Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    578s
  • max time network
    621s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2023, 16:38

General

  • Target

    Lethal Company/MonoBleedingEdge/etc/mono/4.0/settings.xml

  • Size

    2KB

  • MD5

    ba17ade8a8e3ee221377534c8136f617

  • SHA1

    8e17e2aec423a8e6fb43e8cbe6215040217bb8a3

  • SHA256

    ce1db1ad8a9512073164e3eccdc193f7eda036e1a9733caec4635de21b2865c8

  • SHA512

    c18bcbcbd4b9a20a72b1a934d70db1eafef047f34f3ba2c6357d8e3afed07ecaab861e5571ceb58c22d4d3e5ebb34b51e366a0553c3153fbc263d1d80472e297

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Lethal Company\MonoBleedingEdge\etc\mono\4.0\settings.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fab1ea2369cbbf9d5e5ad73dc2ef7ca2

    SHA1

    71c134d0cbfeb462699a27978d1dd4532e6d7cf2

    SHA256

    9c2064b13c36e96db69d265783063fb1976ea617aa98c30357fd7d5e0d292d88

    SHA512

    e6649f9100acc7da415338acca618ee885925d41b9194203fc83c3fc5c8f6df9ce24a7cc6dd62a4423f8077a32cae87ce616e3085436fcc09abad8c9380b5e13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3edf4c8510ea31185120bf8e8038bd7

    SHA1

    46d6eee6d15b38e530fadd9b047071b97756f0c5

    SHA256

    be05fbeeb71b512503dd243602845024f41cf38a88de0b91ceb51dc359b00c25

    SHA512

    b15951d6e871ff903f49714007018a6e6813750b02d5742a741361842c8e83ed746c2aeccbebdfdf8b97f3e2498f22cf5509c187db1137c70eb58a5f95d85926

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    842fc560fd28bf36d6ebec9f62427aed

    SHA1

    95e55a289c4e6606bac2bb0f2e001ced757a7802

    SHA256

    bd2022468bf9529b6cbb0daf03bffe98a40c4433891c61049af46473f822af52

    SHA512

    a6ff4d22921ec4921ec47f810c45858350198a2c1b93eb2c72243f8722ed5132783d8a40fdb8c1e36178fced1813e8ed4ed2b7a760c89bb67d416db66b74ee2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    108cc9f5f7244d537797a4c0a4376a11

    SHA1

    996bdbfcd8818add4f86ed7ceb94c12189bbaf6a

    SHA256

    621452915608190c55b0dd0d58b5d652d3c0bc52bae37aa7154a8faef3ad3f30

    SHA512

    6d4df9ee69df7d63fdf12740128090998808a67b9d2aa8c555b18ae2f2de540bd3193326f351c775d7c8ea724d3eff338cddd4a809fb79098972315eef17f6fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    553a0cebb4a9ddfeafe29770a115483e

    SHA1

    c7c151723b9073db955d9fea65fac3314b7666cb

    SHA256

    ad346ddac8729deba1730355e85f449a4a720720a0baa1286ad66aa7fff0719e

    SHA512

    8218e0950d0fd1d390e08bf91e0834dd562ad02344c5d7aaa0991466d8e4c3641b427a5b0b4de8e93a524703dba8787796779eb0303d77f87ba0b243b29ca990

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4472e3871f208dc076be903f5ace5e68

    SHA1

    9d377bf8b3e47f56671aa55d68cc5be1b78a1c2c

    SHA256

    f3486a5d6c3ceb4b098f0831f6ccdc14c45e0eabf582f4961163315b79973003

    SHA512

    049eecfbcd71b0829e874ce62498a9cf987307a969c639af5159bd4ff47cdbd005bce97109969921ef9f7db188206a68c710b0268229d47df4057e39a8ede8f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac261fd93f732022ccf88e8e7373d3f1

