Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/11/2023, 03:44

231103-eapr7ade77 10

14/08/2023, 23:16

230814-28586afg99 10

14/08/2023, 23:14

230814-28bpjshh6t 10

14/08/2023, 23:13

230814-27c6zsfg95 10

14/08/2023, 04:43

230814-fcfsqshe37 10

14/08/2023, 04:42

230814-fbpz1she28 10

13/08/2023, 13:51

230813-q5sccach63 10

13/07/2023, 06:05

230713-gtdv5sfe43 10

Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • submitted
    13/07/2023, 06:05

General

  • Target

    floating-sticky-note.xml

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\floating-sticky-note.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3291f9ed8333a55768d5aaca6d1fd945

    SHA1

    7c1cfe7a9e37117c8272dad1d48ade314a728bf6

    SHA256

    a7727691ed8283486343de9cf7fa661a2a3759f8129206ffbba008c0d2436e03

    SHA512

    1f45e32adcdb70baa94135e31955cf2856a4c2c8f5f980d7f6318a6581dba51b68e65c99b088f2468622f701224b701dc6f2f427cbe7fc2667f397dbb0d46997

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46f8b58bb2a8b1b80a28ffc0bb36c7d4

    SHA1

    85183c13ee7e7a8d66ed19132b684856d930cdc4

    SHA256

    95cf0478b2af3b8134753b14985f9542b615b6751e9329d73dad5c5876bbeb17

    SHA512

    e1d84d491b5c5c83229a11af91459729cf0668b013584241e6ac27c4f587ff3c5fe37f24088bca63f7bcb65d2718179ad223725f32cd9ae0acbe67a0d555b8bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a49584f4dd0d747c4ed93f9cb742e282

    SHA1

    b0f92db9edded9dfb513fc8bc7864021804143ee

    SHA256

    a55ac86142e52e5bcdc8bab278dcde1eef568e69a3fcec300666a143fc107f3b

    SHA512

    e05c8e51db2dd72d85f18e54f7b99d39a3f133ec14190a635c7bd78c10601fa61cff27eb202aa6ac2a2bfe6794f13f037a6c327c5358260c710e16292fcfbb88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87dd86d29c0412f703c6a07a7e433bb0

    SHA1

    48f788eea5a75436e831e37aa9d29e55d0c098aa

    SHA256

    301d03303934ac6c1d3320a8c1eeb476ff78b5e2f600d1a3e4e9543f517aede6

    SHA512

    e20f9e9a3cf3f337a434edf2fce9a671a669c9915995d5fc4b731b9fcf80d9d363326b49ab0a202815a4a11f6eaabccc729c36b7f514313aaeeb9541ee9c1c69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee366ecdc44022a4e4aa935573943b7c

    SHA1

    54a82dee275c943feac04f868bd5966276500982

    SHA256

    00b1e22df4d5ece3800001e7813dbd8f4e2c531196101fe1aadb83207c5a0d3f

    SHA512

    ea5861d81c2a5daf20b42567eed1c343cec82b0598f1c9e53c50b0ff31e505af0823f4da62b6d7e9e5ad087c882f3265bc7b3ff4a0562dd7a27cae747b706ece

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    69ecc5fff214c7623ffc5d6510f4e1f6

    SHA1

    93294fbd749d8ea6ab2e6e774afe8e213b12722d

    SHA256

    47b44e936d9596fc421a80dbf89963b19d3e1c8a0b05132b9f6c6a16f7c42540

    SHA512

    235daf03ee9a3d6f74ec83b14cf84e636bb8a5c17f9fd88ff6810a856a2576de5ca12f482630585d69472fcec769b025890f93c82d3f557711258738f87a4e52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff39768f4818235685dca99a2835da60

    SHA1

    6ab35126300c3ccdcafe361ba3743e7e69470512

    SHA256

    ca005c1137099ded9b472f979d5c398ba03eabad8cf4a8c068ff421245362452

    SHA512

    8bd6c10750a429302b1c9a630f1aa2ac873666b41152f781536f65c4109f2267e5c2ad0d25d2d1a23b0d071623bc28fe6faa457db3fdf08270f0fc4b6a666fd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c2bc41a0cd85f896da80f699778af8f

    SHA1

    5ac30c186d9d4cd025453f8d0162ada54515afa1

    SHA256

    b100350af12806b39c4ed35aacb03435046f7b3d7805be5a48b24827749f64fe

    SHA512

    534813398c7d2dab5f5439732ee868e5bcbdc64e813440dd32cc72f513a389e3903bdfbcf650761d956963153cd5ea418110f8cbaa7ffd94a8bee433f564105a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db560e11bc799c328dc2c216e5dfb25a

    SHA1

    9e06d3089bd942cf0afaedb975a9f1c9f0b17ea9

    SHA256

    293e21d205a13e5905bf250cb04f40230b2d195fc82811694406cf94247338cc

    SHA512

    d2c4b17a81f684b38f97ce8ab35c63ff53365242c95c4ec4b1a349a0caa25de70c1452ff581ef784179105ee254e24b957e9e94f8383ada9d219a5cf0c8b63e3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O5N1CMJ9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\CabA6FC.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarA7AB.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0IHSG35Q.txt

    Filesize

    602B

    MD5

    a540f64c8898c0cf2cfdf8ccfd9517b7

    SHA1

    4df12b8cc8c5d2d37138b8b1628c36510ee001e2

    SHA256

    5791a44d2522c1c5ac0db9448972a2f0720a8e9eab49b65d41911833d7b26481

    SHA512

    d036b572b499177d7d41edadf8a438260ac5e795f48b84891eb4e2330693c896d949aa726922b80c350662b89abb15516ddfaee66131ccb276a9f945067cb2c4