Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 20:00

General

  • Target

    word/theme/theme1.xml

  • Size

    8KB

  • MD5

    2bc1ce59fd7b0a0b8c0c481440aff611

  • SHA1

    3af65e014f0aacc7a5070dd36206b33c324ba156

  • SHA256

    2760e6e84d4bf365af6570192dbe9cb57bb32653388d0ea041d116b25b1ca0a2

  • SHA512

    cad8e8f90aa4ee2fa6b4e5a9c20ef0f876ccc3d6d2f8978f176308a1e3a8c86e57fc0a505ab8d22a89b60b467ae5a6e844613603e192d965564e0583dd6e5574

  • SSDEEP

    96:xLM1d+8FNk/VmWHS95EUUwctUNoJuLIMFNk/VmWHS95EyUwctUNoJuLla5H7O8jE:xLM9AcCnGuMBR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\theme\theme1.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0bd1b597a54512e563a7f0952742ef26

    SHA1

    2cda5760bb35626bfa2cc86d367252d774ae9d23

    SHA256

    b7f4189b332d796a1f38c78bdb9ad8fdfeef17bb3ff293a419f444a9ee8f8570

    SHA512

    51e98e0f0a5815a36a97fbbd807eb4a32c6849660b64d0bd6166456aeb5b331414e2bb252052375e7b213628091f43dbe03dbcb91c0a4b278eb0de98df6c26e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b38ba052b77ac2653e0f7a01736e8c20

    SHA1

    a41ce8fe75415988e1764b9f4f8c3276c318ae15

    SHA256

    29414fa242d7c02d99d43fa8755cba2a3247fd530b9d020f1df55f8a8027a249

    SHA512

    e0ee75b177b9f313158573fc646905fdce66588392e9ce46ab6a09b72a1293a8549bc52412ee857f8dbc3f29897f343742dc37021907e9af799deeabc32234b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    28813c4cccdf8c5372368b1f62eaaea2

    SHA1

    6a5d1986b3abed6e060ce55b83010fb03e223a28

    SHA256

    69f382c8a52f762b27f55cccc516129c17ddf2da277acd8e3d029c2d8a5fc28d

    SHA512

    c890eb6ac0d5b5fe972590e30f22fa10f9c1db416d8ae94b44af0aacf71892cc2c020e67b177beb6acabf34ca6c6c754c37eaf9e68194036aa11116d1ad4b259

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9d1a0d9be4a02b5998597e4d40acfc4b

    SHA1

    41969eafa3c288f6790df635e7273e417abe3ba3

    SHA256

    8b371db3358741eb1234e40bf83ac5cd5b4e61971e1e15b8d2e16c9a6a277c13

    SHA512

    0f97feb46c41cbf5499b12fb5f8c1933c95dfab6518516bba6f5f2e9fef97dcc651e60806d4eebd800ccf6133c6df1ee3bd3fac3d5dd848d19c944284ca745cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8f652000d3dc486636650669dfafbea5

    SHA1

    d458fde85fe121d0a074d305f17d61d66a0afa7c

    SHA256

    9525091f648b97bb1d0d36fe46463f777c86a0f7ab342edd347cbc30001d488a

    SHA512

    76418a7e7182dd5b6fc0d4e8da9c2440378f1ef51a6bf90173be768059cdb80aa554dc18def973e5e222023d7d9c5b66c94e60f4d06dedd8c316e20522c43b3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    87971d3ab38a44cc4f7db5b54a9c3d7a

    SHA1

    c541768fd70ecc29bccecc782bc169ac42a01560

    SHA256

    f1cec329a674ad4be8ff7e32a13376a6f259d66ba71829a7004cbe5cbffad8dd

    SHA512

    d223edd9a3d37bd140f798405b3ee942181f21726f9bccf430c96e8cf83fb111b3a5a12f117bde3c2a60ef8e636baf8db1a3bee818cd654f5bbda6764b9c2f49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    545bd7140910933ead60d55fe4418dab

    SHA1

    0df3886d4307d012f6225a4236cdd2da4094fc6f

    SHA256

    35c545d2cd0a19e121c53c4fe6c6a4d01c33e4ab6c288f7db85353d667fa96a4

    SHA512

    a53fc146088488e3438128c13d466d2a76d98df1bb922cd20c03a58d0b6bb288d9689492faa2411fcb6ad10d5b65a817e2f5a61711b3cb63e04de97194fe20a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2f892818280b743c79aadd44b374ab1a

    SHA1

    20d30bb4d2f2da0349941004db59c86d43719322

    SHA256

    7720fa2be3845f5b972b8e5a4dd04ef49e14f3adddea6c0c4e3ef945444103a4

    SHA512

    c8fea2c7c59a780071a67db40c06e47a06b75d2f040032408ccb0f6eb948e23100f28ba4f421de88ba2256731dce793a6fe82b34de07444725ad91bb16bccc34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8f364434c8296ac1de59be345fadd1bf

    SHA1

    c365ec19ba9bdade65abf7c7f3b93ee5c4a23f0a

    SHA256

    a21e56704cece16b96e784fbea77f86f7d34a17d6d4f9072bcf2ec4ca7c9ca2d

    SHA512

    c2f6e14734cb4a891627954b0713a994a714bd71261f4a2b560de7864ff649b7e373cd0009df0b556fb3add876e05718d59b9d1b395f6b6c72c96ac2ab1d81d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b9dacd486b9ba20dc1095663064b826f

    SHA1

    87779f8e9838001b5a31f0c95fb0c1dc673f52fa

    SHA256

    9a9245a5582105944d1e3cdef538e5579dfdcc81137a7288a7195e64e8ebd1e8

    SHA512

    f0fb3bd751b002394879c876d3ecddc514fd28babb5a40574fd9368c43a6daee2e4215248652f4331576e5f7ce9170942ad3cdd88b7c12b3a8f9b47367502526

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1e415da87a4c9176ebbc007bb80b37dd

    SHA1

    0b3f8470f591ca85c87af10f4e01eca12b29aaf7

    SHA256

    e6cd3b53e4beb7a66d2189b80cf2cd3d4ccd4b1907ff2cddd28d57ae4a080d87

    SHA512

    2af7486ef98035d13a5a8cf22d345c7afd67fc0db989b3ff3a2b81e22365854bae6845ad2ce2705051c430b7206add18c319b657ff5e99ed66b5cc8758407713

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8bad2d49a621e10a918256d030b6afeb

    SHA1

    c8b72eb8d11494225b98704700f9d532b23c5817

    SHA256

    426df7711a7f63bda4875af5fec9277e7e59784b1ea9c60e04632caa73800eb8

    SHA512

    1c83af4f2e6591e6b60d5d4ddc23ffe6312074a9048b40c0a8adcc3276d455c30cd05e14d494a6dc679240f7f91f992261103e9c6fcac224c023466b1c07f365

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6183d96bcca831ab15ec7e4d475367c5

    SHA1

    fa93eda5856b07536c5bca77665451f9d572deac

    SHA256

    1eaf4b0a05995756f1c11b31fbb033637d7657ab4714a33130ec2c3ed87f11ef

    SHA512

    6982d1b3d7d3ce94cb57c28bd26990f3a80fec17f634ea36c316f8bf7a834d2a6e08b3306842d77ffa8a30b66cdfb696571c0c3d62f2841951771761ba4ccd94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9d70afe088827fa6ead2587cdc057bc2

    SHA1

    fe96abb12659f0aec1517e4cb5cbae620c258464

    SHA256

    bdc2d5d1133890431239de48ddd4ce60de651d27b594aad79029e9b403cf63cf

    SHA512

    74eb5008f11ae247555275186f4f27d2bbd81c31e1ceb3f39577662a23a7e242ef9623fc0d0a9602a68f45552830071c5772f7bf3fc22de98eba1ea801a415e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e0a537cb0e7f9788a7dc764fd31ad92f

    SHA1

    e1144039ea63d240f132471dadae3847274cd551

    SHA256

    2d142d578c3e4dd083ec84b7a61351f876d0c5b0da970ebfc97bf9596f872b83

    SHA512

    b8f9f2341ebdd5fe8b25f132f9ae2422016d2331696e8a6a8c599c86da88aa1b1788b7fe50f24e4eb37902f345466bebbfcc75d34f85b4040c6af9fc76aec40b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a24b673a7961b229e6230e11be31b255

    SHA1

    eb105f9a760df880967346454cd0ca40661f7050

    SHA256

    277b2b891fe07344ea593eb2260c8ab0d435c64e0d4602604713e816b7fcc802

    SHA512

    9ec07ff0d3a59b5f3b1b25270b8b2f778bbe668eb262d6b16685a4f0eea5b201c1c587e38c2bf030c061c3766d55b7ac6d13f61d7ceffd3081c62a35cac11cb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3c2f91289f47c756c44b8e556f709491

    SHA1

    f4d9013fdd329320ea11e7966078e3d933b7c6b9

    SHA256

    290b226e029848e125743192d1180c665064b31ca8b337532e2fc066e4ab1cfa

    SHA512

    c2393932705301eb4e4d02007adb7eb6d743cad1a15596335d40b3c7096ca1c801f42ecbccad25e7265328a908cd4f671293bd35490d26aab02297472158761b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e1f0574ac8eb743cd362c6ebfbf216fe

    SHA1

    3f9435164819fbd66d51a55068e593a4d821bdaf

    SHA256

    8741ca6ddf7b93c5612e61ad1f15f5b8507cb96b42f257aec2870e5d51ea8922

    SHA512

    1339092398e1b4ce5e04b3fa7fa1afea39296d90434677203af1e27eaa14bc42bee91eebb8358ce7e0763ef90e501855e9b53a4359d5b7fcc0bca7c9f85d3be1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    90f470043fd9120ccc3bd0a64dbafd9b

    SHA1

    0742871abb8ce4f7d61331af5903c952f80b4940

    SHA256

    56e4ed03f01e816644a3458e9a4089f95e0641aee507efbf7b6873b8352ac67f

    SHA512

    51e515e80c3dfdfeb2ee7beb8c934fd50677926cd27ea074c4a14bfa841d48f9adf401402d62329b23aed16d96ad56f8d5f77d68010e0761863d0b339f729a07

  • C:\Users\Admin\AppData\Local\Temp\Cab7B7A.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar7BCB.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf