Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2023, 16:43

General

  • Target

    idle_master_extended_v1.10.0/IdleMasterExtended.exe

  • Size

    1.6MB

  • MD5

    e7477be0d0dd79b5742601968dc2a3fe

  • SHA1

    b8da7374a19c4b57c731f64a96930162e4a522c5

  • SHA256

    01d02247498fc63c3bafa501afb70344ea62afd8698a1239fc5d2af4e54cba23

  • SHA512

    6b834e25613b9c45974baa6e1c4f022489c2a4cec7ccb17ab06c09e148d3f6827f7a7801f4d44891b637df2534d8ac3e913c6ff8a5e29633c469444a83f60140

  • SSDEEP

    12288:EEkFtu4BTe44JY0AMI7jU17mOx2H+xRupUliqYKs84+wPNSljyCCEe:Ba0OjCne+7upUl5Rs85yCCEe

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\idle_master_extended_v1.10.0\IdleMasterExtended.exe
    "C:\Users\Admin\AppData\Local\Temp\idle_master_extended_v1.10.0\IdleMasterExtended.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=IdleMasterExtended.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b86d46dcd67964df248598988525d0e

    SHA1

    e7317894e9566c2dbb9bc2bc8707443e059fdc21

    SHA256

    76d4d4bcc4433ee2c1acb0f4ce52678d8dd27b89bba6bfbe5a8ee44bd4a25d00

    SHA512

    e41bb051ea8f6dc6acb450a92b614a4fb16836eca9a3cc0a56caa80eeb4c8089bcbf38ca217bd12f78f2d459bf1a822d954bcb83f6b21b8da6068e2d86909587

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3af39d6102ef0ae6cae801629b224cbd

    SHA1

    0cf8db66dee5ea931a6b26a62bb5ee4d594974dd

    SHA256

    96412dac5c42af50250eda2225d49e91b9f689c813f68633c72c1880e219d21c

    SHA512

    2597abd62f5e0c2fffffcdc58afaf8b32d38ddcdb85f8a67d2dcf1be33f6e29109ea1476d842466679025f6bdee6f4ca28f29d0f132e21644ebd5176206efd00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    848255cb20b9f09e7472534642f8cf54

    SHA1

    531cf6302c53c7c19ef4a632b3e9ffc4228d4719

    SHA256

    f251f02e6212ae20fb90776736dc31bc67eaa18d99c4c06d0affd0cace308e78

    SHA512

    66d530d51fd9ae91e52b33c61848e529a7fb377fc70ee19ea7c0558853b5344f1aaed0c4322299913f55276470afb081fdb1e42295adbf6e2e999013170999bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9151f2ee51a6d4c1c8b4664859475800

    SHA1

    fc613efdd15d409fe3331e4804dfb3e68a026855

    SHA256

    3d42b1c7f5da7f59121f544465426b74e9b29a4d56dc53915db18464fcd5ed76

    SHA512

    aa29831f8e713c08b79e9ecad4d658281d8a42d26359aa9203ecd2ee8cd52fd00c1750219a3af9964587ba06e4a3742bd6e1dd08f282cc5e6d4789f3caba462b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6042e7026704648e2d6878e5ef60f31

    SHA1

    afb9a9ced21acaab9a9310acc38a491e0af322af

    SHA256

    0e797680f6fd691271db11d6e024b1d241281e0f93b993de8f2918fabc3c486a

    SHA512

    3cbd7350f63fcceba8620ed6e5309b7f3e91397847cbdd4625cdf036cb497f47cd171d07400895391a078725d831eaa5b9b1166b55e9220cd629b499ee6d21e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26a67f23636e02d5e4b644067777e15c

    SHA1

    6e0fadaa5b3a6eedfb79dd9f812b4fd9f9aff326

    SHA256

    05a86b81be82b4a9ad9f96f452433f399e7134cb9d177545b498b3d32488f70c

    SHA512

    b826acebf0a5405714f39ce37632d0ebafa9cad66c746158ee55b05ab83dfddedd47ce778cd07e98733d2b2993481367a2363db25b2f15e22ad9ad94010ab890

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    010563daf2c19325b0800cac36f6383a

    SHA1

    d7ef3a7cd47d765aac03e990888f7761ef5cc8cb

    SHA256

    5ad20d4dd7805c18b3a59d08c4e70846469976fb6aaea7c5ae71ab41629fff49

    SHA512

    148a5735acbb25ac1fb6be34078f2d204daeb66876c5d8e0907159d929166ac5fe244f552425843a7ddd6e59fa54e49a75e223a701a8eb216603d9507ee21add

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e3ca63b1c08c01f88ce9030d56e944d

    SHA1

    b1cc38e55035d8f73a8d334e2e9cc6666f469081

    SHA256

    2a099e984fd2ec685cc93e808389668e24066e31fddb99056d08dac00c1e2f04

    SHA512

    5fe74b5fd387ae89823d8e10e57b88f8892425542a2e6dc68518744d7e1b61387c391fcf31f78bfa7b48dfe1f66a5e37bef197f408d8891a059cb9b25b0d363b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    347154741bc7b70ec7cfc526af288782

    SHA1

    77db597e30dbaaa242afac88ff56ea13e3564c0c

    SHA256

    aa2d92a711b6048b9a9444384a069577c58936a958457774155c3e43b7058b36

    SHA512

    5a5a01ff79710cbd72f6ab3757d82a2f0251fa97127cb58efc31d6afa100eb7141d6ef8007775a7a87e592b836b6778c2a7d3b3a822bcc082b74ddff784ad499

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    823cb12b939877be34eb3f06dd1e1426

    SHA1

    c91bb401dab3ad36d035b873806685cd464f6bf0

    SHA256

    bb2dd56a6590a49ebd7e9f4060dba992cf5286ba1f2de30649b291f8c4ade5b7

    SHA512

    d93c80c3b86146e789ced97642308b8f4dbf917fbb58dd9320ca6f1b1e2e1e60188caf05c39c0e5a539179351a6fd72f002ce9c01d80d47820ed8fb905fee63a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cd398a93cb27b164fc1888388db7848b

    SHA1

    dbbd640a6f8dfb2ea9414f73def66e4bcad28a43

    SHA256

    102bc9c3af69f30c037c1986eb0dd4b594f23e15075499f825776ddc0026bbf5

    SHA512

    a38ee6df9a0d8ea50c3f1aaff3795db252af38640a045c115cfd3f4b481f92c9ea4cd4df0a8cae74614796f2193f9fd7b16eeeae56fd2fc86999f7e8e3c5c530

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31e551aa10289a566d0dd73f6f9383f7

    SHA1

    6ef8a2c4b651357633b7bdffd0a6027bcc3aac73

    SHA256

    b936b651004a0375cf5434c728f8e022c1c900ea92bdf65065d6a337476db6e4

    SHA512

    6149db342ffeec442d7ebc31a61d03b1d600f26cd9f97329a547ceca83277bfbbc6a9d6ad3f5f8be7bc4403f9e82723af5e59a1aa8b53e61d09090e6cd271d7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    649ef00af0fdbc753cf642557fb2cf0d

    SHA1

    d64a364729e787b80c50856c89769f9de6e89ca2

    SHA256

    56cf7c5907fd4a8f1dc6e494cc9befb1ac913362761053b1875b73aedd1040fc

    SHA512

    0ddbfbf0ad141fa158518681ac4b0ab643de1db9f94c9a85395ee2b7936be7626178013b03250f4778a39e1f39bc3048212af6677f8a5729d066b8edbef739fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9dc20424a994cb2f8a43fd144bd9d54

    SHA1

    c80094a2662b475b28469e525f4507df758e2156

    SHA256

    5e06c038219a2ac7bd57fb4e71e2f1c6bad805b639c0ffda31e4af960c19b370

    SHA512

    d756282292559d3d36ff0be6cc2237bb0ee507ac8015b001c7db1c683cb142a47cdf9f77bbe4fc93e257e3d50c4dc5fe0cecf477b4b39f5b2caab41436344dcf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79aaabd266247ea4744ff56bb89cfdb2

    SHA1

    daae2a4db14a3389199370dc5604d3c6f5c1dfb0

    SHA256

    303e0c578b9db1d6f2575b2958ad2ee255eb2e5a0f12a1493e4604b4026253d7

    SHA512

    cd176f6cab7f41e4f988b4330fb84469a18ec3ab8c989ed6765722da0273dea2dc671b0c83a3473105d8cfb857dee60fb86de69648d7822e7bfec80e29b4680a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c00af0bfbc29b13ac1c69f9665a41199

    SHA1

    76a7ec88d032fe09faab6527f2439e414981cb99

    SHA256

    89a09e0c324c64ad4349aa0e9a0299e8803161cb7f8ab67e4ba6b52928d3d4e9

    SHA512

    0c6f9ec0db39d228f50baf0fac6db850b90cd15e1a862b4c63d2766bd103b39d1ceb26843551882a4ff99f29028fbc5d84a7f40bb3017634a76c0cc1c57c18b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7676dd93ee279ff32e471ea709e2f756

    SHA1

    66721288b727f68685e67a974f547597ee404387

    SHA256

    436bfbaae72ebd65e2c3050854056d06637e32d1ce4e85b4c234d69e9b121684

    SHA512

    b73a781019bd717ba29028fba4ded53c70530438f71c3b8347394b2e1815ac1ac22b83c0d557facec377b73be5e5487bd6b9df008ef60651b4b40332349141f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    817cd4655ecfd2bb9378d603d64e16e0

    SHA1

    b9fd2455d61387172efeebd51de676e255c8aa20

    SHA256

    0c7604f88172bd19588a733dead599d16d0b7df60949d7540154b45e9613d9e6

    SHA512

    32b54227417580570614bb3c9897c9bc3105bf5ccad1451be3d6721ccb772755a65468367ab6ecf93765e6b675a461986353001616d220aa6a08ef2eb2a666dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    508e13dddf3f8a56ab8f65ffccc52489

    SHA1

    a919806b39efbf1af63153eb4aae5609c875fc49

    SHA256

    f1b8760eaf274336d3f0658571b9206109f76d004d3a7fc051b529280e29ca59

    SHA512

    002aea69fc84eacb9f39af2a9231ace1f6883ebeb659e2d6e076ef112c797043936154dd8b09501749cc51fee08b71fd7c5aa3551df34348771c37158ebd6a37

  • C:\Users\Admin\AppData\Local\Temp\Cab5340.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar53DF.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf