Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 13:31

General

  • Target

    junwei.xml

  • Size

    13KB

  • MD5

    352bf1312e779248a303b5e343c0db17

  • SHA1

    c4b34d31523eac496fef0540378b6da81b59efc4

  • SHA256

    da3f382934e74ba487218846b13c488552e1ab632259accceb136478ca4966fb

  • SHA512

    a92cbc44087b627dd3df6c779b137bd37cb4a231390af748945c39be6a21394487a5240ea9938b652e62865e26371df3e6bc062afa7749198be96d1f0efc5551

  • SSDEEP

    192:7RuWb0dtTpSvwUu68H7lEx2nOlVhoWMbZsb68MB5R2Dm6KEZDll38VMRsjk8:VuWb+pnUuh69iNbN72Dm6lDll3MMRW

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\junwei.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9d03229b051b2130e7af6d7b57c702b

    SHA1

    8dc9dca19c765ae51e0a28c54d7ef87521bac386

    SHA256

    f5b12287fd9a7938ea9e57ba2f2fbcac1c63cdf84b110066e453b76126b08736

    SHA512

    e01886e297a1eb2b8f3ce278fb30778df635e56d8689e958abaade23b4c28d76ad72ad874a6418d9210c9b51429104cf997bdb93fc3c2ff2d295c74a9d35623c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f1d421374c20e1b3c1743d55ff59914

    SHA1

    4e7205d91080f62cdd4606b5299671428c259a1f

    SHA256

    30006fcab9476c70e88536258095f94bcc3760df22f816a2434a1c03d20f91ed

    SHA512

    ec36bcd13c9242bce31ff1638c299c3bdcdbbad935bf571be48f63c2cf71ea22c25cf58ed6a8e9f862d67e4baf56b576fd79bef70c7fcffc01869f510f93b04b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b093b0502f3eee14586f407486c1e11

    SHA1

    d4cefac92bc0c76e9762494d7f52b3aa18a0bf7d

    SHA256

    41e015e062029cd4136ac8dd9ddc69f5cacda13d1412166b2308bc275f8b6f43

    SHA512

    1a53f3fe341dc5d92da3081b6df1534e6d12c7ed27f0c5da0c293d6e950ba75fa9b6a0bfdc42582e80d7885d91c4f0a97cb82163af970d93672c971ea1cb7793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    094b05350665488d5a88e0e53dae0e73

    SHA1

    e6f33f881ad9140f09f4034d2bf34a2314dcddf0

    SHA256

    a3b7706d5b640f017475751fd6bc45123fec367b69fa9fb83901f3bd8ff06be4

    SHA512

    87c33e778490f9e6ff06b61dd5075e06f5c1ef4d1396808e91d737ce5c91b38cd70c94eb47f7545a4b5dd554a1c79e0fe57e7ae9a17c4206b2478230c6e781ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3639c0d740320655af835da39eece52

    SHA1

    d91b9cc2274189b37557de7ce5ddb4152e878054

    SHA256

    60ad14fd7c51b741681a6a24b672039ff1682bb93d1a622ede4be202c26638ca

    SHA512

    e9764ab47a1bd13a6d0e60e7ff3e28a44c6e740370eedd7bb66102031d13b367949005cb2f97bd7ec6fb915707e3c118002b38293e21fa3581c5c57a9f607b06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4bf535d4c4ea79b9579c887a9f7c23f3

    SHA1

    e9377fac47719618721ce1f8239c9e3f55ab03bb

    SHA256

    aceada12c8e4407d2de155ac803f287db9d09f368de02ad25b157ef11736edf4

    SHA512

    11e205618b53908ad436c38752f3a9761a264c8d7cc408bed1994c904484508831d4418da1024f260724582f4d7057ebeb2e2ead3e1daa614cd77ebe0802285b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7551e7d469778f374bffb82d1716aa6b

    SHA1

    6d9c429810ce706fcab89e17908209d02916216e

    SHA256

    b8a94e26c5f007c27627400684a3124ff88ca2d21fde0aa6d5de0fc3566d3329

    SHA512

    8d0154fd1bad4db821209080d0c749f79dbd42698fce33ea3e75c5a56740b673f5c53ce2ba461bb1902b1258b8ca874db456d75a514c2324c870c0d82f4ee672

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5c470762064aa32938bb9b7e6bab22f6

    SHA1

    a70650ec249207600c701e1f6f12803d136469a8

    SHA256

    2660f4ebdbe7cedfcea439e8ce50f174653e47702ba605117badead5439a7d0e

    SHA512

    4bc2c400148b1ddc212b0dd25995f53e11911a606ac050eac8274d24a6c6130e26ed828a49bda5246ec5119a1ff5cfe41eeb1bccfe7ef4f06dd17449433628b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ac8d7e6d65671bf7922a11d06a15eea

    SHA1

    ba62435122cba63f79a7fa68fa6e0d0204cf8af8

    SHA256

    e9cbddef8ba62a7f89e28a0569385825273372b6398ff3686b5ac7807acc2cc7

    SHA512

    9835f16390e2a2da913471dfe3e9d58c88de4d496a861cf64995ee95fff7c33e31b8f8974b0b7b1d511a3dd963fbb7cc401e67710067ce3418d452a14374ea9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32c4434f20cc2f1865ceafa9ae157b93

    SHA1

    04e7227aa96e6fcef52c90de2ca196f8f9e18fc7

    SHA256

    6f8d763f5bc507272fec9e378f04134200a7aa99f5eae3d6e9c85a1d0e0b23fa

    SHA512

    06bb8159f8fcdfb501f30ca206eb8f03661c36cfd60c70c6862e5ef4129e6262c9e7f797afe6ada7cd29cb0f7952bfc6a91df60405d2f0b3455e9de9d38f011b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29a5f42e7a5469b24c44c2e634410e07

    SHA1

    454cc0c28c4673da05252dea60f10aa3ffa7ded6

    SHA256

    ed18379882f6949b9eae93691f84a2bb29fcb487e03d44a8039c51cd5033d4a4

    SHA512

    9948bcb1e931dfd80270f06d3d76c205139382524f6434722e5ff176f216ebd497ac43f5ff05648a89e838cf31de53b8abecf5d5dd3141f6c55056be33684321

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dac01004b39207b744e6eb7917e138ee

    SHA1

    162fe74eefe54a72f7ec609a0beafbefd501f876

    SHA256

    0189d8ab0dde270a8571e00cf3278744a3474974ee3d6622754da96ce6abe1a9

    SHA512

    2df61fac00f58153ec2b26e36d7e8c212b42fd9a9e8b4a7bed0d1867c93ac628c5417fa1811e56b3fade240abc19515c7d20d36048a9b3f856b867a8cd5c9cb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f174b1559ffb14b2ac0608026f8718cb

    SHA1

    7beecf868c3f0cd9dd637bca8331c2ac46e0ac6e

    SHA256

    f19daccfeb81b85637af5a334b033d7f7294ad8709318fa206fd5425fa48c9b8

    SHA512

    b54e57c6a0d64a754234dbd963cb8fd261c4fede43b4bc783f14ee6cd07254965e5c4adbd48d105123b3e2f20c85ed545e3e8f1957a252c8505ffa5e75497ad6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0788f82965bdc853caec935c3ef078c2

    SHA1

    2a274b051762aa1fc2a2aef794c1f1a2d95f0a79

    SHA256

    7ca79f34e093ca48c06aca4fbfc1c0475ada46006198fb5fb384800edce95cb0

    SHA512

    31618ae93bbefcd400e1ba489d77a49957ae00756d5005bd460e9e401395ecffcf253450e7d2861fd86bf685f71a374726aef550a19cde2d315ba417b3ad0696

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    625a2a71eaa6352b1e9281449fc5dc8a

    SHA1

    26f3955c3fb938ff68b8571761ca791442639c4f

    SHA256

    cf951f58897b73eb70caafc245bda87deeeb01fd40467d49b12b072174e1f406

    SHA512

    5890cf4859d1d64eab76d8cfa3df3434ed0ca9805f8069c9eed7bb502300981649fd3ec83deaf841a81c0eef52b5988c865af727599a23e33ca5d7008efde6b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34fd95dcf52cce7d21ceecf169eedfdc

    SHA1

    5b42b300f1f6bd8ef6ceb72bdf23b833c7c5fbc4

    SHA256

    2654a002033bde8dc5e5f840e4ae11e246cad5170e367a3009541a60a9602dc3

    SHA512

    7735de40c1b95fedbaa81bd9e597257f146d30e92b6bee3292999ce0eb174581b08b647435c576971d9628b97fe957bb1725945e5750c74afa36fc1550f38415

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8547f661d5cc41072fe276d63bc16929

    SHA1

    47689332caf7139d50a03cf6ad80710ec00343c7

    SHA256

    8d78b8b4e52e220dcbdd83db2e05759ce17d129a415686d2289d90ed42cdab75

    SHA512

    06d6c3c1fb962801b0e8fe8e6ab257772bd5f2771d4c063e4917bf909887771d5e804a9ceed11cc7e6244bd268296f1c76dd54fa483419b3367e74cefe6c9589

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    054b63f82a4b2adcbb232961b0449196

    SHA1

    a3f29ef7c1753baa089ef4e81cc7b74f074442f0

    SHA256

    6ea2143fb4195835b44a3fbe44739e9e9ca651d4ee63a17d78b2a1ae416a65ea

    SHA512

    f5c86422d886634046743424e9d474ba7e2f3b70986b782277b0871b89cb4f5e4a65a3cd31a868e6d99df00e62cdc3f95d78a400076919368dbeaf82e138e4f9

  • C:\Users\Admin\AppData\Local\Temp\Cab8E0F.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar8F20.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf