Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 20:00

General

  • Target

    word/_rels/document.xml

  • Size

    2KB

  • MD5

    6d05b1eef06ca8da1b3b0b08d8f1e610

  • SHA1

    b6bb01068a5ddb31e2d19b7b9d102ce4dde288a2

  • SHA256

    b42922ec7480a4643244cf7de8bb698e748a86293c50c3f3256f5f8a2d3d788b

  • SHA512

    9b136ea0fc4056ad0723ccba8096fdc4527a3cbf5e3d93b6d77d4c06eac56913b5b1884e772c872ae51200fbab65b2c1fc0465cc356385a9fadcc1c9bbd49dc8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\word\_rels\document.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b3089365810768ce3d7da90b0717ba6e

    SHA1

    1244c2556aff78a78709fcdde8076ce70d529a74

    SHA256

    a51f1b05b0b22b5909d40f57f2baf4d081eebe691469e25d47cad7b17354dc7b

    SHA512

    8645844b3fcba4dfe6d2fde6da49c3130f478cdf96ac50df77eb3429194cfd0b1a8c0d6384b54c4a2eaf6deac53fb8ba41ac000c97e0b7ab573eb759ad819cca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0c6c0811e36d781d629c280c9de3c5ac

    SHA1

    5b91d2950d4cd7307681132562a525c83891a226

    SHA256

    c3a33ce643e4b78c0a563ff62dc918c988e807d1f8b62f89c43ff33ca9cba6b0

    SHA512

    3c4d21896f20d47b11d4d86591924d1aa8326633f21e8b988163f37611fc10eee71181d5eeab77375acbf83d67c9eb7f0e2d44786ccdba1c9c9e758f43c47336

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f7dc544e6a517cf65c5358c4aca8369a

    SHA1

    fac898247a491574c7092991646fb8a85b34099d

    SHA256

    c1ee4f343c98599c9b886975f53d4c15923e73412cc1bc53aa9e00fff8a0c25b

    SHA512

    9a120b607e2638a7d6c41c2e478e8d8f48b2f026a941a880416bc0211b2895e79bbffd587e2086042fb3f58b6facda115467f8525da79fda1e41fc3b1aa893d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    27b08efe00cbcd764bb9c5baf97cb58b

    SHA1

    b30f10865990e01e7b30fa55d0f6d55f340ec2f3

    SHA256

    913b20ac28d66df20f760c9831c6554fd53a7648c743c7304f9f9b9d3f9237bb

    SHA512

    8059e20142b8d35c1f612a867631b7cce311cbaf1d695b44d84c7661cb79d80f1667413bd97d61a4f2707eb444c602f715bb62010cbb54ab36f34e9dd8e3bb8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ee395952c2573d3bab342e93a556df98

    SHA1

    480bd83a0993dc9c007954c81e3e8794dec3e901

    SHA256

    025a7fe567b81552cf293e2bdd9168632d022b94e60d497cb05defbf00165a8b

    SHA512

    421e11ac226a97b9eb7179311ac57bcc7d0943c3efed12da7ac5f95cb5ced65469ddcba74e08be2b3af89b891dde92de900709325127f56563b0487b432476e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c5f26c8bc14076e78f249508f1a6c684

    SHA1

    07ee8e5939b6c4209000f7d85040037cecf656bb

    SHA256

    8fc0ba9f482adac32f2984f9aa96a54e9b4277aedcb64c72a21fc8229301789b

    SHA512

    f3b1bd7503e2528ae0401c90d5afb5c2e54fd0840657f21cbaba493bc1643db12c5fd2bb4e11ec52bb6ba49d14455d23d304bc2d02f923e6f5ab72e8a682ff10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    af661395907fad3c3b43117b7a3e31ef

    SHA1

    4ac95b214ae45a5a69924f313cfd1737a1a6bee3

    SHA256

    cb066fc0e7c50dab65e5e077c7926acebb1f2c52c663b501b4d5ca389f84bb1b

    SHA512

    422c9795710c2341ac1695f4226559856adea8d63bc18ce59ac8ea069bfaea1894c4aa720d6eb0c649e2551972b3b00af8a7701a8f7fdc40c72c06d0c5b9a13d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4d396154f698832da09983264fa910d3

    SHA1

    5f35f7aa19bac65cbb244b6b55b51ee987d041e9

    SHA256

    9b61220f074345e3025ec8235b8dfcd6d52b61d72fdd2e4a491fa0efb6cefe5d

    SHA512

    2c28a8068cfc6c9d0182c220c7106973234f84c6eb5357ee1433f467e5e74d2dea4b226c5462a276c9563930a2b6b87fe48b7cc19768da51777ab4fad5ad829e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1f6b2f8beb8c489a06ce672c60187415

