Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 14:14

General

  • Target

    callout_8_overlay.xml

  • Size

    2KB

  • MD5

    65a2809f038ffa4146cf59a57e6bb32d

  • SHA1

    3b5e30bf5de229cbeb085e1ea355288d63ebea51

  • SHA256

    8dc35b01684c284e85275509e698edea94e73f6e328732993a96b881f20eaaff

  • SHA512

    2f792059b6aa0a1dd32924169fb9176e9c6523c6f17b17cbaa2486bb246b6f726e01717b47372d9558501cb2dc5f51c1564b7ce195bcde1769e07b3fb8a7879b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\callout_8_overlay.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c89b167bb5f08b6f840ec49af872b5c

    SHA1

    19c9aa66213a0c83cd42e6a070c43cb7ad734fc2

    SHA256

    f4a6e51b94c0579870c8d30b255f488bbd156fd7fb392018f2db50c60c6c670d

    SHA512

    e32c9d9be86132d33ea19e071b196d63fd60331180edc3d703ed3f8991c06a526b2a332750ec2242e4e1758ef4b81b643c2ca0cb22a0c1d9f427e6dba8b2bed3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6039ba9f44ddaf0e2e23d438c7b2211

    SHA1

    2c5ad3fee252b94a91e0173e08e07698f639d700

    SHA256

    f3d2a498da596f9d4d1ef43a9a09cea73f15ab3da317505ef41d33d5a564d7d9

    SHA512

    865bf06715fd3e8986b965288a17901d1dae570505282c9746453797cc1dbc2112e73e98e851440660b73bc57f3b76e7107dbed33d03a654148443cf9c94b2cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5dc8507dd0cefe55d899f6caee9ae569

    SHA1

    4d23e6ae1ad771eb28b375c7d169203aa357304a

    SHA256

    3524741eb52fc502bbb4c3d7cbec7f1c8e25aaee7e66357b09db42307bd8f6f0

    SHA512

    86ee5075fcbdbb551fd4ef1036b67e8ea3ad5dd4b4289d597adfe04d7462577edef63df2ae836172102046e9b66cb8c772bb758de0863d718abd139402529b9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    baef66b20eb148f0b6c2b7394cd0e17b

    SHA1

    f512fbefb8a2ad95ff4966af54790a76f46c180a

    SHA256

    dd46072d19c064ab2561eb5c5b800228285359a8b2339c30812eb2b800d158ab

    SHA512

    13e078536c26e713d70f8efa1d52dc465b6fecc1f498f38017d1c8a243dc135cf8513b8d1f8108b89fa6cdaa0c4d79e7c71dde260ce8060c6db84e4f5e6733a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    578c9a04921c3b797d9c290bb113c8ec

    SHA1

    4bd677a82c24d7e62d978d23a1f4218f449502cd

    SHA256

    fedbbe32a3b065c2c4d6608ea8c97b622f2e6d3dad05cb7bc897d752d8561862

    SHA512

    6977e3ee2da3bb4b023275c68bf10be9da88545a58df647fb6b56af54c9bf49132d76fd7d41451211bcc660912111eb35d0f78f4b5acc8eb30bfc04e1aa9c226

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a27236fdde64b49ee6af23314132c601

    SHA1

    a6f98856e5debac71dce82e046fddd5f24a74e0a

    SHA256

    472ee48c9b60ec666f6a9ebeff3dfb57320463e4857ea0962128ca63e2f9d93b

    SHA512

    1bdd9ef66911c32b8ebdbceb66e4ef38de973c95ec0417dbe191e615e84e57fcb138147477af511d3366ca6bd28b43f7e3e03a3a070835f46ee618d41b25e4b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6ff60d082d631d03d81e4e86545b009

    SHA1

    1d0cd0a48d75a322ec69036060ce2d5fb0fadd18

    SHA256

    44623c2837c87e0530672f1976809501edb72702d348163b0238d33f8deba61b

    SHA512

    d8a898b6138e6255907c6c678d91c9ba26e9ec5b5a0e0ff0af9ab3989312d816f7236ab6c032302628353dd743a45ede6d5e3e3149e5e4ef805cdba08545b2f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59ea2e18b39f3e7aa9f78f2a161f0830

    SHA1

    44da958d8c87ce5a8326ab5d170c0d440eee7a31

    SHA256

    dd932cebe93c39fb57991e78d5dcbdad142a86bc9654c87fc88fe9539db4569b

    SHA512

    3f0f89d407dca63d99112143b0d5c4e1f98628f975eafb981305d08aeb416ae313b4b4c776e708188d2670bbf4f79bb79c83def66fe7c62831e91f28298d128f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17f023f3513559824fac2385fc052aba

    SHA1

    f71e6a622e35d1a6499e212480c53b438f36f5b3

    SHA256

    e96d15b15c8c5e43a7a3f5c71a1f601281ff6bb6e057fa84ae2f1ec42348c62a

    SHA512

    7419b4960c0cd3d961bef8f1c87f849278985b8885b75539f00c5f6af7a550011346ae9bf9a62a3f0d000ea3a594e663bf9ef946a293dcbca462de87c7868c78

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CM3TD3CI\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab5610.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar569F.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NY2QRAEI.txt

    Filesize

    603B

    MD5

    86d25a85e5497eace420334683311878

    SHA1

    3298861c95b1915feaf9e4e1993e357ca8972c62

    SHA256

    c679497bc0c2a723e983699c62de8ef07195231d759c552fc83e931f374e6b5d

    SHA512

    2fe7621c5b0aeb724485011aeb046175dbe75cfa25362b50d8ad4511cfb8f93a57d8f61c5ad6b7015b1b88dc7ef1bbea5daf03046f535b48bc6e81bc17711b6f