Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 20:00

General

  • Target

    docProps/app.xml

  • Size

    715B

  • MD5

    dcea92eaf331727a10ed1cc8adc8b57d

  • SHA1

    fdc314fc1992a8b36ef3ac96f2f84e7e8d4c37c1

  • SHA256

    c1cd32d3451667372029ae3ca828938317da9e68bc6689495c2690bc7e16c38e

  • SHA512

    cc05e2c90a7a3d2e19f30051a4ca5e151800a6155bcda9c22a516368f57ecc58c1a152bbc0e62dfe1915126363ad285e912a86c2501a0aa3521027c3c712b3ca

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\docProps\app.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0bab40f39714ce341824adc3f4d9d202

    SHA1

    da77ad5a6ab2ac1b8bfa282928a1371f4a4f1917

    SHA256

    f1b7b0ba0ca3002c4d762061eb424ca41aba13f12c8951cdc76933431a39ac34

    SHA512

    3d9f4d58c573db9745fe52cc897d54d8a5f5a886948bd1638591f3b3eea77009edc10f2e18e929dc3b2761b659457adcc5207d98ef19dd59641c00f430fdf86f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8372bc710a0e4854f4c5975de189cfa5

    SHA1

    388eb2069dbd19cd69bae97ba898330c2d72c45d

    SHA256

    2c2cefe7fa839e4b55523f5c6705e3749e6569aa46a65bfc2337f43cecdcb988

    SHA512

    4ca6a6035ae0a0473b69a97f59d40a33d73582d20770a37dedd9657bf453ca8142ebeb28784283e4465662a014b779d68522755bbe79d8e8510a72a2ccfbe896

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8943b565e3b81d76df6aa6fb97ec43f8

    SHA1

    288072943e8e4ad9eb095515c0326fe4a0a5b6bd

    SHA256

    0e78f1e076a68df1a7b9ac4d6d23c9a38e6c6a6915166fe018807f880ca72191

    SHA512

    f0db8bbc40a1eba9d8489f1ce4e27daa243ede8be9338fbdaf174203348e1890c22376e48df9d93f4f4b525ddf930b81c2637a98d6a69065dc5e202aafe50775

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4638daaed53dbadc11eb4c1a6adf3c4

    SHA1

    b6c863c45311b64a8129a33eb91a3e2affbf928d

    SHA256

    6342c9acf50dea27c93fd4c82215caf49a8176de06eb8bcd61dbd83a24eba77f

    SHA512

    c9c3c664a729c5df09e2f340f88b6a5ff2cade667a4c0baaae57991fd55ad317af40cd4925f52691fdf474ab6ea34ed336006347707478f29656c15747b9b211

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1e7229b4a625b84165e23eae1c349f6

    SHA1

    686af78b91a2f2880568cac997881cf0cd485096

    SHA256

    5c1c977c6b888bf791a9a469932c02efa532e67515c280761d54b34d64e962f7

    SHA512

    c7519d94c8a09cea512f596437f9fff62ccb44c7b4649c65173a75f6283e01dc4feab1f3453e0f8f8f42388846e2c1d2624c627125ee427ebd3aaefd454ceee0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f5ec007ffcbc5f803e9c20efdfdd414

    SHA1

    cd048dca23a163d45060a3a1330334415fe2b5b0

    SHA256

    ee3a64de37bd5eb5fd52f63a14229a3f326d5ebe2cd419df32b52f557900a175

    SHA512

    04b55bdb7be738e077e8bb912e4b4d85b3d1e28fa31137fcefe5014f94ef229886dc393a0c2f62a40b8660e3e8bc40bb9452382202ca42e3069c450f2570e560

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b7cdf0167c9888c93649ec524d3a652

    SHA1

    870427d392fb283a2badb5f050aa2386e85adee1

    SHA256

    809854ef343158c575447adaecfe0d3aecd2e7715acec365ecc2b34b98293d40

    SHA512

    f3c4dad51a287791991dd2aa60c5e199bec4a3b4a51105f281cbe6f7175ac70b85e3968f049a6d24aea7fa4c9e2a9de6053f0383f4a4b3ae82d3617812adf3d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dbd1a6326a878e67d99d88813f03c666

    SHA1

    cc113b0990e1bdf5ea0fbaa63903e06c3b9e8374

    SHA256

    d9432dcfe74aa9690a1276c9e99ee1833cf12e04d16b0e1d6486bd8c821fbd52

    SHA512

    c42254cb8759c1348959bec18946eef7a5cce9a686659ea412289b7b936468ea39993d534d0cfb38c1730fb6e9f0d8dd9e12ab8147a3fc78606414ff9776c936

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ea6ea4c38fba812820fbf07bb8860b3

    SHA1

    9617c7cd3b764043fd0fba032cec93eda8747e6f

    SHA256

    9db705b6357b5ca2dff20463acfdd3470cf104cef23fbcf19046bcbb94f3a9f5

    SHA512

    651cbd60631cd984c68081c51b7b982574c5c8fd10a2c0744535a7940c660af8b7bb3f141c38c75084b6cf917184f5c19ddd899b5c22efc8965e7fbe3797057a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5c8d988646a13844e899637eb70405f6

    SHA1

    2d40bf23b8c0f333ba3e5a43b038a64e0966a0d2

    SHA256

    a0402bfd26f90b30fa4c1ab34e9095c534c4a6008307b98e14d9a5d9c8c0961c

    SHA512

    ffcac9d94d05355f161a96b504c9a7cb0f7fc2782fbda35c59d8ea72a7438b0675f8e3fb0462da620e28e1727c7384cd774bd69d34f7df9e5010e6a75ad06057

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ce32be1a999f1307d2942888a601d76

    SHA1

    c1f86069b9e197b2ab3a09a0273437c01132d071

    SHA256

    da6b37134f39295498d910f8c9e11ad2c4b1fe4381f493b509a30479c5b2cb85

    SHA512

    f919b85b67d8fe580399177998ef5a272d3b55e658a2d1b907edca797fe5a1aa27d7dadb7b52e4801f0238eaa305e44d014ff5779f83726c4e14e7049092d6ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae92a31ba7a32fd92a3752459ddf8767

    SHA1

    69e24b35a917bf89043f722eab73b62da2c9479b

    SHA256

    d75c59d2d3f0a99f6636b754159d9736ade0f457086291ef8d6bf8bc0ebf037a

    SHA512

    88260a17dd0b0c7ce45b49ba8a372ee54497d0113e1e51b68c262aff8421bff5ec28daab630767116b095e08b28bc980cf4b30d680a22f946f58a187a97cf30e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7d811fe08d95aed8797791b0e80641d

    SHA1

    bae501e4b24c2dbf1ce382e7ab822a44c0a45472

    SHA256

    1e145fc342471ce7842300a6c41135babe47bcb5d931688fa3ec4bdff3881fa7

    SHA512

    ea83f76c1873f18c0b35b9b6ca42a3f4df2a39f9b4e9e6dad8a29a4dfedfb92f25f3de0458a5a7b5e02a57839e4f11429fb8ebd43bb7f55f6e8bb76eed0529ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c300c54bb5e5bc6a72d89f85718cc2f2

    SHA1

    71b8d3fd6801f76f00fca151d3d0903e2fd24ca5

    SHA256

    5526dd0f648777695600ac4d2817b006ba9da5a53617587900ce8db140b5c745

    SHA512

    96e06c83c710cd2025d40fd74d8d5ec914f04c4b7b3b5a9b4bfc1680bbe797fd16d16342509ccd3afa51772c0c16a41435ab015b0304db221e26f25554724dd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbc44ccc7178de51687a72767dc7aa20

    SHA1

    fdca8b3a3fd239bbdcda829308af427634c2c2ba

    SHA256

    526cad306c5d4e9ec5fd61aaee4160553ef0051ea9c338f189f48972d2f4b7e9

    SHA512

    76432565a23373cdcdc0d2c8dacb8e4368cf75aa7fb8279e787d3c7b8a8b7bfc47b6535a4e48dd42e6311308b815fc2ebffd599bae2a41ba90bfc84e4dfdec65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82a3ec288ba71c370da05fe4e6d0c333

    SHA1

    51108ef36b176d20197da1f97da6ebc3df47900e

    SHA256

    609e98238962e89c02c98b8d331f0929c9ad5246b3fd179c500b88d773a42ae3

    SHA512

    6d564ee9b39e046f39befbd8567381e8cd232931cd3e8b0ea3b1f36061cf6cf081d2c79ec1bdd6c3e37f3a5b72878e12bff41b306baa4f0e8629c8498e52ba79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ad8173238c6a08639cf80ec294c11f6

    SHA1

    a5a6d6ae77accfb30c7709fb7f66891211665587

    SHA256

    cea559ebb84570533375efdd1c70a82c4ea1adab96ac935ced3a649385114cb0

    SHA512

    ea538b621d438d95928ea58ce9366b6738523722ee05dd55b052ff2247e032886776897105c5ea6e6dd87c4b7d5f63418a42c9e932bd96862912c28a8d6e9512

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eba2027f0c02e485edefc9e96663b78e

    SHA1

    5542a6d16646d2b2d0aca14d47f483f1cafba67e

    SHA256

    e559eb3a5cc6cbfe82bf7d49d823247135ea861db1a4977bcc602d0e4fd5a4e2

    SHA512

    04f8bbb2982518883e8e3fb13d8298892dbb851a5584d70f45659092252a466583d8b415a371335f44ce95fc3df996e4de42ada0260103d4e36eb32b151ccbed

  • C:\Users\Admin\AppData\Local\Temp\Cab58DB.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar598D.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf