Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 09:02

General

  • Target

    TeenPattiGameSkins.xml

  • Size

    1KB

  • MD5

    f3d7c4011130ddd01edcc76560c922b4

  • SHA1

    9dfd9c5dcf2e3e69b898951b14bc834f0853803d

  • SHA256

    a01052ea65bb6a6bf5fa0a15f7610f10265ac8476a5d1318b4e523982695ffa3

  • SHA512

    4772030429612df44e9b2bc620c607457c5f059934695dd823c51d3e84a77a0b426aa494869ab586f1b04486c441f60dbe03b8c8034e8e084d5254fd6dbbaf4a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\TeenPattiGameSkins.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:484
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65e816ed8092af6f6ead0905e14fcf56

    SHA1

    e9e8fa050b1bce992eb7c576448be97764c41355

    SHA256

    c21fb2d9d399f99f2488339b5ef3c096a264ca70ca312765a42202c92715368f

    SHA512

    0d9e060086e01c49ff875f4c9723ca2f004daee1ca635ad7ecd93d86aa462fcf77244448c3c7eb5eb8da836cb827495402e650e10148ef39daa0e9bdffc066a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88dcb4bbe607b7011b0d0a7c43c0b094

    SHA1

    b317d051010ef41bcbf1a549bd2c95c7af65897c

    SHA256

    90e6f4b3d9530582662b37b1d43be4392796f4a596811e4ef4203d977e6940a8

    SHA512

    1cb94e8ae4e559aff2505eefc88056334d3c2d64204662216ccf5c5a9da093085d6695614333070d4eebc62331c91b9e659fc1b6608e33b2789addb23529c970

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb7418300116952dc271846377d39c0e

    SHA1

    cacfe9a59dbc0725b4b8993167016339d31c0917

    SHA256

    755371350ee6a50b2599f6488f5e3032f22efd40fc1d645b9bfefdb5ede56ba4

    SHA512

    479f07a481827834aa64d6727a43f4ce6a6eece6bd9ad182b7f0c94d425ebfed904fedfe2668bb3f0d2378cdf90032c9c564f9567a42ce266ac21e2df9b01f87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c568ad37d0b09fb47ee58dc5a8217e5

    SHA1

    a6f8ed159131eb154b6bdad7e483c8cbeb01f2e7

    SHA256

    2ba33a95af41bd800211c563b7718b2f0f9a1e3a5d9fc075c599b88223397120

    SHA512

    48ff194a0a5d6e617f8ab37f81a7f513da4bf07fe873d7f5ff38037baf929f04c716e23be0d1dd1f509782931f66e61fbce5d760f5d5d84c7c38ef47a6183617

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d67ceb01de7375b4a07e94c7442d1a2a

    SHA1

    724dc910bcf2e826924b8e2a67ff24c3f7f5e546

    SHA256

    b822f13b4235b21c1f80aab7ca6958bfc542d670873a242a5f4dc2f73c1bf9f9

    SHA512

    00d0aa5402e3694a3893fe055e5438edcce2ead5e82384d14465ce070d24fbab271ffd98d429897d6b188e9051ce6be4a9d7c94c8796e036f40c68cdac7b5bc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    155b6f3d92dc4ae635f8651f2d1648c3

    SHA1

    9d3bdaa711571c52b1995a4b804d813718b38516

    SHA256

    fe75853f8a7143622caa70df12e75d08d8c0154a9dd19652f7dca9fa812cb1e6

    SHA512

    57917c1ae828854166dde2108643ec1593838360b584f3259b22fd450680baffddd8666f00d915756f7452d4809e07454e5bfb2e90d7742eba95a331fe73241e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9d9e5c40dbcfac92e81bdc09ebc5445

    SHA1

    d019790367f3244f6df870be35d0634dfb70576c

    SHA256

    c52d06d06bca59f1d08093df48136c40322d08d27d00561be3a1fd399cf13756

    SHA512

    33d0ae522ba639c6fc3b81526e82185ae7234ab2c4b83ed3822a5e0bff97641080323e21bc4c7486d0815960c8150496536076b9fc725cf0a6f7e1ca6d65b693

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5aef42f7256bdec0a129c6b3f8bdb604

    SHA1

    a8e25f8e631dbf0b0bfaff2a3d8b3ad2c0ca8b71

    SHA256

    6acaed82f4280a7e72bd0d902003e7070fb3cacbacef671489f0a12d54646ec3

    SHA512

    037b5da85c1c1ba8680dad750fa4ac097bc56f7e0e5b7670931e52bc45a7cf96cd4a072b9e80a79c06b16f7a55a02d92bc080a7dd14bf7e0f443c0367e411864

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b4cc96fbaab5f074ad6aaa2629e2a2e

    SHA1

    ab00b99854b5071a476cb72d5ae019cfd0dca6b0

    SHA256

    4e2cd92692b8d78ab8ec6a2c7b00bc714e96837b25a5fb54f89c0aabdafd2f4c

    SHA512

    91ce994dfb78258f56278062fe3a187ae3e58ddd794e8befd9a19019937917cc1e028cda1793cb67b6e6a946519d1a6e57c9dd53fb4120fa8245ae86f8a1100c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3581e9bcc5058e6c748bfda6ce7baaff

    SHA1

    1ad67843943f9c1f2987168ba69686096b78e763

    SHA256

    648a5ca5ca1dd3d7f914cb3e0ba14b1e2802d1acf0d7f0759951d8de5753879c

    SHA512

    dd5480ee1d458d4a6e8cc876c6c856249fdd4881ca226b1ba361feaedb4e9efbab26ab2689de4fc6df7fadc22dc9d543218be5f52eb3c681caae557a780e188e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94d0c8519f9edf677d3fa697154f7f34

    SHA1

    16c807aaa820be9768c5512e06388fe36200d3cb

    SHA256

    a04751cc0cd0ae4a0734b8f8cdffd0e7e540e874678e38a39bf1635e942cc6c9

    SHA512

    44f7349367dff5dc0ed02b3bb6f72bcfc43c3a6ce84fe25b1d34ac0093c27f1aca1d9b82a2b5d8673573d03c166dae67c58d28dcdca5bd1b3a51da9138952c2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    45264b20eb04a06d8b5546348920a7e3

    SHA1

    52e6b69ab73797dc6518c175686bd68b2e722583

    SHA256

    c22e22aabf79e9640323f11486f7809b62a5986f55b62f3e24c112bb87087c64

    SHA512

    bdc5b406b976b97bf255c56e0a6f147d3fd36803c69d684ce3215a02aed6ff3424749caa29c4ed75db4a9516756ece7b1f9d2210461aaa4730ab0a61472a7c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab258a079c2bbc807e5405cd3a342b69

    SHA1

    0bae74afb3637c0423eed8e57ad4dd8126b09d74

    SHA256

    0eaac36154d3f089d21fbd5cdb96159389e0f2071acdf1e098eb59581de54175

    SHA512

    2651ab9b33511cdebf8891021ad54d1cf26e29394e39d39d91ee12fb4380da43e10ab0877a231bd9926a42764c5751ef470110e6982d3fd1a95e0d82b73c66cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    15d82329fce50df267e93cd090b0e4d0

    SHA1

    3097c474db0383015c7329c9070c25b273808fa9

    SHA256

    2b296cdc8250ebf7d57e85f207cb5cac3e780d5f5a146c4a246823c4c23543c6

    SHA512

    c93ca50518f96205590fe82f5204111ac902a3c16880340aff01dbf1f691b750d8ca54e0967a14e0344a25291f54b48f08dbafd621e0ef034297ba6d40a317d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb78a8eee86431511e8e5dd870f9ea30

    SHA1

    0deefc9bb025a3e699f630be5e96bd0ab3d198b1

    SHA256

    a4230bca8c0a7525b1acf4bb318a65e1189a2c73fe8088827cc090538d1da926

    SHA512

    d70f728314db691fa2b453014df2dd323c6471c8a9a5da9bd5d188d20d539da3595850a1ef26b4707b686fb875d8c03735f0ccacbc0ffa1d22a400d1070704f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    83a02584082fd1891e2b42742f6c436f

    SHA1

    536f4152ee666e1ab761a0ca4386c4cb7621adc1

    SHA256

    7e5de9d1fe5a622cf2029360c0c67d2e72a05f40a407051baeb35305a8febc57

    SHA512

    3d2dbe88011277aeda4482e29ffe228e1edb67046247426ba1ecf10bffe1ab25db30d8384d5a086247d190174ce392fb341e02c1154d3d40d74811c771c0678f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71fe1c83889475a34a7a181a4568b76f

    SHA1

    0db052dac4b886455de918200f4ec2605272d23b

    SHA256

    d1a42775b2f3989dcc5ae4a31f9603f79a81de4f764764c48dac9b43528b2d73

    SHA512

    9e4570573afc1b10cef03226876ab7291c91babba4db0d1a9265495203f97284b518622bab0f88dc7b553605671820465a1c6e6cb5ec1a75d93312adf7e3a429

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb27be34bc20a7bc96bcfcbab19e1585

    SHA1

    fdafb43c24335f713b2bfa29d5c27a0691dab01c

    SHA256

    9ce0408f34c95c39c14368776a5fe590666acb7b6947858cb55e22e3f443124d

    SHA512

    de16ba852385f8da7812b6fd581670751fd0c1f7a2835209a0c8a15ec777fa529fde4eb8cb7df8b91f624d866a42c26926ba32ec61e6a906cbf39df81cab689b

  • C:\Users\Admin\AppData\Local\Temp\Cab695E.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar6A1F.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf