Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 09:02

General

  • Target

    LobbyData.xml

  • Size

    1KB

  • MD5

    a78d4f7912bbfef11c16de2945e7378b

  • SHA1

    3676a8235f4dc57de74e937b2ebea9ccb4508967

  • SHA256

    48b30d8c7cc02752e5b34e474ff1ae2667e4ede9d44f1d68e2722c0787629bb4

  • SHA512

    ee368e25070acb504fcdb25999796f8112985356a1511c6527b37deb5e0598e0fe25926f1f8c720f8fbddecbc2db4e3bf49c5c6f1ab303ce13bb4b724870615a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\LobbyData.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9dbf988375fdc0a5c45a57d04dac30c0

    SHA1

    82d381fe8bcdad7e093ccdf5f3de173a88f90d15

    SHA256

    4469ec39c3a20b161c367826f010f73504bcc003516705f1a150810ecda039b1

    SHA512

    31b727ac6d11263f0ce07d023a9ff44e3b7ee36b74456ae63e0d020971be9ff13496ea01e267322c9686ec6247c6fc40a3c4485a80ac9770e95e9a5db490ebf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fda7cc098a471f7b8fad39bf8d28d3a6

    SHA1

    ed53849f5d9d6dd982da12fd6c052fe8ba01e606

    SHA256

    6b9f35e505e9e4ec62a914f054ea92e3a279d63ed7dec36465d98a77b82c8dec

    SHA512

    8d23cfba61ffeaac5c0c44610dcc2a040fe61c738113b8bc03299b217a5f119a20c01ec4bc6c68772336b0371f6c9eabf3532704cf965f952b1e9b01c80f6eb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d9683e740cdc5367618431edbd78793

    SHA1

    fc2ee3e3ce060946aff38426365f6a6eb98e4a66

    SHA256

    73b374ec0c3205b8c2bff15698d574a3aca91e5b6bc225f7a4c0fce3ddebf52f

    SHA512

    bacfb7c45b8fcd4b1d103531a1adfb583406003e95b9530ae94e1e027818b380dbbb24b7352a61a242766066387761a57be79ab93d84aaaeaf0001124ea15ffc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c246dccfe372c52eeb47c2cccaf96c40

    SHA1

    7b7a8fa5ce21b8d1e7466839d18f1de58f4f2012

    SHA256

    dbd6d3e8596ce07762bbdc0b3ef72c330a353ff02d3c50549f3d5e406a8bcab1

    SHA512

    a83baad28381946ecbeb68578f892913f3194055836a9c40e0695c567eac55c8684cda19cdf8bb9d0e18718021df9c8c28ea222448403caebc78da55fed4268d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5311d5f5e8434a57475f4246a78a873a

    SHA1

    85897bf76944dbffe9c8fd51ea2ed45b829b27ec

    SHA256

    0c53ae3c6c23b236a00352b48b9dbe0faa0a8bc2a0dbd0266ce66480d28706c0

    SHA512

    d1c7e68afb805c17dc08339a48520f2e87676d7b850e787ba16b545da773a4ce6dab4f9c62fa412a7c980c44dc741024a8e4858b3c71374c5f3beeb519754a6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    071ff854455db895d22bd4ac8f458874

    SHA1

    5579eaad88e6fa4467085e5feb28e98180632813

    SHA256

    4200bdbef2d40f8c7a06c8befb4f2f4efabf6adf6c6ed85c3ab3747ce7e06064

    SHA512

    3db7259500775e8fd549b8350374cbeafd15a32d6b69b003afe0eff5b411692a39ac25ec86fe6444b60284a0def9f73dfd00071b33483abdf1a4d992ddc390e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dad604d026a8ee75afc48ceb429057d8

    SHA1

    bfcc1322412e6cb2d3c2480d7d54bcd115ae27f8

    SHA256

    cd658c781bfc2ff7805669eb8422f4e324086769f76be0302647d2e60898dc96

    SHA512

    383f56ed2b23bbdf698b39ab8c0d977f4be703bd5779cabd068744c3b41ae8e41b9e0cd9f14641f31d51e34e967f0859d13ca9109c64c2ba1c3d1e3671602c47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7532a8256f929d4fb87acda89fb189b

    SHA1

    92b3e99d91f08128a4d231415835f48361af8321

    SHA256

    a59dac529f0b85e446201df9742317fb66be0cca0da9479f98fa22267e2d9f4a

    SHA512

    91462f1cf9fbff1c802ff1f55842ea184363ceeef5e6a75393b00528acaea7766169562289264104b85bdb486563b08f11baf8adbb5bd19043ccb8566d6a7fca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8035da3beb30f9cc76ca025b3307a85d

    SHA1

    47a536bd979682695b6777a2403975522b7f7304

    SHA256

    f56b89dcee4d3a7b8469b22b06f5445e1dbf4804cdf86f5feee65a850b6ceaea

    SHA512

    8af7fab174aa6f802fa04d6e02132f5fda6ce487770648f0525aa1b5aa3c36876debc2feb41c4d1ce04778a67c714fa7d9ce66ee92453e207d1cd55393db936b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f48dc905c1f1a60487981dfd27d56b50

    SHA1

    41f2a4cabbccb12089bd393d64856ae21d24b6c5

    SHA256

    e616a1e1b2025d664c3d2ba080a466029a0e50e97cc1c7566690b17504e70982

    SHA512

    5d8d2d74d9ff226540c81f6c62cb06cb305550611ccf945d7171883738c42b1f09603117e69a70319860ea6bb250d2e71095c91265725df0019bfb5c2e1f9d44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2aaf96fcbbcbf8140b17884c2beee68

    SHA1

    2ad336cada506cae5e0115b0e5de9385bc824c19

    SHA256

    dfa17c47071076564a8b7741f42f9cf59ede7fc3ec8f1a69ad1c5291b75eba1c

    SHA512

    82935307c7f6ce32336e8dec6cbe05f029bc0fc912eab6ebf273ece43b04953b0319b4473766939a3407a56c2ba786bb52fa784cdb6f9de52a48f9f1ed77288c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb836c087bc6abf5f98605581ba1b29e

    SHA1

    fa0c08056e9ea3e218d7c20cda606fb879a4dc93

    SHA256

    a1cf0bc56884ac913e2e6fdf08d9f2ca24915f7e793242b205b34b2e14678057

    SHA512

    2f61453d61570f1bd96e8eeb81a68dbf2223b614ea25c2d3284acd15a6b8a9bebed0c0b5dfd3043a7565bcc61ffd9f7b44667475c5056114ab123a160e458cf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23b1ee84f6698d34d568ad8fde197221

    SHA1

    4b0c9e318d8aed59d33622981490747b27999699

    SHA256

    178503d56d52ab0ff7e838ef86b2bf4bb25ff599bfbe7f9b834a3a50a862ab3e

    SHA512

    8229d8a5644685b6bb372aff22b11258fdedb04d89c3665b8be091c74dc08ff459e795cb4721bb5824dc471a17047dd48383936847d7c3bd50989f1db72f9c8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    501c55674bef8f9e404769d6bec6f91b

    SHA1

    ad526f9793a96609d4cdeff573b7aaac53454299

    SHA256

    af3c703b7021a2568352cc290d0b774c8c6f9cdb94269047c0e556cea54a98c8

    SHA512

    9fa5a1ac034f706dfbbb7b7c5967875299dcc06d95d7866b149c8e9ab31e3963a587266ec8db821cb974dde68eac8075c63311c213eeac51bbd438c30f02d513

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    779d79e406c5e55eb5e8fac723ad4e9f

    SHA1

    df633d8c65c9edac4584e06242b897778e8a75a3

    SHA256

    1445dc9d460a14687b2e426310f7281ba5a2ae974ea937ff910fead3253f599c

    SHA512

    3d109231bbed95a9c230084aadcbe1fa9488802a865c5feb425cb485f909359807c72eb00724b1cebca2a1e02af119a6755761a44bdd8e34272aa34b3345ec25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d765a436463b2716ef0cd3ed5e89845e

    SHA1

    4ce049352f47124ec93e8026fca5e896d8ed4205

    SHA256

    8a077c8024963edf77247b4962a079257f0f3795d5d4f8068e7c6ba0b6b1bc45

    SHA512

    cbcacb90ba4feccd4b84934a00cd20a081a1736a89b49c70a3428548910fee119acfdc8055c807484b9c6fafe7b2efe5d876b70f702aa34ac39cf657d5434cfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ebc212777d0c3659dcebb1657da1f472

    SHA1

    6b6feb6555eb7c59fc3ea6eaea800f66ddef4666

    SHA256

    e82e9aa07901d41cc444afad4135cd25e0f2e82bddc52b20586f1a7f85d4fb8c

    SHA512

    13e02993f3813721a66b02938d7c29b35fcb5a5d00f885922d05823c8aa00dec83ed9fa6f53d85a04a64ff262aa45b566324fc6945a1eac13fd62775022df0ef

  • C:\Users\Admin\AppData\Local\Temp\CabEA04.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarEA74.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf