Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2023, 01:43

General

  • Target

    Geometry Dash/Resources/FireSheet_01-uhd.xml

  • Size

    203KB

  • MD5

    60f4e238767b095d28a284a533b55a6f

  • SHA1

    723b837b3a809d771ea9e7cd981998e99b3c6002

  • SHA256

    21deb2ca5bc607b7df8d0abd22eb55e0082e05540b7e97e468cfad6e506a57c1

  • SHA512

    883bd310bb521cc36ad28fc3abc5f68618db10d20cd2a5a4815de27aa419087354a4bd7288baf051d66f8a8227527cd711d5472ed0c0e3b4f070062c9a560ef2

  • SSDEEP

    1536:XdPgNUP5CKv3plKu3tRBtUckHcBLAXPt4VXj/:VgPTu9tUckHcBLAXPs

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Geometry Dash\Resources\FireSheet_01-uhd.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d79d3eb4ba12a4dc6ea610a8f4b6b73a

    SHA1

    8d85d9251ddd8bdf369d689e431eb6e6540f4826

    SHA256

    cf25fa7e368c145e21137c26e3b632fe644fd09ebbb6499be53f45e06cb8bebc

    SHA512

    60cf4bde679ca38682ba3c669f77ce070980f22774a7561e92294c81ade8eee6f88573e62637e6a331a49ecd9239f463b1c7ffa68bc019dc569058474e52c11e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2ad2eba976ae6d022517a63d4d3efdb

    SHA1

    7bfa3970ec2c297e8f6a40c6e43518f0146c9cd9

    SHA256

    6dfab43c3a95cfec64bdd75af0065601a7c1c778c4303f76328cacff684cef00

    SHA512

    afcb58a78bf4a0c5b4f3c9c06a374d0c9f94ed8f2c6f7f6ba99355661f7030950ff93ba1967e8cd673b40e74b4535b1838e34a156aae96b1d071cf732eb8880c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d60db8f86563d891cf5d73d04fb19af

    SHA1

    9d02607f7a5b01c81dc56bba494d8184695ddfc0

    SHA256

    7ae19f1a3494eb5946fb5f75cee09b93e08413fbbdacbb3a7b9ab27ee84bed65

    SHA512

    6113a5c7cb9b4312b297facc8d332c62a111d742c77a8f2c62f7f94c16682d2391cfaa367f38928d74376cb52dea6f0f3a6332fb7e85978a54737e04a96ab0b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b94832adca60efef79f949e3b501660a

    SHA1

    f1e90dd69b3a3a674788a737d69f20b5b58db5bb

    SHA256

    42b5b873c7661193d8356691d0f8c12959a0e14bfc9b327341cdd4c21d92a635

    SHA512

    889f15e32ee423941aba96d937c982aaa71aca5b1a726677e6b9e5be7d4408be9076c71e335c606c621cde2d3085ea34c3aa39babaf9115c0006a7ced4a1e96a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    764a62516646b76e9619ce9b0737a079

    SHA1

    9cef6720d32b01e2aab41f734fb2bfc6b12e340c

    SHA256

    17b66ef641ffa993ba9eff707334175241a4f737a4b50f787f046c00b013fbf6

    SHA512

    d6189e5bdf0a82ccf4fa360f2794364490db86c3595bb840b1b0c1b3af566966a68ee360eec70964d62771053e01811bb338d8e1b8d94f989d5473af9750586a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a51f0a83ec78ff84e0fda64c81216a4

    SHA1

    16ebb65cd153018e4c35f53767a0f279fe626e5e

    SHA256

    f3c0698a936d5e0810d39de523317f7da00acedb96e5d6d9b5a15988963a2366

    SHA512

    9c1cd9bb525e3b5addfb2b865e566474b40c08d62ced9bc347f03db889bc7eae60a30f16886d902e3f2622cffa523613ad01b6c61ffe59166c19490fd7038a69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cba6a8aa45849f105e0ff8943618d244

    SHA1

    84f6a05abd6fe4198625d9fb7c7758e2c324bbba

    SHA256

    d264c11b0f6efcb8a118bf5d0d2111e7b3e000f7fe7d3e9ce535849ef477cd90

    SHA512

    920426258e153c9f828530ca3b554a137e61457d8f4b286ee3d8a0b42c12f565a8392f9046fd20039e377b67349de93fb8edbffdc3325990fcb6106816a7c1a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99d88299758075bb3db9b9636fe38f7c

    SHA1

    e5e94a114993b70b073279f8c420cddc65c74f59

    SHA256

    5b8e36b8238363ab0bf56f6f4bb21d19b86e7c140b4baa9611fde7f904eb9fec

    SHA512

    be5d2dce44c84cdcdb59649bb0d30e4460f25bab82535038e0075d2e1df8ffea0e2073447c05d5ee8dac89356f5b1380d3b1e1ae47a2edaac16ad5f7cbff210d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef4e69e3c04526f0e118a1b0a6bcd2e8

    SHA1

    a6af20ec62291a2e7405708eb768c0107641b174

    SHA256

    3f1872ca707804bc920b8b00fc791caa7935c4208b4799f38d009bb2e2d5b0d7

    SHA512

    bbe910bf622bcbc80a98a382f19085d339bf5e663f9044223c0305c0c1d7b40d40b3cd99a6fae99b92ef19dfc5afb9ab92c618da385a94ca5f0806110a416eb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a357226c271d2bc5952e2f4ae26f5c7d

    SHA1

    a5e1562b773a16e932453af609b24d64e3259862

    SHA256

    b1caccc93b4355d794cc0171a8681be0006b22d56335b78ff6b5de77ac4bc3d2

    SHA512

    8f7ceb351c02e92a45b933271d329152a2d4d111a5de7315d556272f282230cbccb6518a4764130a9acb9b2b3b0bd6fbac83913c9611f8f679a2944f23fa5a05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf8067ca133f46468f7aac062875b881

    SHA1

    2d93bf68b5d1eaa89d8b8ce81c228e21e0295b4f

    SHA256

    7ee4d105aac25e1bd58654577855864d91076d79e25477aaa772035ca074c157

    SHA512

    1b4e4f6c189d1edca46c2a62069c86ef06a48b6e99670a95e02e1b1c8e9d46d70fd01c74f548c7ba1690b861886ee4ac3b2e84b83f7657e5f3567599046f3418

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ade877d206dd43edc4aa289e9890e1a

    SHA1

    9d5706c73c4acd38f7184be8b1ec7dc065adce7c

    SHA256

    aad623f0fa5d4ee8c1de98db3f273df728b2a841d199b4918eb1c349392f3838

    SHA512

    39e23bf6d7ebc9d7d47581ef8d5d4a54b294d3387f708e17c74a8f1c207e94c26cbd18d6eb534d465408217162cfa94bcca74bb0e88616b6ad6f6b2ad8adf30b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d43f99634a72d715263329a1dabde74d

    SHA1

    5e931e697ea0378cb6b18da345b750c983805f8b

    SHA256

    87c10e61549fd0d663d5695902d1cbb581f470376da8890d5db4cd9b34f1c671

    SHA512

    db225c44b8f97598599002fee95f280e7c4980137c52ccee43b2a2c8f352e2fd7f849b12177364279466e3d17938451f05a658ea5632f66d4eb5851b840d2fd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e1ad5e03049875bbc39aa6aebb638fc

    SHA1

    a96b7f3ed5c2e7bd771ecc645cf027ed790a16e3

    SHA256

    c518e4e4a02a7e1c2741f168c3c1e8cf05ce74859b9ce65992fdab8b4e53ec10

    SHA512

    10b12cbbf5c676b8292e2cc697f19a0b33141ef2470199e64be8c2b0f05510df0ef6869899e9d920210572eeb405a2970c7af30ac1d437e451c35fe79d93ff16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e26c83f41dca32f2401d2df05d7c9b75

    SHA1

    c853e79f86ab138f052ff40584f0bdb3638dc9e8

    SHA256

    966120a69fd75b9ad6269f6eb64fc7a7cebd8164c8ea8c62e9e30dc84bf12238

    SHA512

    d8c00c58aa98b18106dcdda094cd897c75c11c739a37f3f4e67e6e5793ed246342715569d03d7fc7b16590db2a2338f0716ae5534a2faa3dd8f346a610eaa54d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb46ab39703b481276bb450c9ae37207

    SHA1

    507d065eb56cfc97b6723baa447ceb2987e70126

    SHA256

    d9b8570f7abb7c1ab16f0584425c1d6c64cb63098308dfc1a91bb449f3a5abc1

    SHA512

    ac9739b4f7f773d54960aa2b529bbe2aa9b8ae6f074e9fc73d388085815efb353d2d70ff2b7ad5270c238081a10069f7581786d9a7be85d74d62d9b2f8343613

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9281e94f9f0e452ca277d60ae91ab518

    SHA1

    013b942ddb809d0c422a327e3e07dd84a8ab0d64

    SHA256

    d5f1bdc55fe700f8c8060afe9e057dd024dcd2868b6e9396eba2ee8afe434422

    SHA512

    78f865e92d121bcd3c96e0471fb9562c497db4900a985388450b8aec8ba80ca0767fe644dc1b19b29a50f2b6779527403efe6dd65c8d5ff329857da67948e7b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    248fba1f6faf4628835515d6bc69df7f

    SHA1

    1b341dd04a47f5eb68e62a2d6ef0ea3f62c48530

    SHA256

    36fedbebd90fb49f7a00d9c87b819b5915d70ef3b7532849490bba5aecca0782

    SHA512

    eaf8c81c334cbc12dbc71ceb8ae51a93b1dc15058316e3c50993980d976a72ef1d9d30ae9a9fe60c807c3d1305f85d119fd36ccb251a29732d91a6375f936df1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9432676e2833f2a81c1ade19d03b172

    SHA1

    8b6ed7c2ef4e473c56ce25f660a8b90155ef5991

    SHA256

    cceac14fd11c2be2e367875ef5d341c84170f410d1ffa8f95c2fddea048781b0

    SHA512

    1238cd0cf87cd0ed87b1d6eb48245ecdf27a0134dcd556555497ba769a87360afc5ae6124bb062f1ade5082cc6394a8eadf0874f22dcdc102dae71f217744bbe

  • C:\Users\Admin\AppData\Local\Temp\CabE6F7.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarE788.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27