Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 19:01

General

  • Target

    Loader_Guard.exe

  • Size

    1.3MB

  • MD5

    263afcc667cf61792e5ad64481c4a5a8

  • SHA1

    1aae1c22d71c28a1437e8fff7f41ef25c2783b22

  • SHA256

    0be679f2ad2cab573d4eadff74a6aaeeb9916010d90025f099d00eaa0c46ff40

  • SHA512

    d40de8d7a2e92fa4b5ed73d89c1818f9186757a41a3a15572622d679c503568aa14b084b82ae08f69078fcc62d88f7a1a8056183a4b97a6fd7a1f6f8ae44f88c

  • SSDEEP

    24576:yGQtTYlhSOfKH1NLgQy2apQR/Yesl8d944HcmM0R7Di4j1a7+iW+:yGtlsOecQy2lFYTl8dNc4K4UiiF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader_Guard.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader_Guard.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://blammed.pro/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 1676
      2⤵
      • Program crash
      PID:796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62cb6e5a8d7048385bcb362991edd78a

    SHA1

    7ad4e8690536007aab05742506ab7ef8673f40c7

    SHA256

    4f0ecf473975f9277b034d596bd5eaed8d0c98d8af1469982b9ca3054c58d95f

    SHA512

    e928d669f1693dd86430a4c58c3d8c90c9438e3cbfebf4a86cf3ffa312c7cbfbf6492c5130141226aae31dc6bd31edee0b3ac289fad76f66c753f142d0e45dd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21c1ea7ea5b76100851aa2e50dbc37da

    SHA1

    691468c19a3f1b880b1de5dab457cec75bd08f75

    SHA256

    478629a49b2fa0ca90c611d8caa3f893d08f5415f5b168121baf0f8e269ff5ad

    SHA512

    b43217dc8cc889b481014e5d4ee5902d1fd01e9f3335acf1971db93822dd2f1cf1cdfccfa8ee34ee32287089e01712bd36ced6c2ccd89ff1ffd327b980022787

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c971d83f98fdf2d4f04d339a86662704

    SHA1

    05c313d06c333a49942b91360b9436f04688f095

    SHA256

    e5287bb8ac291396a1caae910a4713137127cbdfbabbae2c0350232897e45952

    SHA512

    fb092b4e51c1720d4d463bb48575d61f2e7b7b93c2729b151f6a5ab16a7ec1d26d0c639ec8a06aafa57ce56409972b2170f779a4d64a73e0543f9a1658df4144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b6a963a9abeeb0c76bf02618f7e700c

    SHA1

    54317ba14e94a1b944ef01b44a0eb7ae3fc34d2f

    SHA256

    67492bea00e3a44a7c7a1e382f9ca33c6685676007023d77d763433268620b42

    SHA512

    de9beaff5f2d09a25ecb9125e1c5cb658e5a94281e68059e656cc9d0b04114aeaed4834bc284ee4d81713ec9da91cbb5b8085cc2abf5226aecb1d808351f128d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99d8d6efb5f4d072dd179ec02c7f2a0d

    SHA1

    26f6e4cbe458a57d5af921295cd77f6a593f2abd

    SHA256

    0085834019875a935441281bc3861035754b19f3f8e47f9932b8532d8c96f024

    SHA512

    668107ab7d78dde0a0bdf27187d4f10cb635e2e3fb6a373ad767df4b9cc62085fd66d389096d6a056962efb7e5532d40b7545b1b7df9cc1a2dd82c4ae362eb6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33b6f7ccde6f4493aad07b5320bb9ad9

    SHA1

    d932a4bb719f03dd5f250d2f5741100a9f9ed9d7

    SHA256

    0beb7bf822a309e0ccd6f4ca12740b1399b405feaaf0474d2892d70b4a670b5e

    SHA512

    9f1b4fc80a246e50c24c82c636b04614db62e9b67ea4693aa3fa5d800d0fbf6c7390d09de1cfeac8b523b057eadc73e2b16ddf3a0d59b4f0d29fc7732a21569b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    793e665c62c876b94e3f98bf74397839

    SHA1

    381662d6704f62309131e6cf1176ffdff0d3d506

    SHA256

    ca06323000cda2195f685c3b930d0ef095958ffb894197418e6ca8da2637b057

    SHA512

    9f387e96925ccc8c7475b51f63de49a161fdaea3b633f0e552a500922e1deb09f0e90eed05591ce145bde4821281724dd309f41749bc42ea93b00d0304014eb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f34718ea1af487f925fb4526ba4b178

    SHA1

    8290086d85b191177e7576b2c4fd6983bc8feb0a

    SHA256

    84ec4960324643783d6d0cdb409f272778511700e0639ad5ba54c729dc8ed2f3

    SHA512

    3340c589ae68d76ae0931852b47d5956295f53f02a7b2d28eddf908c41ae75bba2da006807cd21096a89e93d4aff8352d67bfddde6de4512a41305c0febadd77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f36c79e455639ad7866bc78cf203fcb

    SHA1

    5c489b15e07b1da6268d8b7945e46d10c44debcc

    SHA256

    eb2601aa120a4bd6a89b73ee37c513d4b75dac5708cc610397b567fea1127dbb

    SHA512

    539285e821fa8696a0124710b190973309d559b73e3363c612ecd9aa54eb5d1b63ef980bf18cc7485728dac64a35075c68fab6cbb61897c9136208b75694e9b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ecadaa49b71568041dccd731efff354a

    SHA1

    16ef471df173c89c88a3fb5bc203ba46d28f2e55

    SHA256

    3d326a4a6a9fd6892eb43fb69f9d4504527bb420556aacae99e3da1c6c072adc

    SHA512

    474dd73b687d427ba9728a9300aff46a957733d17b95ba30e07fdf4ac49ac320e5e87237a6669f07a8b13186c905eca235da0c38a80e4eb3a75788c0f85feff4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d5367d7052c8786bcabdff28a0f3fa8d

    SHA1

    ce3d152e2670b057ec9f7fffb3d25cdf52a17245

    SHA256

    501ff72b3646f5f16bffe2589ff040bff80532e26e4a6727ffa53fc8980216c5

    SHA512

    e2f2b61dca595167929bf2619f608bf8a571331ab1ef7ffbf8319861913e52a75c528dbe631875049eb109f24ed98ea9e27196bab963df4e5dba76ce1ca036e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df8ff708313871c5da6c7d3cc7562871

    SHA1

    5164163ef9bec534e16fc2a6776aa706bdb1a5f9

    SHA256

    fc2bc636b9cd5143324c172e08cd3d0687d06a831dda8c0787b8c13c6283a097

    SHA512

    ac520d1d3fc20650e39523ee3d9d3dfb3ab6dc778c617d495e6ac6599e3b1931e7adab91ba6be9c909870b94b46f83c1bb64ea196a046f893403bac38422c658

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d21c2e00185704e25fdb9e53305a2da3

    SHA1

    865912022cc8445cbfb60abf0c5134e581d9e472

    SHA256

    6e7478b578e8b05264cbe76f609d12d4974007ab9310d391a1984a172f1638a8

    SHA512

    636bec6cd26e0110f80a12688ad4b2ffc00b11fe42d31609d4c4835c15f7ce1b6a11f9371340db556b6856ef2bde515d71a2f2eb93cc4a02383d14c54ce25dd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b14d54aa3160710d04f0c97f605b7719

    SHA1

    5173cff6208befea93f6e2d4b66684907f84095d

    SHA256

    41403a07d2d5571f236384680a4a7b2bb9005eda499da14821d8ccef5c81eac2

    SHA512

    4dea48b71fa098c68ab4a9e3cbbe79269206e4c7fb8a032152da6bc34351360fd2d4180439ad19776a5db6f4d2126ff524a93f5bb9037ccadd6b6bc234dab757

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    025e7cb6f8dea54650026e3695c67cc3

    SHA1

    867b5ac88a16b93efdfda66c1c91b4b566b0ba8e

    SHA256

    28e5a227f54d5647ea9839c6d1dcdf4343bb3756307515d5b33a4a0d95dd43f6

    SHA512

    2bb787219db1ab4913e6e14ebcd4d87830c7250ec0396392048d783005fb50548525f94926bdc54d37d0fc9dc87336d210c49f22b709820f6850f4de795f72c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bab4c9939b998d002de8bdb5da9eda4f

    SHA1

    11ca7b91541b9a7e660003e24897547433306647

    SHA256

    2a12eff1b3bd049e70f1e72f1bceba6de7ea936ed69e8ae4cfbe84917e4b0d2c

    SHA512

    a6c0ae88746c7b51e023e2f100a42075ef32b2ab4ad1d43a7c09149d67e0cd89270cb17fb51bd188c9ed110032da7211c51822487047003dd5a63b566a498531

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c170f6dd0703d984b0cebd437769a36e

    SHA1

    26039174a0df85f84f8edb8511980088d2d21b90

    SHA256

    b4512a259f5e104f930bd1bb56b064d2024d22067295b2fc1e83b18b3da98f62

    SHA512

    7d6703d9948f4c6430123c2cc4bc5138e7695dd538d7b991fe5d69f495a19aadde65b26a62b3bff934f76fd8bc2b2065dcf53e22298f15d5775795dc93218204

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fc4b7bf30201fd944ed1c640c90a882

    SHA1

    706f040b4f64b340128a341559f4761d821aefd5

    SHA256

    29196912dd5b66afbff9a79478537e80a1fa8d83cb9e71aa0df8234c20108661

    SHA512

    6e26f1e8d778fd9972b6dfbbffa52a3c58d8447b214730962f69291cd95a529ab42c7350c7596d9b6146281f6bf4fbb79ff8cfab258b06cb0afd5f7e18d65637

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5a6657f521b39a74b6eb1f090c2243f

    SHA1

    ccf96427f79ed983e346d10f1b1e600b40939638

    SHA256

    af797da4f909dd424eadfdbe18685f8ce620ccfbeb77ac150040f3e8bc5bf670

    SHA512

    d853fba4a383391b5dce9de10db6b704fa545952fb342ade026cbe70af00f30243539214acb8e202ae27b62d99caf85f347f17b75e93643da3c2c20b004ef1d9

  • C:\Users\Admin\AppData\Local\Temp\Cab9926.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar99D4.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2968-0-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2968-1-0x00000000012A0000-0x00000000013F0000-memory.dmp

    Filesize

    1.3MB

  • memory/2968-2-0x00000000011E0000-0x0000000001220000-memory.dmp

    Filesize

    256KB

  • memory/2968-83-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2968-337-0x00000000011E0000-0x0000000001220000-memory.dmp

    Filesize

    256KB