    SHA1

    dda0fe6a0240d0531130ac799b83eaac92976bf2

    SHA256

    b894b5f64e33d03293840bb424e584bafb1855bffb086e49b971615cc08cede2

    SHA512

    791446a9cbab49bfed7409237eea3e068cb908b140ed967a958de50c02f71ab120eaed0642c4c588cf8e18f289292b090a9b520a5ba946884bd1cb3135bca7a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d7d6ce2ef24f69755769650d86408fdb

    SHA1

    8e76efe56bfcac114d02bf5735dd30b7330a1050

    SHA256

    20ec6ab425bddc801ece7604bee2b04bff7a562d625f5394a12d504c26399a05

    SHA512

    ef62fd8f2adba9c476b14323abe5dff51aec2d10489762c2f6fd0728df217057375f26a32e0664021e7447070507adb4c8ee5c40e5ee5a1d414f5db8203d489b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6fc0c2f37e3be9c15fed18167e927fa1

    SHA1

    fb0342a2b8ce70a86757e42309905f0010f46dcc

    SHA256

    2fd6e2ae3a136c267dc4cc30fb4c137f63f52a103c6e9a2233e2efbcd78ae76d

    SHA512

    0a46fd965d7d9f9d96c7603d9189b06a6af7a4c21ffc9282a72409d5a562d36c60afde2d3a5b6a732ec6be54056907df253efcfaa70a5e428a7c2ab102d5237f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    94078d8f43cc5c3efdb55e7fdaf418b3

    SHA1

    73d207c0db07b2f3456912d02f9427b1a7fd076e

    SHA256

    23cd462c00e71f12238ddb55d953256e67e14fde60c358066f7922feeaf4f597

    SHA512

    19b67faf44c1836d61ad6171960fd6debbe137545795c04c086f62bfe3d3c93fe111ff1b224ddcdae12b34cbe59336a378666cd2862e98e603bd042a43b40aef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    765036232f4a6f66642bb6dbbf6a7e40

    SHA1

    cdfc28838a6cfd6819c16fdf0574dc0d7ccdca82

    SHA256

    84f68cfd5e3ccd9c996dd1407a768b2b190665474cf0831cdca620832bb51818

    SHA512

    9d617c67f044def01a8f52e6e0057312d5c0b6b7e9da493eae346c37e7404546f1b1d486fa09a2c16f7f88df2dd54821ce9d577bb666bcd64d00a77a06b12fde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    13d3907c50f5cda7c8250ab25ecd65a4

    SHA1

    0004edbd334d911f5a50456ffaa3919ebfa13612

    SHA256

    08ff22681df274aba65a5dcc722bd97db6c2f3a1ed1ac5ecd322146e37d89749

    SHA512

    416d02185616785875f2ee306fd9c69e4c38241b96e9319ed85b40dcae5a36227a4b4696a99786f3ac00c7d63a0d60b78b4e7825dfe354b0595c5a0ab4e37f6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    af3fd517f32f42e64081e322f6543ff2

    SHA1

    a3c9c0db77245264468c52441127babe4bc80447

    SHA256

    4c0b9617fd0a87e03ff3dac360cd4300627a818b1bfb69789472ae7722052a17

    SHA512

    22ba38937cab2a77c7e86db5c38eb0cc06c15ecd312c7063a3ad4d52a213b3b29aa410e0628b40feddcac4202cbd4feb2d22d6e94d562e11a32d8f4b0ff9222e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    debcc8ded696c34bc529c145e74de3f2

    SHA1

    eea664c1d1e9477da26c86332a090d95f01dce45

    SHA256

    f91b2d33c566d6ffd40f5e5c94e491fa97d9922fc480a8e7aa9924853b489cd8

    SHA512

    fe0e152901065e08782e7b6b19a5a2fe638a682b597595d0f9225100dc1eca5f5ae3e48d02eda51aee00d0b0dea9a62a2ac3f66d3079728988b8d02147585e32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    da9d6dca807860515774cb5f865440bb

    SHA1

    1d42c67e544c2b64e6e29ce5f20eaba5ce96fe13

    SHA256

    2137f3e73a536efd2b882ecef881d1ad18b0d6b41572ab7d7a06618adaf981a5

    SHA512

    f295b98694975e13146d94613fb53b79e1b0d19cecddd1e2f8669db5eefd12ad1868b7e11bab22165d13e28d666cdc7d989bfd13aac006dfbb7daf109de8e2a1

  • C:\Users\Admin\AppData\Local\Temp\Cab912A.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar919B.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf