684a73c677b5c8db99c626c279184c90677b140adf5d0a331e5eeb7403c4ffcff45fd716296c3104e92725436cc925559abf152df6016356aee0939c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c2b79daf3be6aeb398e5cbc11b349c4

    SHA1

    b0a5a79cc4f3bbee513c8f1cdcc28bd8a70b8d98

    SHA256

    edda1edc84c42436a41b6281970ea623c2319a588c8766f544ee5673895b9f1b

    SHA512

    f8f67f3430ee9d4a906d1fbda2130bb1449c5b7706e9a0cbb1579db62042f6ad17b15603e31518c3e294f72b7ce4e46d9ca46a1ae727e173b6d32b1cd05ee4e1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CMIDRLTB\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Tar7E7B.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BYS5P01B.txt

    Filesize

    601B

    MD5

    e89ed0a1df985e47666bb5ac39c2f16c

    SHA1

    c19a59418678a81173d89f09b139848ef65a116a

    SHA256

    44758bb1cab5a0a51e4b153c24a5257f41a75d4770e9269e1b2b59ef4256a518

    SHA512

    73f6a7a9cbc183ae7664a29b63c13197ce431c5a18558f5dad73188f681a3fcc03cf514c893e7ab724174c35a798b195a8c28061ae258e20e0a2b7b9a67be955