    SHA1

    0ee799551d6fa328a3081f864f702a546a4894d2

    SHA256

    ef51f005cad22c55ba93e5e490d2fde85f3c2d2f46582e769d1adf3671c9763f

    SHA512

    56ab9685bed8cfbb40593d2565ab50c996c31562861c248aa8c20a6cda3e8fc0b4fd9e3fc7b5aa9cbc06cc6b9c1a877db9349ad7f0c7ff0fe586bd67b6bb7826

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    163e16c67aca81d8fa5a3ed8305c64bc

    SHA1

    3c7dd572a11fb6238bb4428fa2c3dd1cacfd0233

    SHA256

    4d74a93efaa9d5a6294de3203c8b58b45b13d6209019f3b703f18c786313545d

    SHA512

    6917615c6cbf27694d6da9861790624a79f860999980730a4dc222ba2618203632616d723aa49e00be9fce73485a5f0fbdc84606f516cdcdb09fc6998b638bb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7fccee9335a38f2455901070a83025b1

    SHA1

    fd697aa8b983c3d3574c40bedef1756b377d1304

    SHA256

    b48f8774af9a3098b850a8877c8fb40c02232614a9a63279042e29a81f29249c

    SHA512

    a1f7c77c70eae90e8445c17132c8725ce1990e09af59614cc733c5e109031ae66c65232729c223a422b395cb0e3125e22fef9ff2f1b7cac1c0bcbf3b97daebbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbd8b6c8b4bebe2e993fca422cdbd8c3

    SHA1

    68771bdc34b80729c297b1fa07ec23cffaa745ab

    SHA256

    72d91ddd7de657723100047fe9601c72e520868b67927473d4edb32c82b38e04

    SHA512

    989d838f0dea46252557a15de79385fec31ccf662eab72b9ddb6049944c918da44c902e4ec122c42133e69a7d8df54698a77c816158cd85517edd8f7dce8b5c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df94177d3e1a505f02e80a2506cbb4c3

    SHA1

    41c8e7e425985819339d0ec9771c4610b5c9ba4f

    SHA256

    2ebbc01cb7388f52b2e89e265553086dddcee2494c9a5f33f884b8ec74cf6d60

    SHA512

    45194d04211ae901e213dd2e190fdfb0ad619ab8159acfbd96747d18f6eef89c30f3182c6da1da0cc17f52c5502396d47bd57da04f0d3c785f98baa26626ebe8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f40557db7f98be1dcbd3c48238134936

    SHA1

    b3ce3b8c5581f238a68ca6972d53a96781dac439

    SHA256

    5c6a37ae33be307f2f6e16288e93929ef414aee8e36db678456bb20e1015b865

    SHA512

    53b518aa043c62e125e825f2f6cce75086a647db04fb6a7960e40cb26b42e8ed5b298b2d0be07399b27ffcc37a169cd3d55fb067bb96cf78c1fdc12b987bcf21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2ccd18947fcadf2bcb9d4550087814e

    SHA1

    0fb46bc2a68ca636220f71bd0db2ae83acd8bfb9

    SHA256

    67f547f48affc5f87cbaf342505be35462dc8bc555c5a03e435f779b3c7f72a5

    SHA512

    2853578c637100ce87bcca0e94dc4758298e940720079740d4b2d1f8d275f2e354faafec38adaa899f2e6ac12c69580d2d860387da827ceb1dfe442adb38731a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5bd2d63bb83b51daf6eb1fb6baebf3c

    SHA1

    7445794b22feddd11ea68e2fda974c21362e4f2b

    SHA256

    6ea80bc474a2651caa6ee7a3c7d6aee2962d0f880c6ab56d98212e4a3dab105c

    SHA512

    5971892ee6c1a94410d8a8ac9fbb684a4490f77debc18798b6d60db5a718e4a3d405215353c8050144e07dedc24348bb02c9fdeebe50c4e88f044b766f6e96f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97bc8df0f9ccc9aa8cb349351f4b9eb4

    SHA1

    a5d3516355358c624034014754c5af42e65b8bbb

    SHA256

    f770df6b4fde8b8b677a4ad4393a51c61d12bd318b5bfd332c16f5a2476815ac

    SHA512

    2c9299e9e82e5b642799ca2cf7e2e40c2fd2ae5b7b2dc0cf07a012df92fb2afccecfda2136a460c4ec8d7021aad37655da0a9e9c651fed40169424a8cec79aa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    acfa6e3d0b095925cfb265ba41747ce5

    SHA1

    21b4800170e413bc67418ffcdf5740c02c5a907f

    SHA256

    efb77ca4fe8124a8f3ebd1f8861a9c180072529dc7f76f9d4217414c59f04c85

    SHA512

    8c87f423fb881abf10b698758038fba9471edb2b644152c8c9b2c8817ff95d1fd02c7e4a98b2349bfe37d7e1e7f3a439f08b8381faf7f98e7d665cc8ebf0c69c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ad011d86e86773185eb0f5738427b52

    SHA1

    b9a31bb2a7c4981c378da97307e147d2e76c37f8

    SHA256

    0eaeef8162437280f8e9b33e88baa6bd608a9b7537ed313858ab0ad3492a0e60

    SHA512

    38f863f6bb8c0b74e6d85bc84d39e826b46efce45596f4351ee3862f901e188d3417aa660cf05a4c16faa74b4b3a4cae8881ea6e90123d5b8dba0a7db4ad6842

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e4ae5de363bd30f32586acb390a568b

    SHA1

    732d81c6c9b623f69785a560ec4b9075fb7c3029

    SHA256

    8b9f355622b3dbc689aea886833524b8b6dbf3fb2a719019ffbe15c0ab8b6f7d

    SHA512

    9e4787c3a71874c85255594b262a01fc30448542ec5424d747859c1a549bbf7b41739d3b00e99d752733359cdec9feaa15bc2d8acf19c8f8ab26970cd51042e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7dda7d33f420b44a2aafe624117d0327

    SHA1

    fd58ba56a2a502c3ae4f6671826a294779e9b764

    SHA256

    110fbb07fcfe35b010ced83c92923d37fb5860ea46321e0b3fed0c5b77b04ce7

    SHA512

    740865fab1387e4a5e866c8a3a3b3e3cb08914fd24e52700b86e031b174a4c305116c2de53f885f8fa3826506fdd3b35d48216c187d057d6805fe36a209379dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cee02596764ec3accadb313de4415dab

    SHA1

    fce16fc3b40f66358c1690843f9c28122026dc07

    SHA256

    6f09347c2f2c7bdfef7b92e8caf3a638e1293d83519ddf693c45990cd1d9eb1c

    SHA512

    36e6260eda144ff6c5d9498a3ad10aa82e5681740da2d85b9e7e19f9356a76bca6b4a92c84eeb4631612670dc422cfd1f0f75ce096835fa8ab2760d38707151a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ef248d48f08fcf1f1c414a6264fa39c

    SHA1

    f18dd5533884f0cc85cc3b624a15914fba332e9c

    SHA256

    84ec5beacd5c1c9041dc25da938cff9fedee4cb45c9ed657824eabe5887c7a58

    SHA512

    8b7bd68a252bc26f9ad57bb81188b7346ead521ca49742a48d77c043556c649f6590e140c143f1804c4ad83455fb824545d9883c07faed9df7a90ffcd8501fb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf51cc38f416839f257589da3a840d7b

    SHA1

    e29f9cf8e5448d3a2f16c46c823a718a7252ebb6

    SHA256

    45fe642972634c7457b4f3200c0043abb1cd3d38fd1e12cbbc014cdc2e464f63

    SHA512

    49799679d99de2321bab2a5052c00d78fbd8e3e027d946d53e6cef617d6251e0625d384b8d5237bc7eb5da5a66011996c515461f805f23aa3de42f5527a190a4

  • C:\Users\Admin\AppData\Local\Temp\Cab1DC1.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar1E50.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf