Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2023, 12:25

General

  • Target

    About/FileSys.xml

  • Size

    6KB

  • MD5

    499e7751b019078a8a997d67e8805686

  • SHA1

    8d3bc566a990569dcd87a4862f4ea74b5a8d7696

  • SHA256

    bc713bc684b0bdda9342da9fa7e36caf7f328f32915144c6eca49b674917df88

  • SHA512

    0ccb75c55eeddfaaaf658087904bfca12c520d542789527e1248785ead66bf9f3de8478b2661814f549c6ec0bf8ebaefa1ec250199b1a6e3ccf95f6f60637d12

  • SSDEEP

    192:sYl9Bi4JFLHTSRPTsOyA0VXAQsMAy5PVzRMS6l0TE:ztJFLHTSRPTsOylXgMf9zRMV2E

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\About\FileSys.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:472
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:472 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6c76add3648d6b89873d3bf8bdb7043

    SHA1

    f1f89968efb9f3ca64006cbaa07fd6cee18223e8

    SHA256

    23e030c7c503ce08c649d4652009253270387f607a3bd39477009661e36af37a

    SHA512

    307de45cc3403336db5e7869a01302c3d9d24ee63ce0225456a201b3b5f8414634d88b57e24fecf09f2e8a192226e086da2c7700d268b673036162fcd391573d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb4ceb48c005d11b2b7427e9c9f30724

    SHA1

    1613051a22f472b7dd01a995b201200ac092a7ea

    SHA256

    7175f0456cb527b2d70d88befa14cbc2039193fbff1a45b4e5ca8e737be6fca9

    SHA512

    3bfe4a229893f2903cced39516cf5a16292766c0e1edc0992703f5d46d2ed7e84248a8ed845a523f78362ece2f0c3f2d78d6cd0c1c8a732dc5418cdb89bba429

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ae46c61b9171f13c356b22979f17cb6

    SHA1

    1e9b39f57b357a205e8384353bf216ccdd6caf6c

    SHA256

    2a655780aece0446c729d5a5f85fcfbd37ad8258533cfc3b2bcad30c23aeee0a

    SHA512

    9187fa701a082534a7d8b07a9dc0fed01af17aadbebf42bd6f8a4889023b212eab6d61fbf9d8ac875564ed3db0e51ea922201c3ae55e9ecc2589b1dbe484994a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d7dfca067b21107683464a66628da5f

    SHA1

    ac392a0fd19b35e2f66fe55e90eddc8f56e132bb

    SHA256

    69e0a85bf0946d0080fd58f70aa79b0aacb83b68659757607373f41976c6fb0b

    SHA512

    78911c93ed7c62cae15e900c17b1792213e556028dd4d6b2a84a84c3d9f6e63454a475e75541f6aa744709b2df393ce856b922490b75c95948dc8d0d3dab287b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13d62c0565c5a32db484b99f8f098616

    SHA1

    7260d5e739a950256fde55a94ffd02aece8fe0f9

    SHA256

    b6f840695679b897c0dda5187d7fff1f8be155fdeb0176921dda83213ca84683

    SHA512

    c2a74742b6f6dce44068a3430551751896055b642935e854a119f20b17ee1f22950f2cc430439c2ab0cec8a25f9876b960c4fa89357b15a4e4ebcaad62da867f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddca77a7739eccae5dfb8a7036fbac61

    SHA1

    bc993d8b381627574b4a5f18407e0778463c0647

    SHA256

    90ca94a7685ee7038834136551b12733d9f65ed32673febd21b012ad4929100f

    SHA512

    953e8b43cfe85ffbc40f8bf05156c8d35dcbfa1f4c708cbdb77fd79a2f953c76b567d2c72e422bceef1313bac756416ff3caed2753b278635179409b43740aa4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c57261fd298ea3725d41cf7897f2f1a

    SHA1

    46850515b04c5d587892c556330b40fa65fa7796

    SHA256

    60084b91e60fdcdd7cab28855e5b4ce9d8c2933259473cacdb465aa6a9c0dcb2

    SHA512

    188b7793cf4b211230cad657babfbaf063f92fcd1effb6bdc4086a022c9c0135ef884dd9a8f31845c0d32f2d4bf3da4d4b99d135648d178d67366299afd9fcac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9bda9f423c8928e82767c464992dc32d

    SHA1

    0fdb5396ead77cb3179e97073aebb5a10402c00a

    SHA256

    705eccfa1bc1314f4fbbf6e5f7f76b8e80d499cf47ee9745f988069ba44ca73b

    SHA512

    4aee4320692b70e71e51d26afcf1e032aa45e7cb2a2c5980caadec3b9c592275d14c71adb12ad9c5a88254ae2beff965c6dd5bc7e42ac98384202af318707d7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ba7a87957ac3c438f7da37af30db865

    SHA1

    27090951d0103f34f5746a9f1f062013c446aa27

    SHA256

    c25e0c69774c246154489548317c872ce6d559166ae9e7eaf7f5f20a0cae4d55

    SHA512

    7ad11776ff65594cb7f0c9e55627cac248af66a4d7a3dde8953b97d8e50e58602c571776d4c08806c1621dc86d723de5ee41c6f61ff45e1a9c0bd0359ba1034f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1WCPJCZQ\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabE11D.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarE3E0.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9208LNCQ.txt

    Filesize

    606B

    MD5

    bd1d0a803ba4e7e481a6b2674b80abe2

    SHA1

    826804b46d9843bc15282daa78dd5a857f156c3e

    SHA256

    50fdddd1a2600d52ae0d838a4747b3ffc88c481d01b909efa08e7adf0f3e8f96

    SHA512

    7806b8fafe49309d69d3c4913dcfd90433294e041393a223e85dcea2bb275ba30d976b68b295dcd5f3210f2b81ac4dafa04c44004b749f4114b67ed19e5a4d7d