Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    575s
  • max time network
    622s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2023, 16:38

General

  • Target

    Lethal Company/MonoBleedingEdge/etc/mono/4.5/machine.xml

  • Size

    33KB

  • MD5

    25ff1ec49e3ac9285bd943cf036bd813

  • SHA1

    392e5ae6b3dad59418bda890952ee27a8b290e90

  • SHA256

    ee950004b576fb28dc85f4b0435ed04bf96612de2e8b53be84d07afe85a0de6c

  • SHA512

    e4659f07893c8e6c737eed5711acd32c84bf595a6953631d960305434d3e40c73867f4d84ad0b62b167e3bd9631150dcdefac03a23198135a44d3a2f011f9b3c

  • SSDEEP

    384:PbtltttttSRtNRtcRtGrRtSRtTf5Rt70zDgRt2Rtuj4f1RDRty6ugyunHMSeuWuN:dk3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Lethal Company\MonoBleedingEdge\etc\mono\4.5\machine.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec1f0a845a99d5ca19ae84e3f9a5a2c0

    SHA1

    d8c80bf0f6433dc8918c459d7e96ae1fc05e549f

    SHA256

    42fa7b4bd1a74d6d94de913d5869238df57a6d19f1ae692e14051121b548397d

    SHA512

    786a2846a3ad8a17f230ff15737587e20ac0571e62194fedb54c02d57959d67a7b6e5fa5f8c549069509d082952a5f0f63f33c5a302f45f94d0351b9e9437354

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31d7539ade4c1fde9de93c8fbf5c93bf

    SHA1

    f2d038742d50553190176e9ded65bc4e6d495c87

    SHA256

    4d26a2f782e2bbf6921f7390cdea15fe2e1b291a1be4089856c5da7948f76c6b

    SHA512

    4fab6251c4671809c32ee128c043da651421f1a0fbff491649289750439c0c599e55ba0d05b28eeb21df7e15e01541cf47881d446b7fd20ae33cb7394b8710ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    036b36885d3267f86b9fc04bd86c9ef3

    SHA1

    832c1d36b19436797298b4b8caca8b32bff39455

    SHA256

    1aa2d83b0397728daa32ff61fe59aa32bd005273fd76fbfc5015f1c3fe25b9ff

    SHA512

    d0f558a92e24112af1cd7d5bf3c5f6be92bd09890bbd10cbdf5421d86b9fbc14153436494dcee94855fa55094a4c66c7de7010926cdaf11336d268b7ce7e557d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8166cc401ddad317d5af20d4a41e3fb

    SHA1

    65b3ba1333f42ab6032b1870a40439b6b4908b56

    SHA256

    82f967612fcb29fe8fd576d1f1f0664047207e2010b1511b166f2aa4090bb770

    SHA512

    d71052dcec52337a32585cc8414a6794d4c7e9ed242541fb273f88d0b06822fdcc49a566c2e7e97fab7c5150b630b96c44c179b1fa4e598670ad793b2214078a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    740c6cf47f8dc1b8149a06b8a31c02a0

    SHA1

    4c40291f81b7b39e9041c2102d3d9704f6fdb520

    SHA256

    62ad44842e14a020adad43badd840a556b0485d92cb6a073db027a641c18f353

    SHA512

    ade056b397480e08e78bb6999ad849878f287a86e86cc3f393b1782f01697d16a131756e2fed04064ad7b014f8d33b21d91339c583fd1744e81cc0c9f9120156

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10757e775e4f5d1832dfd1ec7e776169

    SHA1

    f9313bd6afae5fcafd28eea93819fd84ccc2ce92

    SHA256

    7f8397069a4c798c226fb91dab1abd70932ad360d609e95f86f7820efcd36eba

    SHA512

    5632125754108c7acad5abfdbdba1dfaa672d2f8d99291bb02b5c53cac4b27aa2ae33105f7fce83f1db94c3e18019c6b38bb0929fc67006e127c827c80e2f19e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74180c533a7c717e972b882be952d5e6

    SHA1

    49371b4d54d49c43794b4ae3b1e59234eb2acac1

    SHA256

    100e3a215f5a253f298468417fdb16d9ce2c891f7059f88b19cd532335f22972

    SHA512

    15039df268287f4dcdd25762ac72aaaeda8c6cc5d799f936f8eb876eec4344db2e5b879a101b7c33ef9ece511daca18b492c01d4cb279170684f70f9ce3d4c3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    056394e4b67e603d0748112bb8dd6f51

    SHA1

    50106f080dc2a574469c7b0c713922b90402f8ad

    SHA256

    7fcfbf15e478f7b189483a123a139e6fcd5581c640e259ec24bbf515684dfc4c

    SHA512

    4e16bdfc1bd47a12fa8cfc4ff11af3f58ae67a0d10b7c1bdbc1c06710a1810d278bbc6052f2fed9fc1b4db171d144b3955a0c532818406851549e548f8a8f89b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0714e3476042e86131a6a24fecf0d9ff

