Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2023, 16:34

General

  • Target

    Tu pedido #112-0835316-9484206 de Amazon.com se ha enviado_archivos.zip

  • Size

    4KB

  • MD5

    30d03f926b3e2e5f1a1114635ba2373a

  • SHA1

    cb0d0f103d09736bb0e634abd897393c8701192d

  • SHA256

    4abc90d11b4550edd1fb5aac76272a80c540e6534adc46bbb3a48c899fdf97ff

  • SHA512

    d430877eb24ce869122d133bb9f4f5e40c18b36c4629734a4dc922792b58b93aefa665a579990cda57c16421a8fbc5a82588316d2b168a4720c12eaa78d50f75

  • SSDEEP

    96:zGLGIRGXdBX+rGVDF/ItGyUul3vwW6PIFN7qnpq0s8FMDoq/nS32GrG/bGAiGVDV:z4Pidp6CItG21naM0suMEki204Ug

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Tu pedido #112-0835316-9484206 de Amazon.com se ha enviado_archivos.zip"
    1⤵
      PID:1212
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\ReadMove.html
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2716
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\StartComplete.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:516
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\RenameDismount.pdf"
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2816
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2296
      • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /n "C:\Users\Admin\Documents\SelectConvert.potx"
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of WriteProcessMemory
        PID:2204
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          2⤵
            PID:1780

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3c4358887dc8dd9c13fa7498aa6c20ac

          SHA1

          c8ec1d33c25d6a209724cfef44c7d61307ffcfe8

          SHA256

          77c1154a83c69d2bfa3df2604bf68452755c6aa4cb9e340f3b113a64ee98eaf5

          SHA512

          1a36a8a5ecf472f14172130f44e07d031a3fcda3d8b2aad47ad032231ad0ffa1700bcf74c7e35a8553d47059cf312d2f70d18b247fb9eaa012e771d9d0eb8d2f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7f6e8e7f7ce5b939383912ad4a639b94

          SHA1

          92a7e808bb341aab5392c54e4cdeaefdb4e0860f

          SHA256

          fc61657eec6b212e86e8e4e2ba11d83ba75d4673f11a802e6353ccc057f93fcc

          SHA512

          d8a4ec683f611bed7dd0e233df29398404cb0f0fe46046a22a9c90cd3c21ea1ebdd339aa600a99bc24ee1e8b711614992a555f5a243f0eed242a36613ac52d33

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8b2377f2e12ccebc764c4c20ffe55193

          SHA1

          e8d190a540882a2705546bc26fcf8bc88d5a954c

          SHA256

          a0f9a2a3dfc42052394ac8fb615efd1b14553c5f17ee0a2a6120900a4e452d91

          SHA512

          9275b48c73a7e8e6136df95dab70611bdde7178f7b87ba3c16f478a79c2bfaced6a068966e6c83bb6e5628200fd4b98d2166ac2aa494b0ae200f6b72b9fe60ea

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7cdadc78346d5cee7a24825e05f5f33f

          SHA1

          334b69c90177123f65a5fc0e360aa49abbd74826

          SHA256

          2025bfc0b43c7de2649b5af9583e005f3424c58965be2f2dfd38d569bcf742aa

          SHA512

          f5b8ad384485f2c71a9f71ecbef5df047927220749abced6ca8f81b926d64329a22023aaa3199250ee064211c0c41d11d97339425a88615b69a07458f891d0c0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          48a344c1a12b956543ab67c4f115dfed

          SHA1

          dd50c8677e6ca9d087b56881f955f9dd82d11988

          SHA256

          e5ec2ac10450bf29c355c25c6a854529d85ffe52c1847a7e972b017170573354

          SHA512

          051a7c816bb1f965a24a09488c2e6680abe1b0d010051632bd797468ec0a23805e4a49d0f3b6cade6b2f1b2c5fe655ca0d58cc2c470dee15b3634ad99deefabd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7c7ba3d3e86d968f1dc20d007e4114e3

          SHA1

          a7f277ce1604a16ff17e10b0dbb3cdf38a7d700d

          SHA256

          54670ddd3ee22aa2b61e0e960dcd708f0a9af1e85d0ef03eaca1d4b70db6b380

          SHA512

          552d462b5f46ab23780a483bf7446a9f6faaea98c7b3571040536038b001afdbd2593f509f8027381b34fca0a74a176b3255fc3da32748b6ccb30fd7a6c94975

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          00583b9e4c943a1f1b311a1e12e4fc8d

          SHA1

          e2f86574946b49438f035d205ba323797fe3babf

          SHA256

          d0999700243ca8ef6f3c38954ba9c325abcb497f91a06f0e22c46e84394b797c

          SHA512

          14b09b3ae5b161628f181753f25ddf3491351005b55914a899a109c09cef15c12327e20af382379ebe69b77ceefd2a68f363765662ea2cb51b2cb1c8c19d4ed0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          aab162bbd5f4ef996791afb408220a64

          SHA1

          18a479621d7c20ac38cf25f824a9f27d23e74f5c

          SHA256

          d4576bcc0ac7b3b4b1293b00ffe5bd7a5493ff86b1e882ce0096e3a3af37d211

          SHA512

          18ba2d4d4690d32f586f22cb25863719d5b93fa729a4f16a008c804e74cad07f9817ea0cf61b033e621a04052ba7a07b975fda914870be92fa02e5c2a680b2d2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8d116cabae9d9ad58e3bb0c80bb2d957

          SHA1

          973c2e04ce89d6b0a778afc675a7a1b54dfec4b9

          SHA256

          14635218605de1c2d9958f4624e3c1ae0c51465c1915459235552ffd2a41899a

          SHA512

          2bb3e6ecd9b40fd8fcaef7673eb3b8ad7f8085ab71db67f5347c7559d25dd33900c728892c98bd9db5acf151243b21a8b3024c3681489bdd25eca1d6e2c2c393

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e1475a0919b49ebd87914065828b0c8b

          SHA1

          65ca2eac19041ba53810858bf094f265d99e9d49

          SHA256

          d23d1ad326ad4c288b21413c55df7da8a0649e175b13147c778fe045c1030817

          SHA512

          8a7753c3d39d8d4db4c8ebda5eebda42adb7da1098ad2d11c8f6200dcdbde3e764eff3e397b80f29c26bada071a132414e14c7706e5df80565d4adcad0ec12d0

        • C:\Users\Admin\AppData\Local\Temp\CabE8CC.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\TarE91D.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          595d3005720a53f5471e4dbab5427631

          SHA1

          1ec66511b2d7b726ac68b89e639cc50c34e7f046

          SHA256

          67abf031e99ff11b277f382659871800ab29ae5fb442499c434a30996f38ff73

          SHA512

          5a86847a8e3437a18e987d8685c713aac5ee88ab5af61951a042eda7730c01402144e38f81ba95c967544d1df81f46b5355671ba60af98e90c5294adb52a28f8

        • memory/2204-464-0x000000002DB31000-0x000000002DB32000-memory.dmp

          Filesize

          4KB

        • memory/2204-465-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2204-466-0x0000000072A8D000-0x0000000072A98000-memory.dmp

          Filesize

          44KB

        • memory/2204-468-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2204-469-0x0000000072A8D000-0x0000000072A98000-memory.dmp

          Filesize

          44KB