Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 20:59

General

  • Target

    help_screen_font_zh.xml

  • Size

    2.5MB

  • MD5

    973ae314678783813bb938a70faf0512

  • SHA1

    5de77e09f643ef2574f51bb4f465688b9c64761d

  • SHA256

    c536e3cc4a8eebce69115cda5920e7eeaf50b2aa3a5f56e6867b1b7647cc8cc0

  • SHA512

    625e1d08c40a8d903497dfa370f66af6245b31145fbc1a12d58f41cdddacbe9b5f910f50a5c31faf5ceb5142bdab5fde764ea1ca7b3be8a34f5450e2dc415037

  • SSDEEP

    1536:A1KeuR/n71cO5H1rPokDEnAFhh0x5FH5PR4xMVB3mCXQvQPyi0ulP7OJCFOcMa02:y9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\help_screen_font_zh.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ffd50e2710a8b6265411db13e0f28b4

    SHA1

    d6d260e61670b473542d967dbdb1cdb6cdefcbe2

    SHA256

    be13e4e2664f4f5e7ad22739dfbe2dd0f8533baa609a25b5c873e97fa4e73963

    SHA512

    2a9fd3fef66a649ccc15c9cf35aa9aee78132898f57e8e07edcc5bd8915fff52457b39e02171ea7262991bc1a6a0860665e80cec45904fad2ca9448e17075386

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54c3e6798968748bd5ca63b478d804f6

    SHA1

    112050d57a9343b7685b6799148a2348ec9e59e0

    SHA256

    5e47316984a4d6473a48e2360319f0972561d77b23616c840a944a185f3d9e64

    SHA512

    446a4d1f8ff7164d6e5e0952a5a0ea9eb2176d4e3a156b5fd057003aa839533c154943fb86bdaf248905cae7262f10d9859ba54a59ec06e917fa3103d9917443

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4cf2b0dc2cac2bd79d75b96e53dbee51

    SHA1

    a5cc6a438b45d242defa34b1a90b5760283863ba

    SHA256

    6050abc2d3bb481755466c8c5e4d07e0fff8074f607500b6157278d19d1ddbf8

    SHA512

    f334e080441b2404d33e953b6cb4ffedd18cdc44ba6b29634c5768d3a17fb5727a0928cca6a5f2d8f5a7add466e2c0d4c46cdac54f337649be6b9b6f091518a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1955243b05ad94ca43f26d180a9b5b40

    SHA1

    83304c20322ebf86aa8074c21c51804ff6b0ac02

    SHA256

    5f0b03c49a5ed065c5e400f0ee43648eca6afc158c517b699fd1a169e5ef00ec

    SHA512

    16a7fc8539bf4f6a7c5e54cb729ad5127e8c66797310871938781cebb9f9c393f2b6f13f57bfd2e0ef04d479a24ad31f6ce10b13413f8f902f7e08ca548c35f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64ae2085e8ad92129d02e02d672a34f9

    SHA1

    3d860be52719e4a03fe31cb563f0c7eb1c250bd0

    SHA256

    20df6393ed4fcc0b9e5bae581aa36a764ddd08cfc5e3f650d08f15f74cd4a82c

    SHA512

    a1eaabe6665c5d581509d3ab1b7a88a8261e4d5515ad33e5a82c129daacd205ed72f41d616e4c714f67c74ad4bebc5bae76dbaed07d8f400df9325aafdad19ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffd44b9e71fd23d8625184d3b7b94cdc

    SHA1

    e34562c497ec58a71fe3ddca2218302428a036c1

    SHA256

    648e183dc8e032fa10af94da043079cc1a3b522666985c7a5f3e64a97cf7a328

    SHA512

    537dd68be237b01a5799206ac634f42504b8b07211480f4949227688c9766d90a0c695fc8173554d48df360acb65f167067351d455f12351b143a5712fa296eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee60e46e89e805e2ee3ad0e650d9a1c6

    SHA1

    d7b9dd8bfeba8b1bf00c90b3f69c3e83a0bbf574

    SHA256

    6623181dfe3f560e17aeeb42844fd7ad12702c68b0001ec0eb9c382ceb6c0bfc

    SHA512

    21b16da6521ed238777f223c9c81850eacc79f7a8fd2c9bc6ba9978a621ab80c8feedac59bbdf7b8756b07a9062ccc31911ea201c0d3143fcc52bbe3faa66311

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f610624e44df2bc71f0f4e74ae5cdb47

    SHA1

    b107efaef60e76f1782ec4e026189d894a3179e3

    SHA256

    1819ac1cd47f6eb29adb6e42ffe9406032ecbbac3cf342be917c44e70402b0b5

    SHA512

    1182e6c763a9f510d96e7c0059a43bf396dc91d823ec558f4f37e0a58f551e3fe4b166e06b72930eb966b345ae8c25c1c533285de6ede4781e9eff055cc494fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a33e4c2b1270379b91253dbea304065e

    SHA1

    9f12dccdf69c049212292c43be0a8bf02561b08c

    SHA256

    18a2fcffc31e44198f435a1ef65d51a195c803b93cc07d2f53dbe36d3475854d

    SHA512

    0b661dcdc9ab96115e1c2b4e95d41dce312e97bdb096ef534dfe5ef93a3d4375c8c23bb209b5ab2a0e47da181e742c2b7184262205ab4cddc2cb19bf96b92950

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9JJ4U5LG\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab8328.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar8436.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JM04CHTC.txt

    Filesize

    606B

    MD5

    4ec85e2dd3c3a608b9501bcc6f559199

    SHA1

    2f58b80b123f7721314adf12dceaa8fea05da3d0

    SHA256

    6c15f746c3aa5443245e07baf8835268e5e67ad13ac1c197295dc3989272f14d

    SHA512

    17e0a3c51509d2a95f8377469fd2d0e518cbd60a03a01ecaf57becc81553f2740f24d64fcb1363cd56912ac5a63877bfabe904495a95fb88f81494c514383c80