Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231020-es
  • resource tags

    arch:x64arch:x86image:win7-20231020-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    07/11/2023, 13:42

General

  • Target

    BOYFRIEND.xml

  • Size

    19KB

  • MD5

    96849eb274dbf39ad047f4c95f683241

  • SHA1

    c6a966b4cc4deade54b966eb9ebe2411cbea6dac

  • SHA256

    b73a85c23b28d0a80602b94893d194ccab2705949bde033047da821573bcd189

  • SHA512

    dc95b6358854f09afaf3248c8c47ee84e68ed025c9d03c441857182fe90a1c03313f3c6a7d917f1eed444e4b020a23dcecd9feabd0f75f767e36ed92efb9de1b

  • SSDEEP

    192:3ifYlOrUxfyJEjGNYndFoXCZ0TOVxIHmWpiVYHc4:3fyJEjGNYnu

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\BOYFRIEND.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6ab6c892077db566762a1f70ce97af4

    SHA1

    b58d1fff01c5d87e71a311fead8dcbed5a28d6aa

    SHA256

    789b816cea80ca65ef0c05b0df7fb1a441073470346c89cfb23860351a916b4e

    SHA512

    cbc7c56c2254d63a6db9dcf296018cfedbddc632b034dda2a6643c4b2157397e69420038850bb32b7a52c8dc1453704c0db9f4e9615571e3043c97fec9764cf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a12dacc8e9faa2ecb4657427cfaf8a5

    SHA1

    56286062ecb802784b5dba6e33a548ea064c082e

    SHA256

    e8e2ccb73fe1e82c0d71d3c5cb7193ad64ee464a7e44fdf8573f3a60ddde04e6

    SHA512

    25956ab8bc493e767cac7ecc32f45c1d54d29b2c8161830c1dc4b330471b5f9221a877b92ee51522f3eaaf306762215fc0c29161d4288c5cc728afe65daa65b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f42c048339657e0ad6cce827b7e66b3

    SHA1

    c08f013b27f25341b21072178abf0e9e30236c0e

    SHA256

    73d20ca26fe460982e1e210643f01450622d2a8b4a80caf35bada7bc9d3a3e83

    SHA512

    4acffa66b65d284138e000812e47619691d6e9f3fe091d746c76b0447fb6d51086bd52a4a2925ef810423ceb0bc612ba89d868ae0d3abe255053781a21f7db0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df095a8f491814933f95ec9f3f1b8382

    SHA1

    7d16a619441ae050893855b127283d0060ea9c64

    SHA256

    9273ab5ca44b33632654a02d0486bb04292a26ab39921983d3738242fdb3493f

    SHA512

    fe1ed0bc446b6fb19a9d17cbdd43b7ccd5d52d2ef56a66847266dffde2d7d45f2562ebbfc6b94dc9c61a0ce5cc69df0d9a56bcf9f24bc91fd4ec2b095ea707c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f437811322bac868216ad18d7d36e023

    SHA1

    2bc68c978d6816e919b1a1cb3d041b9282fd5c99

    SHA256

    488c8910eeea0ece183fae879edea18ef0565b2d40620a7cc976314807597429

    SHA512

    704cb24a75db373b753abfff9e79049d605e44e77659069a41bef6703fbce56ac270b79f0bb3c9b28ff2d1ad08d146c4881ee8525ce85212b8be11933113ae8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ea0e5f6be43dafc61939b1cde93baf7d

    SHA1

    346a47c1d947645d9abbdf61898c90ff2a379b37

    SHA256

    b7836929bd932f63475ebea5f1546b83713e4212f720c697cec9db3147c40425

    SHA512

    f695281589e358f6cf3f2b085c16fbd25b5133da883f5e5db02ffff4c51125bf39f6999e3e14232555ddcf54f15ea81badac682abee60272b66b1e762b1ffb6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7539d182c3088bcc149a18c9f32eee20

    SHA1

    aa164cbda8d0630d21189b68e6c950f831533ab0

    SHA256

    1a6dae833c3b48f58a0ee8b9581fc746add0c98a3ac801b2c414e284fdb54e94

    SHA512

    f963047c8efb68a55cbda1081a703276afe280402fe48b312aba8f81e2982e6a4da4108ff10e5c6fe7cdedb1f3ee889228fc53382a043f922070d6af218494fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c695373952b11bdcc8d567277c7c469f

    SHA1

    f1a3c01e162985f149db0c1d8d5499a2b50bbf45

    SHA256

    7520f765a3b40f71139b0638f88ac803390670ea56015a17d1d2105490c853c9

    SHA512

    54de874eba6728e8b4a26a6068bb61abc8bcef68f4619df80b50a659f71e44c035de9ff05f3a1ef663bda418cea077dba44202c3b3612c5db43a69b7998c44bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c72aa1c40347888e863672a0b9ffcec

    SHA1

    870a0b6cf54a7e6cda5f94e0cbd5fc8eb576a27b

    SHA256

    13cda54fcc82a771c07b4f1b8989ea488490ee78191c31811d88419ca163c3d3

    SHA512

    a7f6b300b8e7196edba36fbbdb7ac176e504519c50f8cb500a926a3409f84ab9b43eb2f040c34890d0272f5b1040606c01d9fc84802b72a8a389154e480f2f9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e97d61365ddadc73ec2cc05e83e59be

    SHA1

    99d25a363604f9e904e7b57e1d01bb0219fae9e5

    SHA256

    e4c46a77fd583b9f8b04ec71394ffd65a8be54fd9ece7d72b76bcd6ab7ba3bd6

    SHA512

    dae79746bd4d3d0da990dd18f8d0e1beb7687c7bd8e68c4399980bdbfa2c7e22aaad8a5f90c9384dff7e7a56c1802aff00e2efe51f062189baac1defd4340afb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fd9d14955e516632ea675d67fecbd574

    SHA1

    2189c24a2ad7e2ca68e234a0d1ad787cfb43b747

    SHA256

    4811d848423e22b4e87a31dbcfcb010d3287c1a38f4f843ea26d74ba396ff480

    SHA512

    a5b19a1f343e3616f9aaeefa868bc7b5fd8e37d0305d73b9e217a00cf5b25ac71aec605250ae10617c534fcaceff1a9696c2aeb1bcae41e8c0ecd6984cf8ad9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ede18ea39bee13999069075a50664c2

    SHA1

    af660ce8937935f7c6dc547a044e0aed93d30318

    SHA256

    403014e543280f13ae5e0f9e768791d26855854fc2689029169f7bfdd7f9eec4

    SHA512

    5d64975136d005519e8094d7bc2de05c71ec914df1fa47efb0931b2a4a4aadd3dc1aa0817786195b452340abef18de9cd1094d7ae2ce180c835e5335aaf0d51c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e8e6d690243cf9087af55dd1acae9b40

    SHA1

    6cc0a3c65abb4774985bf7317d5236647e4318fa

    SHA256

    f9dd9dd700e90585597aec294de9875f59f9a94df1da305e38c415d285e00795

    SHA512

    02b89ca02caabcc9617bbf0089d682409d974d3a2528b7ed4f27ec326a7fbbc79ca5b8671935d3da127d9b41e00a330c8bd44f4a8b907b9a23ccdeb1503057cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a57167b0ac0ce72777fd24af9a5183c3

    SHA1

    13af182b30a2f94a53b01860f8207ec8d1ad8247

    SHA256

    d5c2131b56afa55461ca696ccc690fde5df2519c5aa223115a53a32e0a920002

    SHA512

    24e68930ae0e8a20df14cce11a9c0e1925cd42eed9ef9948583b0beadfb28c5b19746dea6a8b4af692100b36da3ce9e9de84468eadf50b04bd54fcb1239d2400

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5fc89fed09c3085a0a6bff2190445670

    SHA1

    0638828580856d2a82932efb523ca06d7d2925d5

    SHA256

    16099cd0e35d7b0f26ad105eb472979ca6d5c0bdde733ebd130e8bbbece11a7e

    SHA512

    15b70e5d66017f179f439daf1d2b761e1d865d29bb21c7435baa03ca6d4d3d46d56027257a1eb07dc1405785907e9acdd6df02df45e70e36d30e9481f20d353e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a87c98d9d439f66e92d4266635e9fdc

    SHA1

    9e08c314c24886af4f5ffe1c02ea4e997158ab87

    SHA256

    81540363dc03e61ad53e303c3521a5b7772a61f4778d9c23e906677df48aa31e

    SHA512

    fa19f0993858860db6b23739f99e25a9b4628aef6acab76f3e6fb8797cb048b60fe08878a424784dc01e4356d9e1dd7a0c1ca01254a07046bbeb88c62e19ad42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9aa067f88b24032f10cd1c2c0c6c2245

    SHA1

    2bb066f8a609ca8ddb3c7d9a0d2ff593fd89591b

    SHA256

    3db7f7c2224636b298a89e7fda044d6388e91aacdab59c2ee23e9f172cca27c4

    SHA512

    469377c713dbf876ccf711ceed358609fc2841a63df8cfb7ffd2ae441c2d73a649f89cbf4043923ea15d00beda754b160cd1e2ac0c0ded82394c5350c53c6f60

  • C:\Users\Admin\AppData\Local\Temp\Cab99B2.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar9A43.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf