Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 16:54

General

  • Target

    word/document.xml

  • Size

    25KB

  • MD5

    515b8b95348778f069717cf78cb6ef30

  • SHA1

    3a37cf9538793068e697048fe91df94bf83ace7d

  • SHA256

    9f35dc286247e7d3a03e5b3d7b91f4ff97447869876236f09fb06cd15c6e8ab6

  • SHA512

    b96d61f34c49f8bac7a115caddad0745a52ffb35fc37fe44cf867c191ad16645852ef9bf6f4b771929f6c2a92aa42c7b23fbc9c02914e91298585f4734e4b974

  • SSDEEP

    192:sFmmY+ZsAZbpL9TI9QhfzmTjCYjpDe1+gyeUb:sFmRGstd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\document.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    252398b36bb9cea3c895f29736854f3d

    SHA1

    7fb276171c81b80e74987b0b5a616484a7430d18

    SHA256

    a730defa66fc6ce2593b076cbeb3c5933baaa5a6bb60014b9111c8fb5247fa7e

    SHA512

    c85cbdef52f9a4b3559bd9a9f6e1737bca8fc74e9e5de20e26cbf1c72c1617e107624b38417d89274ca9f66addef5ec875bc8f6841f8a47ba17db24bc2c8c643

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3061456c8e23dab6437de5a5b965386a

    SHA1

    3ee386ff4504174aabb2f225c2726e16132d411e

    SHA256

    7762f484534b6581283f276102b44bfb9e6ec2a6026d65d5d0ac37219dcfd9de

    SHA512

    06f9238fd3f647293339c9b08ff8be0476f605b01a222c096dba2ead5760c371b9290ab3e3cca0dda2b462213ca1814f543bae4e871b86c628dab729a8442e4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32ae113de4d9731033587b8c09b33ac0

    SHA1

    080d85c879360970561712892fd922472697156d

    SHA256

    f99c14c4809bf852c0f3886ef608c84eb0ff5c54f7e528f4c00d49e3ae67765d

    SHA512

    f38af007ccde006eefb2f4b4f8cb61e313d9a2ab3b180509a9d916b5bd9f2591913c946231f0cf5cd3aebe900c0b65efced2c8bd346e8ae2b314c37694facc4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06771b3325ada7092d89ef65e25795b0

    SHA1

    abe21fbb4ae6c3a698cea5c964d35998d63e51f5

    SHA256

    ca0591eb463b23b6e053d6508133e44f535cd5613578cc3e66446ab68fb8bb98

    SHA512

    5944ad5419b4881932b82f03de4b4ed54aaef41a53800cc6c61ebff6da0af993fe12ec6e288e91649cba5068526337808128317e9d7b94d65c6f32df5b630b50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23f973fb26a9c938dfc0b89f4b7e6177

    SHA1

    d099a88fcc9a3327f2c8993e507abc54224f5c5e

    SHA256

    89c7692db822b02be9ea341c3e40a2e3984aafb942f2d216915f147befeb7b59

    SHA512

    fed73f2d0f4f743b74d1d19f148a455b1efe5903c980271ce8eda17aceccd5a07a2b04ad2c9594278eb21001d3ee89c9ec9285df94527bd95d8ef50d20f8bb8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd2432cbba8183eb0914b871fde903b0

    SHA1

    2d653b759e9b2c9d61b630a44f631eafd62655e7

    SHA256

    6f02ace90b62f00649561f743685018ffde5cb95035447076d58d5486cbf1527

    SHA512

    ee8c10b2a97c449027a66f5a7a13a4ffd4850834142dd425712a59a7a41ff13cf33383d88548414443211b20bd90afbedf312510fdb88506f9d4f0a089e7a1c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10ad6196471f9f3eb0033ed38f11a8f2

    SHA1

    731b3d20ab09937129873bf63e3b79449509ed93

    SHA256

    1f9cfab6b053c9882840eff9cbcb9a379af6807d0846f719a4ba0455afbc8e38

    SHA512

    9df9297b70d9c34b7c607639ed45ec9730efb700737d6a9fd34de98ecc2e1edbf498dd53fb7e2789cb7a29a3d6a46099484a69eeb07970e40c7afccc426a72a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c429afe85de1d6d1dbb7b28483719f38

    SHA1

    7534dba10b33aab70282acdd76a91c00e0afc189

    SHA256

    f6bc6d3d0755e62d8ce477748e2703065b1973e8fd9a3d657ae80b6a68cd3a93

    SHA512

    4629926b21bbd158f06de2258916941cfb13ceb86172a4d962c5cc8853c0573e9279d98750bd6c91b4aec4a55577a7489624997bbdbe93b22a79601fd3a357bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70fba7b88a4c94cc18178d7a39d58fce

    SHA1

    0d38672c5645ebb0445abfb7d1d5884d702c9eae

    SHA256

    353be376e376d9c7014e1676bb0f938198f0e6662389646522745c845aac9884

    SHA512

    af3d3f5b14771ec36b1f0736fc091fea7b85b43a4664d4a07c1c24360ceef9d5c0d9e13efb055890081142a7fb3b070f91d0b166e307ab80f09b979bfb24827e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89b2144cfa212996c184d4711ebe7b9e

    SHA1

    56c276a8620f7d105cb6a67c1454f088ce6d6e6d

    SHA256

    e3bd2eea64242ecd5736a8fc9c6ba8b02d5431deeb4408043ff34a9492eb7ea3

    SHA512

    5d13647e3b227b6cede18ce7b0d51a72cda7008d3c998978dbb5ba6b95425b52bddcaa1564cb3582f3ce467be62f5ac6b046b00042fc58438ab1e8cefb271c41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72a92ac7fa18da1c0b5d228ea5e02497

    SHA1

    48fc6afbf0f8d5432759c856a9e1069d3b791616

    SHA256

    0b7fdd3517d0de33749fe088849e1b3d43744145dcb766f2ed5dc8a1f15e81e0

    SHA512

    89a61cf6f4933bcacdd0f8d1993bf1a9c071fcd9abbd0c33cade7954dfd4045ad74af8e83f3d80459434fdfde060a7eb371d4482be4bef7bdfb7ecb8a9a67225

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    caf78bc840ea35f0b4cf2b8d9f36ddb9

    SHA1

    90b9eff95836f472f2bd51e6553dc8545e5490f4

    SHA256

    419dc53be5e3eb6c790e412fc5dd6a6dac8d55d5fa0f78677a42f799a8f724fb

    SHA512

    f20a7c9c18330af48937752154ce82e8a3b29bb041af209fa0a37cac0b0212af7155e9fc3cd319f5fae2a953ccf577a970cf426806126401eb5192eb9a1b4f9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7948fda099c2fb62cfaf53fd32b7d650

    SHA1

    47b641a97431feb75fd66b8c57659211d5f6336a

    SHA256

    b5436c6a97a26f0e2b540bc00ceba8219f749622b4bbb4363988cc886b71128a

    SHA512

    50ba79908c22e13c3b50ca44e271b10ca238f2208e07488b62c17e44c27b23e806ef7fa68bb5ad19c81172b1e604c0e0cea9448db23c17d7997ce3428733b92f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82d848f2ce8a7d7c6f662088fcdc9bf6

    SHA1

    b3ff4136f7758314b9d734a315c2576aee73da7d

    SHA256

    8a6e1cea93e1645030a3e8305d74eeb45923778588e2916a6c252107c7aaa408

    SHA512

    92dd611943ceb73941747f83b516b0605d16baa183b91b350c449656add0a054668fb0761dc30d126a6756c0911c64fbb88ce818e95825df12183076857a70db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c8c8337e53d3dd09c28973a1c7ba429

    SHA1

    86756f1ce3df857e73e860c8600019a38bf584e3

    SHA256

    634bd5f6a8022ac9ac144f5b93af203f21cf67ef52fafb7b95a4fe25976e1b65

    SHA512

    e4dccd7c0b32fee10ab14fa9389dbc84a025451a0726898122aefe23079d06ab4b81e37193d9ba238487a5c4053ddea0055ca628d2d0a7d0713f8f1413e6d735

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6a9caabd6770b1b77210a3249a31e39

    SHA1

    48eae248b865d575aa28402be33127e4de617c2d

    SHA256

    0202f3295ada6c70977ae21a60e8e61508277bb3bc9179fc03d1e6359429f1f7

    SHA512

    a22122fd9325bf470d88a5d0cb36806720d866f65ccc07288d3c68f47eb959ed9a19723d805daf5bcde14a9c0dc24883d34326bb46bc9d8f8249eba01b7e6c51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e083d0d1aadb425fe76aed7a51575821

    SHA1

    29e7b6220a75b92e5b9ecc3f6a0df970add7600a

    SHA256

    8bcc28f0bf3e6ba6877edb1487e05e10d6da4d029b1cd9d90ce321bab8cbc40d

    SHA512

    0621a063b350b8f4f60088393bcd217b0b6528cc729a87b114a38fc4743dbee95e8afbda72996943fe1b19d27a90089ac9c950301bc543e4558b6d00c011f426

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c7a0cc8c2529e2b85aed52041d9d1731

    SHA1

    56d95dbc8c647a0537455612e34fa540dc2f6bf5

    SHA256

    710b796bf3c14688d29f3d8c18e4e68987ec48cab287151355ffaf7c2671b3ae

    SHA512

    fda60149ef8a1332cd2529cec49b2715fca97e1fd26174ef13f1177ca95971eb5909cd97409d969d9c5c24a4c0ef92035c4b469ed51b9224c886b64640e66673

  • C:\Users\Admin\AppData\Local\Temp\CabA98B.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarAA2A.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf