Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2023, 09:27

General

  • Target

    10_SINEE_TOOLS_0815/SINEE_TOOLS/SINEE_TOOLS.exe.xml

  • Size

    260B

  • MD5

    25232be1f9240f30ed86bfe24f85467f

  • SHA1

    a30e735ae10d83bb5f84bfbb031e4efeb247cd00

  • SHA256

    d0915abc3bdff81717a7406b954061494e3a4557d3113b2f898986eff921aa7b

  • SHA512

    4046ee5a14ed494e963707f90a6462316f14e811436bb1fe9e3a615f7da05f3f78e885f463dbfa43d5281061d8a7b26f2ff069d9330871e9dc76ef95813b1804

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\10_SINEE_TOOLS_0815\SINEE_TOOLS\SINEE_TOOLS.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ee4ae42b26b722e974bcf30c061357d

    SHA1

    ced1b4f15dea00e11f7c29687b663a00a64a037b

    SHA256

    cd9a9f480f829771595a75875bcc7f9c5a247174ba7ae259848957e9522c9ba1

    SHA512

    19f0afe24401fa93512a2a61d7155fa951615e45f624d57078411c5d3eea21e5f006ab4dcd9f9d2d405bc82f8a1ebb7e0071d209cba22c725a577d8f852395f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8596aa9de4fb28ead4de5327e9f762b

    SHA1

    cf526107621802b743dd30efe3c275856e70e209

    SHA256

    04363a18931f82d364d55e4941293bc2a50ccc2ca7df9f9f14e9ed89506cf3ec

    SHA512

    ef9b495f375e0a90af74b9f1379bbe11560bb40e6a64a66d876fce582814f9d2058d647866adcf5bb0f0bec7e6f6e707c80dc56721eb983b584b93c07d421769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51ca11409edccfd290377ccaf50a69cd

    SHA1

    2378070045f95fddfc442e2d07749afbc4177405

    SHA256

    737e7654897e9e68da83551db53f19164ec1b994c38b739509b0bf2351a3cc99

    SHA512

    dd6c4e257fd3d6b6ba1d99ff432eaa76daa267312929daff2e7b0b3f8bb4a166c197a38e5e9fefad10fb0c921fcb2ef509086fa5394d1ac34e9ec053af232477

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb6c2c3c058854acb2382cb1df35106a

    SHA1

    b3ee44e5f35cba2d176b99cc6009d238c586a60c

    SHA256

    bbf5c2e549196f558645ffd990f781f7482c8e77418b538fb9956ce6dda8085b

    SHA512

    0a87778c717483a1aa204f3621724d16f372bcbcc39ed703ffa87f4f3d686e62053172b818af8b3df58cec4603fcd69cb523b5d4ccfffb19a9ea2419f82f3417

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97dc6454ef89adb155658841ad5fb341

    SHA1

    24ec37bc9940fc9083f3740b5687500e4689c855

    SHA256

    ba4ef9556b1f05455fc2a80130ed2f68920a02c3d33a9b99469f7cebc0bdde90

    SHA512

    b42d8ad6f4873dba9ef96409e8435dbfd59ffaee6f8d7dba8cdf16995f32ab5b6eaa78a4324efe653d6f33d388e1241ee9329e9ad55a6aec597ece653c597429

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ad7a83ad494c7954dd5722a2a7be5ff

    SHA1

    4f23f5fe6cd68a5ca357b6d0a423b4dbe16da2bc

    SHA256

    58f65eb83527c9c5245a6222d3b4a712b9fb076ad7852766614b1703fe9906d2

    SHA512

    25beb4e19a4988fffa814abf7f987f30223670ab92ff82ff3222b5476e5974815badda6c27fc2115c6785d49310220b880e72caa6fc341ec31a86b041b537d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f646a670ca204dfdd43c4b0e5e91b3d

    SHA1

    838c87a7929f9d172e0e401de6b03a9e8f8a4f4f

    SHA256

    ca0f142997e71648b2792505ca02acfaea6a55756b817440d35c4c9c36aba000

    SHA512

    dcc561ec37122cd5bd98b8e95f2a450ab3d7eb9be78eee13189b7b2fd0c8538d7400b438f724d6aeeee1d2fe449cc53fd1f0652a537987fc1fea0f046ebf04bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08670c321fd7cfbd03bd2ff5bec864f4

    SHA1

    62bcf122845343fbb4354bb70115b980f7bda3dd

    SHA256

    f159635e26651c7802c9d52a753464f84c9ff463bd9cbfe76a3aee712aaf419a

    SHA512

    3124557b5e0e230f95cac61297977585d9f9ff19032850b22a50b4f3707edfe193e735a66821978e111ee4c4e96264537cda15e99f494a31cc7972cec9c39d3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb8c2a178a0abfbd81f01580ece6967a

    SHA1

    54c44f3cd243ab53d164bcd677c4f1df3a9f0d55

    SHA256

    c244b9620c04ffbf6594d6b0c9f02cd8d4dcb38427a7a563a67cf80c4cb50fbd

    SHA512

    ff402bdf2d9c6e7e03ecad77963f434f52e49c5866d61e5e77f2f1d021a0e5a3c8cf5016b753d216827e377e22302c90cf2d091d0780e61aa99420dbeb7bc981

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ddf35589cc2973f4d9ce3f426b2da4ed

    SHA1

    a185a9e67ae7b264f76a0ee5859b30d6b4904f73

    SHA256

    7331b9d6724bb26acd011a5f58dcecfaa9087eedd1ffc35064c431712df8cdac

    SHA512

    94044b9f77092a0a4dd764068ce95c73b8340dccf23c699264b9b8668907fe27fcf2adf1565b85c57cf12bee7c40190e6568c2d75000c934ebda6804e91c0d8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24062fce8ba1b84638459d53c5420a4e

    SHA1

    bb1eaec85872498f38391d15fa6572961428a058

    SHA256

    8bc938fcb922a68c0f4451925dae3c07432b8aa7e5591d6c3c19b231061e47f7

    SHA512

    7ea9697b23430735367405dfe9e92069d832c78aa5fbadf60df5f0f6db893cf6900a2795b28ae4a68b628b208a875edf6055be51db660768a1a9f9365f9e61b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67eb2aa20b7944b11ec37daa8e5862a1

    SHA1

    91feed297c5cbc817f175d0593230e622b7e3f23

    SHA256

    314846c9290f4a710423c12b40298852f910110ff7636bf5d439b9d2a447a534

    SHA512

    afa12d87f3e04477bb7ccb65065118a0477369620d05e6a6045c6b4fa36b02fc48432f5dbb65363c8fc650d8c5f0b5bbd4fa21549578d188c5d02eee2c69c989

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22fa177950196ed5d8047996ee073f82

    SHA1

    8df0630053fc0ad95033e8278438a3bb82088c69

    SHA256

    9d503fe6ed47ea18ed2480ba9703f941e008f58b9f5f08e5720700783c1a02de

    SHA512

    d1c9df26516702b62e52499a5e16186433945b0e3b5dbf8ef56a4762513bdfcb9bc3a5ae2e9a70a7ca4eccdec082090b1d79568a3678c070adff9c64a9412817

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1855f7b090a6b97766b1204a83453bfa

    SHA1

    5666a4365f0e405a4d1f222627f74efe15cd6d87

    SHA256

    8e60a52878ae83837c21f3f37d99d7cab5fd7451bfb122739c869ce9861c9e5c

    SHA512

    ed69bb63e4b739a0353c0201e7f3bbf7632900bdb950cd9bff09d2718fa71f2e0bd991a786b32ccdfe206d85f1b56386e536082dfba4a8cc1e8c65fcf604ed13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a9aa5457830cf55b4b3f86c1d030006

    SHA1

    39b998f729cff2012bcbcb275497edbc9c113d0b

    SHA256

    5cca62d55dc000778bbf6a4b46108614b1d6b973ee3e38ad81e56e2a0a591464

    SHA512

    24e6a568d4868b3605417671b1c5cd3c07862e9dd05bb26a3589071e72974881065ec0c295fb83cb240c85f22be6b8469de1f9bb6ec446ad2735b4974dc0a689

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5c184255bea3f6667b59b50c1d86c36

    SHA1

    a75240d71d09b24803b797042463bd1225752162

    SHA256

    8732adaa925fa49199b787dc0b3d6af3d65cd4aa06d92d9ed97dfc33118c5fa6

    SHA512

    7409122edd8ff84075353704a8fd6ede07281bdb3c73da9a1b0641ff69ed56709609f516e506538e5be1fe382afd42de7902f7f1e5686f593e832d8576a4d5f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58ffd28382064e2b9b7483a4993a23e5

    SHA1

    068414195eb1285cd6a57607c31d12c3345a1803

    SHA256

    79b7d5e205093dbde05e3f545f274d3c405504df0512a97996c7aea954167c92

    SHA512

    830f26e0888da041a221c8fb7c3532b418bd238a284e91e4a1e590cacdc08eddb4f883168f0e5e618482341b727e121155e510e3005ace6928e2401ecd541bb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9605f02c4ea63698391160251b418f5a

    SHA1

    b6ea4f34d7016d3c2002583a5c291d84248037a7

    SHA256

    aed5ffbf0bbed8914fe951f9f813cc31bd2c549ca0ca84ab098bb56a0f728064

    SHA512

    cd68260dc3de255218e5d8e7df4d32c10efea1f43587bb044f91ec1d99b92f18b353be9350040db9deaa7d83907f25365e87ac9ff098a0f09405d4ab8ef8300d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ebd741d0495ecd529eb05c0afe434123

    SHA1

    c7675722a4f7d35853c6e56ba50a92a6b081953e

    SHA256

    d856eae2596cefcb3b895cd01801572cc4d6bd15786fa0d779f0417b8376d05c

    SHA512

    8b2cea3c61a8aacb6a1924f8e7a6eb43d9f13981f945bc99730158b97f30105ecfb131dd240a12def97f56adbac57b504b55edb1ba02d37e3aef7c3779766a33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d821251f396539e45418cfa355f94ae

    SHA1

    45de4892d40e4f5b3c2633e53b8e707c66de64a0

    SHA256

    16a76b31317e45fafd22216df35b2637a1a1dd977cca6c9e149d07d4c81510ff

    SHA512

    542c2f93ab44360f3ea59008c43a616d4634b3b6162ad8cbdadfc25afa324f82e1105285a861ba06edec2903ba0963b199064486a7d11b078c83245b9eb17e5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7e7becdec31a99fcd865fdfd57d43b6

    SHA1

    9b102571e2ccb0bdf4636887f9a6b67f0ddc9f59

    SHA256

    559cab104416828a17d4cf7dc464bbe704b39d25af10acac1119671d8036d91d

    SHA512

    9c7d87be193fb7e8e45683c82bac43bb07d8298bc5358a789496651e6f380105db178a047f02f122b7e96cf4df0490c745664fc2fb312085be506acbb208422e

  • C:\Users\Admin\AppData\Local\Temp\Cab6654.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar66D4.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf