Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 00:38

General

  • Target

    1d77479b1a250f6baee3c2a3b6558b53.exe

  • Size

    461KB

  • MD5

    1d77479b1a250f6baee3c2a3b6558b53

  • SHA1

    d331f4e607d0ef769b54a90a13bb38cdfc32c9f2

  • SHA256

    15ac00a1cde64ff507d7275c2c136bafcf6073fe36ec3b671198d5fca48f466b

  • SHA512

    7f86f6355334959df281461df07ebac494acc6ccd8082ee6451b5e0a2696c68bdc3b6a730ba9057316fb04df8c7dfbcd7b58599bc6e275f72bf900e517eb06e5

  • SSDEEP

    12288:iPptoY05ee6U1gx/ewbQTSoKZjdDjpcPuZ:U4ee6U2/XbQYDjprZ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d77479b1a250f6baee3c2a3b6558b53.exe
    "C:\Users\Admin\AppData\Local\Temp\1d77479b1a250f6baee3c2a3b6558b53.exe"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2100
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://crusharcade.com/ca/thankyou?s=6%2BHC0de1s7Wzt7WytfPP78fAwcz%2FxceywsHBwLPGtsWzu7XGtP%2FFwsrPxsc%3D
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    e8e540fc74a78093581483a6ec0ec7bd

    SHA1

    03fd61030caf9d8fcbd92500f2e7401212af59ab

    SHA256

    ff027594a7b23ac3e05a8d5c57e37216763e9773cd82bb18139d20d024994e95

    SHA512

    8b0c2d94caf9fa5d6ec33329ba11d9e26cfeb33ce1b54f0488e20275d8c504ce6d1d0b3e72e5fbc35fa747d606baa904121e3451d6b94ef4b6fde7f2162650cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    2e11948f5eeb25e90c7e73166f112d48

    SHA1

    dc9f2629511de3d8e28fed8941e61b98f387f1ab

    SHA256

    189f672342c8900de0693bd1c4e8ed82d01549ea0f524d065b4065f200da8f43

    SHA512

    0b71535086004fd855730d86c9d2dab0ec17dd22681be07685a1ba83372330da6872ca3e4c9c2fb2351380e8744f0b4f895769bce14a077918a5a67dce446a68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d06f06e6d536bb3984a05d7bea7be6e

    SHA1

    00aeb93e2cb025919478151f166c51fba500ffcb

    SHA256

    b758d422d8e58508da3f28e124e5ccb595fd274df0d766ab6e7b57270f4bb429

    SHA512

    598fb061f44f2671af83b61e0a464575a3aae3fbee035c6e1f98ed23de075bd40149b218828dca0e4b41b6dd957685c3ce62e798dd0de019cc01ed531953d7cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c85f7b93c457c36354ed189e5e08063

    SHA1

    bbb426db507f6e911d7baae57c6e56ea603a52f7

    SHA256

    5537c8d353337c97c73b59999018b5123fb48bded11e98a3e49d1df68dffac85

    SHA512

    fe5c62d578c85d563d0892ab3f6b04327a8f028c45524a1b63f1068650b6cf3914b2f562dbb1cf51b5eb3b4db7078d3f26f67a4bc8937ff43eb29c6094b2ffbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    406c9d665578a80582cab6fbd62f94ce

    SHA1

    c6406d3cf787aa1b9e4f8f9a8a6506cada89759f

    SHA256

    7cef10661e386f9ff54d3a1e9555922da22f95dce3fa48b75c5f45acf171b1f7

    SHA512

    041d0bb2a953bb51a6aedd644de065afeb06aae276f364f563871ae4cbc375691afb84192d4474cd815e3f01d15d68492ac1b350bbadb6e7e0f4fb8c37184f37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1168fce85d26c28c4ba457a2bb1d155

    SHA1

    129c62becba279219207bcee98ed7e8bf2c5e50b

    SHA256

    5adff356e1faccb7d7753c83322af52b2562486d6b8a63d244cbbccbb8e5f3c0

    SHA512

    8c7c1c1469f3ad1227c6270c7d58035d66e801d580944a0885a231194392979539ded8f67f4a45fda9a889680316e276680a97a7ec5dc28e46c88fd0eb930b95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91f41a5babb90c71a638f8dab46a7328

    SHA1

    a1ef38ac969f583cf3dc98499a9fdeffd9395256

    SHA256

    ccae40005c500068433e516ccbf639cdc059eecab9c9bcea4d098f0d6d5679c3

    SHA512

    ebb4ba19b0c88b5ab04560d0ec2d889b691e0262568ee4a3697b19b041260f864213961c16888e3fa7f6eab48fbc51b94f645b26015e2a6c16fefd7268de2316

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3f0e7f3e8cf1ca25b0e8783c981594e

    SHA1

    1f131f2357b4317ffec0d0fff581c8d603879233

    SHA256

    6edb1e105134c10f56b99b4058931afe8ebe84551f7642c9bba6342963ec135e

    SHA512

    677e6be28c0b1ba57b7546fd56c107835b8d1be56e916431e585cbbe71ec161f899c9b657f2297ca62497bd99d88e177561d39fb9ad98f29ad1e12264731c523

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ae14f62575734129d4a9c31ac31208a

    SHA1

    7e7d3b9738bedc6339e0764ec9243e990f32a19b

    SHA256

    d1ce065f3852b165fc71c8771ebebcfd23b80d9b04c37c86c13f8a9d0aac3243

    SHA512

    10a80e41e77ffcf9c1a711a0cbc2a18405461fbc1ad012025bac3d74707204b1a1ffc03e0888680a525534ed158c4e90978c6ea9e561c1d4b6197acbbdf7fa7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3bf3f66e7a8bf894c42c86795da0f89

    SHA1

    30904a10234f73433a3e7162c49bbfd123837235

    SHA256

    15c1eaef368227d57a19e307b2f3a2ba5a894108802dd8d112e33b10bedad67e

    SHA512

    873a527ecd1ba88b8bf5cdcc6ec578b75beb1c8d6dce25f7767cc544e0725724cfae686e0ba5652d9b1f01c1222b0b1c5ed8fadadf95f6afddf33ced6cafe7ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3683e3ed33a138ffc6117aaa521eec4

    SHA1

    e9d7912782422eb188a51ae79f69856283ba233a

    SHA256

    2bca319ecfdf89b2f1dc62c5448da3a85482db07fc64cfe90fde68704ae7a2b6

    SHA512

    f290e6ba34c9b00c1e8c1d8c72487eb1c818d569681091d1c4eefbed9b43e3e738e0697dc8e0bbecbd4e98e7110b4a232e306b42359ba75d9795261429b92c30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee9a054e75a2473cd44cd68655356e25

    SHA1

    d7e6c189e7486d2d8fec635d24ac24ba55ea663e

    SHA256

    51689d6c808562a8c87b9ef5a522660786211a5f66e0bb5888fe576d2dd3150c

    SHA512

    db1a50c475a8a3b409db2b74f586b5cd7cd8dafb746516770dcd4f758d52ea64d3beaeb80b7dccb1676d860c3082ecbf46bd6eacfb616b1f85849804854c67c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46b8a5abd6bbe2da34cdeadaf2c96015

    SHA1

    b0c75e5a447a1ab314617661a04f962fb3010a6d

    SHA256

    d5128794f1c3b822e4e524a8fa1e309b6b599c0d840ae069cc9866bc03817941

    SHA512

    99e02ebb48da0aae3ec1c92a9ff2e36569fbac5b5813aaa3b2d7b012c322c520ae6c67bec2d7b9f46ba1a0cc119666e4c3ee6df6b17d65f5c1c70662f71a225b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    050cc1ef3d2f126e109dc1ddd54d1166

    SHA1

    b1bad505c9edd93f5ea10532f49756a1061a16d5

    SHA256

    f8daf984e5bbedae19c466e7779da965663fbad9fc2f5f5a6bc433c06ad068dd

    SHA512

    7bf4da4a3de45f8adef2ff52ba2bbd1e650f1746ed37127bbbf042e23d48bf6a5de0277db82c474b39a180e399e4fc5894cffcb96621fdfb6621e56d7862e425

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    cf6318018e4557348413776a9d57ddab

    SHA1

    84c9ac26190e4b8509c1cdd52f577716b3336016

    SHA256

    481d34ebee155939bc8e8c190b3c6e567282e2e08803cd934055c3276d114438

    SHA512

    c15d5103a718195b11be744b08a9dec86503094bb1ec53748f60b7f31330a73912cb2f7b5a5f7cd0d1ce29a5bc25eb8f986ddd07b0f66a75d516973f5843364c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\0ptx2pp\imagestore.dat

    Filesize

    1KB

    MD5

    569cff7b88d2bbe9df7cb8880d53cd30

    SHA1

    0cf43c2f21d582dec99bafccd9dead7449d4e6ed

    SHA256

    9d7104435b1e0f98489d9c429481e89716cad2aa457d1246afc83200695710d5

    SHA512

    a613761ae3fb8239973ea2428dc79159f19d17fcb9e9046252f4b7081162ef615d3f0eeaf54b5ef2dc3e25074776d868d58eef7192936a8d36dfaf400431c74c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\favicon[1].ico

    Filesize

    1KB

    MD5

    4151d6e7572372d781a007caa3162cdb

    SHA1

    33d3f5d9b3d837b1c40cd89695aec459263febb8

    SHA256

    b564c7e8933ff4285726b6695c6b6de3cb52b11360d1121a6842c8cb39f2717d

    SHA512

    fd7aabd165edf80e5404317ce519095c69d0f8586acb200e9d8c5a12788e39c3222b48d43a1e18665138a227695041dec3b1bcc49408f24b31405eaca566119f

  • C:\Users\Admin\AppData\Local\Temp\CabB9ED.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarE552.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2100-20-0x0000000001F30000-0x0000000001F32000-memory.dmp

    Filesize

    8KB