Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/07/2023, 18:35

230706-w8fqlsdg43 7

06/07/2023, 18:32

230706-w6mfdadg35 7

06/07/2023, 18:27

230706-w34kgsdg32 7

05/07/2023, 09:21

230705-lbqjfabd66 7

05/07/2023, 08:59

230705-kxxdfach7v 7

05/07/2023, 08:41

230705-klwmrscg9y 7

05/07/2023, 07:15

230705-h3aqhscf6z 7

05/07/2023, 07:13

230705-h2e9lsba95 7

05/07/2023, 06:50

230705-hl6fvscf2t 7

Analysis

  • max time kernel
    102s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2023, 06:50

General

  • Target

    clockLightTheme.xml

  • Size

    3KB

  • MD5

    2235609a58ada82f2110d941341a720d

  • SHA1

    d3b06251eb8f131034ba1ea3b0db982cb31bd813

  • SHA256

    d89ab1d4bc636a73d64ef1d8976d517f13449a11af28d70e88ca3d0c40e114a7

  • SHA512

    ff7543b27941add4a92579f1a55f3b40a16cd8ec8cc43b678b229be38a3878267fcdbb80b040e91132fd938082c47e6e237f62ac3903422ad9499cf7164228d5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\clockLightTheme.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:996
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:996 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffc9d342c58a81403b1adc95fa86b207

    SHA1

    e44a27578df3d8ab1aea3ddf9c60c08209cdcd49

    SHA256

    af2fff853cb43a55659ae2264bcaa8a50a297b3ab5b60a8d55c137655d27eebd

    SHA512

    618faf13543111d3365db5366156ffd52f02418871dafecf71d7b86cf5c54e70e10a8ffe76f41e8178709bce509f1d9c1ffa3cc34e06c4d4d4b96b3aef37c0ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f375ae328e7f02d40d09022e05c7daea

    SHA1

    e78dadbeed3e2402169951f282324add689a184b

    SHA256

    1e614f6116ad18ac9b46178a2b0e2f00ee31bab09072953015b3fea6e1ce0c3a

    SHA512

    70715f9358933c61c0c5fd6f2aed9de2eb3ff229a1e7eda36a0e531a812773db28f782bc3723ab18af66ac3fcd4faf3cae48ef3097743715e2248b120d3dacb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    afe7db86bb3e46a0403c4064e0629ec0

    SHA1

    43c43e40f65c04c61e91e2646eabc1f7c158db9c

    SHA256

    7e5941166c3a2b990f29d82bdbfc7c2f239475abd452e0245ba0679f0c59227d

    SHA512

    8fea051bc30d29115c293e199cb6b94c794c2a6f203cd346319ea7ced12a171d582f93b28aff8507f7abe2449310e37f182f778d5a66b1dcb34d306abd4d040a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1be402c7f50ada10b94da75bb9bc3c9f

    SHA1

    30ddcabff6ce30da8f9900a0360bec955ac47233

    SHA256

    a8fab9d545492bbae16de09fd430d754b1d371de9e0a23fd8a52308ab0020baf

    SHA512

    8e113e347344aeb29d00b71c53dfc06e09108df1f8120ed226d79e2e649b9eeae6487fae6cf483f8b64dd42622bc396c06ecc8486c0ede01b4ef841ee30f4510

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    117a253de32841b75005aaa5f58908cd

    SHA1

    7294039c3be5124fb2b2966c724207d4f968dc1b

    SHA256

    a7d748b973879e8fe5532311a8766537293ce694c24b5fd8b1ce5665fdd5f6ed

    SHA512

    8f5e268047814e1e59c42e96a5ccd9a511f45d9f949eb531a6f2141c2787bc203bb5c663b1c75d08ddcd9e842471141024eaacb17bb0ccd191912953b3d1729b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    935545ee5951429f0b60bd34631bcb9a

    SHA1

    74d39193586a3bb6eb4a1a86307025282ac336fe

    SHA256

    bf35638c8a6bc6d5ebe6320fd2644fdf06543ba0a99d20a824a8a687cbe370b3

    SHA512

    8c5411c38fe21ec99e320d4fa88f8b6f3b8c8b3775e526618d7d4926ee9f29a60eedc6908971879edc862a49764076c210204ca0107fc72525f4065a92314577

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5289cfb8e5223b2e295e9f03998c5f2d

    SHA1

    a3f015f207e69232d9dd00f279809724c07421d8

    SHA256

    702bb9cc094b8f43e3b9e70969c08324b3a8605def22c9e8a33501ce4d19c873

    SHA512

    3c5fc104c760062b334dc7daefa6bf514a5b877396791b3e3724bbc66c8bf2e4606b7bc0f5c8484ea965d6a371b9c3bdaa6fc10b035eae325cd9bfe0655e4655

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da47a63079be2d0d6f968562caa27aa2

    SHA1

    64e831c596715007cc47fee660dd572b7add554e

    SHA256

    b84ec53049907c134cf3962883ce7b4326ed57225bdba9ef950f3ea159f70278

    SHA512

    138d2e2c3ac468b2a7d4784a2de47bd4dce1690702e0ad3fb30cb0e79872b26e11054023c6a09429fff9a3d1bcd241452b6b81c5dd8fbff3bc800ad1c6a0bc9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa6cf7141108e040fa45f2ce4aa6dbe7

    SHA1

    e6bd67a7ad8fbc602fe9a064ac2de18b132d8f12

    SHA256

    9b8f934fb9cb2dfa630bb6393a64e0046e16c9d481ecd5a27f2c73eba2ee884a

    SHA512

    0ea7776c7de3094dd8b5a3bc0793bda0eeac5d64dcf639e9bcd6f96cb2a184c2b7419541d3040792e6c617e47c51f844aa68f3048431937b4cb46379b48cc25c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    835be04311d95ca83379f43efca61b61

    SHA1

    9af85d5d53962ed3a8e9a2bd3425f72ac5eb1e28

    SHA256

    230f62055d2424986bec4580900acabd868ee1c0dbe7145251142450996f68f0

    SHA512

    fd9f4847c9abda9594b46ff4579eecb061026eeeae5c1f10c52f1176b6d8b3edf706eb31602f6066c7a9a267adf342bcc6cf6cb3dc485d360e515db9080934f7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M70DY8PN\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab9E84.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar9F35.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\V57IMM9A.txt

    Filesize

    606B

    MD5

    c534c54d78d5d5874b97132664465e7e

    SHA1

    dfff94c21dd6854f67617e2ad5f3242454ed1dfe

    SHA256

    76289b29cd49767e6513949421899cd7492b44d4e642c2ca229d1f060356e220

    SHA512

    4c5d6868818c8f04f9b00ffddfd8656517fae882cac76079c1eec3d6332e2a7c1a8c1614533032147b5ea692efdbd6069f24f49adb25ca9221a04b021707b406