    SHA1

    c4eda1b7f20e608a5d66ef1e87231122df985aa6

    SHA256

    0ef2889f81e5e8d1b956cbe926ea06c9dd6323add480dadadd2e167efefd61f4

    SHA512

    a2b881336a9a2a26b8c59b3c2993ca7e0dbe17991b69c6245d3a63892257b8479a131fd9538874d9063c2dad75def8a2677be9b1966ae2320d5e6fe334f7490f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52360a0ffd27c88c20ffae6e5529d278

    SHA1

    02c9575f28b14e47d3c04fd83edfd3405c35902a

    SHA256

    0fb48d56d117d71b37bf4594b3669423a431351b4cdeb20e3f0e61889d088e45

    SHA512

    888d3b75df5b69a86c8d55c2d15032187c78ccdcdeb6118b361e8152010a6570dc32c7249f54186e183d42bcefdf6eb32f2b18d233e46f9702567200e1c0986f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    918872e6c174cfab766d06785a705d6e

    SHA1

    58214ca099e8ba82edd16c49322dea99b57a563e

    SHA256

    9e09acc4b346b9b0de3822701c9d5a74edc452da69818ca2b8425ab255ce0ec5

    SHA512

    df25f6e9fe014bb7419e36825b4e7fb59e29bc97caaceb5b3d76fbab66f75dedc60bab1ec0a3694c2e557bda928498a35c7d6bd5dc111804d77971b51f2c23f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56d3844a3faf1bcf287caaf3134d3d78

    SHA1

    5fee62ee89eb8954fd21e5bb64ef4b88eab8c179

    SHA256

    aa12de630804e5461edffbaa44c266878ead22f0a6761561f730fa3442664307

    SHA512

    06589ef1a4e63cc1ecc78d77f135d266a4b18b2eda73adbc169626643ea97b0b54588a47a445a5c01a6fd4b6d39e8aa20e0f6009b73bf43ad7194805bef9ba0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db7e1028e4fe83eba0d409cb2c62ac0f

    SHA1

    4ca3b517fc635e8f1c9c039bea5381dc56aa0d73

    SHA256

    e7c7cb061ea0fe72407a64ea3c7330dedda8f8fa126f5fabae7cf20ac2679703

    SHA512

    4f1442745af0cb3571c95b43ab4a94fbc897352ad8ec16fb09abfbf50a6c843a1f948f185f80116c33eee5964841fb67856e386ad7410cf3d85206ae19a8295d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9cc1fe89a371a3cf5f2cd5b76454b6e

    SHA1

    a55325a333fc3f9ba212823f70944b8bcc227b6c

    SHA256

    4e3aeef1959fe9f9ba7adcb6956546cfeda7ef0bcc9e514d1432ec4e4f5727c6

    SHA512

    f389686f73f8cf09044950e97b96753a16e353a6dbd89b358931a4395a929f39ffda85c7ef0e9113f57c8a831197539cb97905d5f546910715595c84a7a6ea28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96c62cf3f98d3351453a26f9ea3cacbd

    SHA1

    e3f189d5a1d32683e8d8340d311b794337197557

    SHA256

    665a5569135cfabd29cffc01e669e42ccf05876312cfad0b41ff334edfc49157

    SHA512

    ea137b70ea21e59d926fa233aa25d6ae01db6e2faf9ee9b5cd4e3b1d92d6c0440d11de251fe74a04da155114776e2ee753b7ef520e157ab102f33302a8aaf905

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8779c85a22c4003226d7a54f7888b3e

    SHA1

    3a03ae80bb4aa554bfc5a75601c3c9e3bae7e69a

    SHA256

    d35c5f10f3f9aeff19db79e7daa9d861c333ad46e940c71b711ea1f4944e388a

    SHA512

    b29423215e553a4496ad98ae1dc7c031d9327eef517359a84358221dacf0d953fa7ba566b940455071dbfc893785b53c5649388fb997f23a02c1c69aad554303

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    569920666bb57ab8c4cbe731c6862358

    SHA1

    41ca9522fc007a18bb061b32799b0a6db5bb8e28

    SHA256

    5b62dcb715ed9d1f9bdd48f8c02da66daf811a5460755c09a7cbef28168abb6f

    SHA512

    d32259a72cf7f36368b0df269c967a8746e369d70f497d8aa55dd3e627e06365ed559e4c3e82aff5b8d061de4399723e601cf2fee0dfa0b4d3a92827e6eb8337

  • C:\Users\Admin\AppData\Local\Temp\Cab3E3B.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar3E9C.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf