Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • submitted
    26/08/2023, 22:02

General

  • Target

    floating-sticky-note-selected.xml

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\floating-sticky-note-selected.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffe1879ccd11c900c4f8dad4cf315160

    SHA1

    d3095b29b92b7a801fa71c1873eb154ec645f843

    SHA256

    25ffc686fcb03743b1b0835395e14d7b771672b6599138134b3148bb2ecaa4cd

    SHA512

    f4b03c5452e9b2533b97d953a4976c377a67ff3e7b7e379cd8c2cf8a44230218d58bc5212547a61bc69f65a2a1cf1a1c5279419a78f5d2fbe0cf03e243bc449b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6bcfc424656a0b53b4c1f1af056ae19

    SHA1

    62dbe51880598922680a3ba3c7a4b4320ba6e5f4

    SHA256

    1e070d198409076c8b5fb041d2ff2424b996114fb183c14cc241c45d959ee47d

    SHA512

    df3986407160f50167cd55cb0fd40564d3f3eaaecb0119162c8cf77063a4f8788a0e84ed4e9bc60d926b9c21de0ca4bc051e4302ba20271de5137eca09929790

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16ef276efcf7905f25c42f168fdc742c

    SHA1

    2a6a8bd17453e9947d3ba92c1a5f62e81e40202f

    SHA256

    25f4b1dd44079647145712d30adad539fab01a085739de91400285dcfd6020d3

    SHA512

    7ac5e586791ea7e158eb54d83661caa43a4cec67d95f6abfed734f4e4c256c660049b7ff19005aea380613a136bef0bc29e8ee723c7d35ad84489d600c6be4b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53bba9f8b5aeef79c11c8983bd8c6fca

    SHA1

    0072905317ba009d4bd933d7e3453cbdafbd51eb

    SHA256

    53af3c4dce76734f645a77d37bd26fa015affcdf180ea8802a6f5d1a775fa355

    SHA512

    7e3f12030514ac93208ad9bc36ecac51cef3dbcb1b732574097d597e894a902f9a3bcd8c0ec8ded506e7e7289fa5a9e459a29124255c00ae4e06cf144f9d9c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9731672f1d94968263b6abc9370b7835

    SHA1

    e7fe2716a31b75cdfa00fb7e36056156f192dda3

    SHA256

    475cc4b82fe8103072b3a92d3ee348e709fc9e7251ff82398c6d67f78cbf5d9a

    SHA512

    44aa1f8685967ec2ad76d0d19e30c0ece33110cb678f8d9de8471a58f8c7fa89503e797a83a3b0cdc062d66efcefc142eba8cf1617b50e2a1314e39d0bb93ab6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa9486c2e08f6a2320402cdf629fdf95

    SHA1

    a841ceed21cf61e33aa921c9da87a607b1553cea

    SHA256

    6a62f6a07b95f2dabc8982961ebf6ff5e94392e2dd63892f544c641de23c4e51

    SHA512

    45dfb022780b87a01d0d4f1d3510ea2b3d84b5a23580bf57dc33c6c5ffa800bce293a2d68461edd34b5192a83ff844d955456e1ef41e5fb718455765b7ccb7fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5c83ed1262bfb2c080e3fb60b07d15ff

    SHA1

    05b76823c730c754ff363fd3d0cc7cf3049f5b7a

    SHA256

    9fc95ba9cc72d3a58d1e1e7a3efa2ec2a7d4b18a338fcf910e7aff386b7a1f56

    SHA512

    9ebbe523c954d69cf83178dccf0a695c8f14b393d4d59f105d6333eb81e2ec2d2db0055823b09a89261ef93736eae67e4b4d41678cd15143c965222b548cc4c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a2e5c99de1e60112b790495d7a0d03b

    SHA1

    5f381821cb3b6004df815cba0889459f8a3b3213

    SHA256

    5ca71206550217f35088d8db97f5d554492958f53cee0ab30f389e67cc89fb58

    SHA512

    b99e66e61e51cf07758c33d5782614bace481c6d59d6281e7248c8513c95f8b380a2a955bfc55634d6eba378c89d4527a46622a1567c68e57f6bb60abd24b237

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07701a631e505f2ea9c2003c244caf14

    SHA1

    23ce339ec39983f2ae7fa883b327dd42210e6729

    SHA256

    5a8eca66310270a7d29909aac230a04ca5ac369739ba4d88cd0325a091a424c7

    SHA512

    3dc4f56182dbe051385b4a3a3a89bd11e7e4ab0dfb2efd425da5526a86fd2e2d80074446812b74db30498c35e164c9d4c0827d01d434853e2622408eefde10b9

  • C:\Users\Admin\AppData\Local\Temp\Tar9A73.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf