Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/11/2023, 03:44

231103-eapr7ade77 10

14/08/2023, 23:16

230814-28586afg99 10

14/08/2023, 23:14

230814-28bpjshh6t 10

14/08/2023, 23:13

230814-27c6zsfg95 10

14/08/2023, 04:43

230814-fcfsqshe37 10

14/08/2023, 04:42

230814-fbpz1she28 10

13/08/2023, 13:51

230813-q5sccach63 10

13/07/2023, 06:05

230713-gtdv5sfe43 10

Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • submitted
    13/07/2023, 06:05

General

  • Target

    free-text-comment-selected.xml

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\free-text-comment-selected.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61aab19a166ca48e3aa81b4b647bd246

    SHA1

    2b7cd2977656619cab03fcfed4ac6bf34cb6a749

    SHA256

    6215aeefae1076fa542aa47338f32156b1100debf3b15e9ec64e91ca07bdae4a

    SHA512

    920be9ef0c4c7d4414d0eaf81a0e0e2dce7338fd1cb3c9a6ae7b05e2fca74522152fdf7171f9512873f25698e4cf0131fef2ff967b29591e6ee97abaa3357a1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b7b91093baea4da4e8fdf360369c819

    SHA1

    9d4b79b9825014ac0413013df350e37967e8c424

    SHA256

    e030d34c353c5c5cb4d466f7b84bee6d77306945f17ce6433f1ea6323f6018e0

    SHA512

    7e018595554e91c14454381d43ffed564d103b33a86afa4182253aac49bdcb7c32843c81ccb7d09eec08ca2f0955496f23a48ada3ff11ab1596784a8be66a859

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07e0382c8ad8c13d9188b744fcdb24ed

    SHA1

    e77608e3f3e2a6cdb6ef39c10c8cad2283ca6369

    SHA256

    f25598caa451e5847bdbea8e509756a5077f31b164b8ec288800471776ece951

    SHA512

    55d5735e6506c1a39092122589cec37b9e77884f161cd5f9641b4efd44fbaaa6e6a77468034335f77010a6d801b83690ec67944c0b8fa6ff4455597bd4cab39e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb7d0aeb3a7b12162949a5086443dd73

    SHA1

    bee8c666bf9c68febe4d1fc93a4824d17bea19a2

    SHA256

    75b96842fa4badbc367fed7512874f8acbbe5a36f7d02f6589c808c074fb5118

    SHA512

    5a7fece184caa15a8dec38cb6615f7cd5f6ec489e13d8ac9c9fca943ad4eedf43d258b1a029378bf3c43af375fe25879d104674bf3557388f9ee7bf6f908c1f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28d7e1dc72bd41fbbb1b4bcca7a5748f

    SHA1

    bd0e573388cdc5cc709ab4207090c459a026075a

    SHA256

    9e745c0772c3d872c26fd1223462b27844a5f6f15d32456b4957fa2a3de6884e

    SHA512

    d1f406626c878c885bb4c88a244b7a98de3e878cda9f43975c7927b32a7f4074e2cb1553f0bab987cee749e4389d14a2e86b986893490434db2f68fb83e6aa38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5124ec754228a7e113087894f0a94c8b

    SHA1

    3870b2cba07ca25de44abb34a6fda41d881ab534

    SHA256

    680ab4a1db8899900be70ec4e8599eb030db23ea102aa114e42249bde6baa27f

    SHA512

    00e45699c96d70463bb25114b957af871bf1e23bbe82dcd058389a0e72e33bb000c9c4c41cc25d2da42f2771d2235131a9418844619e70a5397ff52be304d3d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7487873c746e21af0e5a5a8140618b06

    SHA1

    ef8ce29d60e3d317e4d8f80de20a20eb76a12be5

    SHA256

    68c09b79ff010e38e9bf2e6539ed61ed2687401130c69fe2cd5ecd59a29a038d

    SHA512

    ff7353593eee28c46939047b05109f2c837338562b1a1afca0863f5ae4949c13854efc5cd735acc3050e15ae26ef39860b141007172746880edc22253b772dc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a171dfc53728b440a4f4d6789712e9e

    SHA1

    acd939145d398d63cf4f8f2d7b2e53bc64500104

    SHA256

    eed789b1543fdc5c1b1df470808de4cd7aeb7ddbd4becaf1b5046276fb2c537c

    SHA512

    ee326008c591a823f9f4a6bc2f8d6511b79daf42e04369283c33af5426c31ff5942139fbc13529778ef1f5702d859e4f4f04318ee029a6a6f5cf8818f4bbbab3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3VKWFGCX\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab9954.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar99E5.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0YHO5VHU.txt

    Filesize

    600B

    MD5

    8383043391cbf7d6221d3326da357550

    SHA1

    409bf25f17b5dfb7e7964ab7da1690f7cd723920

    SHA256

    daf7a6247008f04fbfaff4385903e5dab61b374885e9f4f0070b9df497a2fc07

    SHA512

    82e1d6dca55838ecf93b3c1eb0f32978e99d3cb46c2a7609db277a6f0e473138aa3acdaef3547ec44b1ba743bb64bdd32158c6b83f76a5b09beab9368b63a5df