Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 20:59

General

  • Target

    help_screen_font_italic_en.xml

  • Size

    41KB

  • MD5

    e7a0636d36cc9187d882513ddc489581

  • SHA1

    a2e6c1151624569f8c50d2d219f9f26e10aa3158

  • SHA256

    f7bf04817f4dfea021da03e7ac8782917fd9e4890c104b376d1f447515b32874

  • SHA512

    9043b86fab567b9e37a1b60faa9bf079996923237f0401fcd7071a85c3195302651bd39526fe096f1393da11ebf9824cf9e016bf6528a2b30c4dabf45883a6f0

  • SSDEEP

    768:N5iXxqZY7OI8DhIfJKIhTjaSEs8gI12G1CIhwoptkI9lsIhDILvXWnzxlFRhvQFQ:N5iXEo11ZaSEs8512G1fhwoptt9lsIKe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\help_screen_font_italic_en.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09224f878557e73a49c1c2b37a6406bd

    SHA1

    8fa1aee785ded38b87ab986f3702f5b56e66db90

    SHA256

    a51793f719dd09c9faca9b71736a3e22f1c8c9199184caea5d982eeedc107682

    SHA512

    871be6dc022b08a5f03271eae120c183cd78f438402aa204bbb12ea139b5eb2c4d85c4f5851eb38f48a5ce1e83459e894b4f4efb3954dbdf669617c17fabee4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b9aafe29c6767a8190f4ec8cdbe41c7

    SHA1

    c782a133a645e111a54a6bae9c71f8ab9db9a8f2

    SHA256

    c809f15c072181de3c883efb786d8bb10adc203df4b7a60b74ef2bc8269499c8

    SHA512

    5ad070effd2228121d1bcdfbf1806c4a1fbc495c37d18df51f2ad588156d07506deeddcd52f89747c25d82cd52247c1957d02c6ddeb41e63669760e9cc1b4ea0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f0490de21f0c57e4128b320ced1c4b7

    SHA1

    ffb55a8c429a3a0212c82fac1be59d8f8817f77f

    SHA256

    7980e4c1166a75b8433cd3684c2e5334c1514da367220806acc687e73b2e08b0

    SHA512

    07ccfe1b8515052643dede765b0b58028eaa993e28fa7d3f9d6c55b1a13d4220f140c3a1ef82808c62a8f81fc324015c374888809f81cbebfdd1043126aa2ab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4346ecba995538a7af57af5411202ba8

    SHA1

    656c8b75795587df8498c6f0d2afe8cf1e174582

    SHA256

    a0d9ebc965dce6e624f9b7f6f3acc992795fb78ce4d0927967278882e09b9e0e

    SHA512

    109ad3114dde33025ad0fdb921465bceddedb1ff9c61474a34c632777d73a93fe946b42878fc3c243162e7452adcf997cfbc719e9693b8d5115920c663f198d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37005fd87178dad38a7f92cfa7387d42

    SHA1

    095c59ba7f0b45fffcc8a1fb45385a7eaca8bcec

    SHA256

    5158715141339f1141c7c14f4e1be57ae2ce2a6636d2232214c2997a6b47bc72

    SHA512

    9bc1bef65f45ed45faf43e74ff3ae32afe602f3ea2a628c5fab56b5611eec895614ea32bfc3b21a583fd16c0f11dcc25b97fa1c11d1ba86283e4ec1bd03978eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    815b24a152172a1a2f52ca2c4bbee854

    SHA1

    7884f5ed0aba969923cd189cc7452272fe7369fd

    SHA256

    54506ea24237d2811f7387c60413b3bdacb97f806fd1e5c1642c66a3cd79c3f6

    SHA512

    b94a25056f37f9c85755c9f3693e51fbd313354a5367ccb84b15aebd269f6a5d2d71bbf5570588f0adca752e9d6abb7255624fc29b04bdf4b78e743d2256625a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42775059b37b9768837596d9e13118c2

    SHA1

    681706e294565d0f5dc6dc94e98603001f9dbe15

    SHA256

    ad29d269fac5735274b0fc37ad9d81028ec213b668ec951ec681b0351eaa8687

    SHA512

    beffb19c45122b480e5f0a98f1c915840781eb950db207d89e594714aaac51e0e21fe0f5319d409006b4217002fcbfd7d9e9f56f795877073d153f8a6b0ab264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1bd00426f709d2f348d55ff17f81157f

    SHA1

    b416b5ab7f461d3faa33fc2193117560fec275aa

    SHA256

    b4ed196f163d336587c38f48002dfee2f9b45bc234bdcd000483fefa57bcbfcf

    SHA512

    2a481c7433f4311b8f41965c5d998398980d33d4d382f7d11ea195e97cee1bb957f736ce6f8a4d954e3eef2f8a49423499c272e7fae3dbc6c5a21df34f3c080a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba73351c3033661579d5561651747e2d

    SHA1

    b8342405c7ee8e54dd8ce79eb18e5074db3b7eb3

    SHA256

    8fb439b88a19af40309540c9aa52db147f68abc64030fa225255f304f1a0b442

    SHA512

    db6da75c22283a9fa9ac0445405e454746b9d38c46d961e3af082d05eefb638f26c2ae3de62cd12b72c0e643ebc965e5e52b8ea3422e641849e84d8da95abd71

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GHQOZ3XD\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab4E22.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar50D5.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0O0M25UM.txt

    Filesize

    608B

    MD5

    8c3bbeddb4dcbc5203aea7a2e44969d3

    SHA1

    ce26cdd3fefdd54af0cd04409c046f2e2d7b3248

    SHA256

    8f2a34a2c6f6e1897970fd5625606801f5b29123e5d1347b98862ff2cd15a79f

    SHA512

    b594cfdeee0a033138c0ffc42867c979c1e91aa73c90dc05c96c025ca656866d64670d14ddafd86e4d1256866dad1065cbaf75d99c0b88421fc0a0a277d624de