Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 20:03

General

  • Target

    3dc1a166d6423dc61693c32825748ae3.dll

  • Size

    67KB

  • MD5

    3dc1a166d6423dc61693c32825748ae3

  • SHA1

    79cdd79036dae370c0e98aee7abe951440b1b4c9

  • SHA256

    3f5e97e6da8940ebb76abd9d9badc2d0b7e1c6f291a91a2ce2ed5b359bd0b606

  • SHA512

    3ba08d98f7cf1cbb738a01b9d045211209bca7056d9e77f914da083e4219cb1ad3cbc6721eb71e48021b72a3e627a9098fcb6dad1c547d805b0b852a8de3d2aa

  • SSDEEP

    1536:eKaouK0rof8925RMehGW4t6cHWP3BqshuqRIf/:eKaouK99MqB4tk3Tn2/

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc1a166d6423dc61693c32825748ae3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3dc1a166d6423dc61693c32825748ae3.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf742cdc211ecc9356262105885fb5ed

    SHA1

    dcaae67ab3b533810d5d0d94e381de4e8591adf0

    SHA256

    d3eae6c9d7ed39567ad399737ae9f4dca40fd5b9ceda1a039a67935d9e751921

    SHA512

    08705e0efe201f2cc17d2cecbec1f7957ef962156b16ef5b53eb6a59fbb8f3e8b0fbb608fa45c006f59db87462f96fd3b468bb8169068e531ef40557e136eb3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4390a97ed5bde5f956df1868c00ca911

    SHA1

    d2995c1ff691cc5037904dc829779111a9586bb6

    SHA256

    dbe93c5bf33ffdd489d3ae2b42198e6a1a1297708054ba9650780518717c77df

    SHA512

    4b466bd389482a1c531e0a231a2a86a23fdc582cd66734e8cb765ba258498e7ef2941631a56fbf552202dd979209a313587683d389ed61b9f0439c2aa71994a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f693682bc975bdb98a897eb864649ba

    SHA1

    56e2c60c41eb4fc4a8dec11f4e02b26a2fc267e2

    SHA256

    bb17369a077922d0052b89fb59268f235daad223de9a5f4f7930e5cee0168086

    SHA512

    96a20f83c2569df09b6e0841389274d176ca5394bd4ebd08e68730d238d18d814efbd52c0a1476a393cf31dba883b59c0d07bdc689c1e74e492697b766089aad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf8ed3fc923a22cda71f88bfa4172332

    SHA1

    daebc48e8d0ff62ea7466136533da632743b022a

    SHA256

    315b818bd917c122c8a02b3d63a630426a59e7d5856d535d592b38fbb11107ee

    SHA512

    4a741f7d86a1f56e4f79983c1e9eb74d7154437ba8e901b15b969cb1c57dbb36bbc717103014294c6278c999f0f2d6970bf1b48bf8a061b62d821bda7dae91f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9748b384111a7238b0b462d383409c2

    SHA1

    327769998472a9f63eab85553417477702cfcf8d

    SHA256

    1f8ec98fa594acc5edfbb4d094eb787b94daf647cf9359b49bd88a663a22515a

    SHA512

    314df98d21be8d16ec232a00e7e6cdee1bcc7ff53a5848d711fcbc774dffacd1634376d7a80d11714b4617823bd5100129976ac7255b72ff31343a28bb006e20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    694e2ff33239e95345a6fadea7a6eae5

    SHA1

    484fe86ed76471b550c4d3aa61439988b2903e55

    SHA256

    534bec1c503ac2966b1d253bfee7f131fded6bee2ef7610f085920798612914e

    SHA512

    128eb450d08fb187527ffea87967843f038e49e7c8656fde21f3d6e3cbe01d4efd83194cb83456a1ba0b938789bb3b8abc59b497afbc1b680e14e3b49a896db3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cfac7b1394c2cdd24723e5a024bf5179

    SHA1

    8abd8c5ad1691805a4cb0a8b5cec8405887e9823

    SHA256

    77d177fc9e3a668fe59936c3451c93ea7375a2eb13084403d8c6eb15224d9f37

    SHA512

    87661acabb26b3b0d3c66c2fb453580cf6b461542bb6ea20fc1ca6ef37e4a3e7578fac643cfc8e2fd771dc4ccbd0177646eb03348ba9947ca2da619997ead6ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c8cf96ff1a38d1b4354b02e6edbe963

    SHA1

    daa4b088291ce9b86156b656e4811156a1aa8aa4

    SHA256

    13e1ce5fa1179ee9d228a7844f1174f6a621d74e284603e2df478faadd087433

    SHA512

    72007387c3dc4eb91aab9f47285392ba242a8d7cf6b539909c9d525a9dfe338f2f315b4b762f7a3cc94e1a3a7b8d1c650b9a8e0023340bb77c6ee46c1eaac536

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b4d745210cbc7d18a7cb34144f2bdd1

    SHA1

    7f355909c53b1a3c631a9a7d15264d8ec97458fe

    SHA256

    2190d378a150dd583a6c75ca8bf42e4b9663bf14fe7830cde15f8489a8133f5e

    SHA512

    5d1f231040eb2a3fc5e0a0c566fbfb84dce85d0a269b00e167b68c13bd376adb1ba6b008aaf85407b00e8bbea36ffa4872c1cf718ebc05d0beb873caf72dca7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7589a818cd36a830d97de85227b15b95

    SHA1

    8f6ff251138d2d24e051bb231678f1faa9fe662c

    SHA256

    9f1b009d3a11019d0c6ca017477e104cf1564a61f44720ad9e24b17703e026a6

    SHA512

    84f9cb64c1a40eb2f69cde59248a53c7d60fc3b76de5d6fabf3eea1a794f2c4e916c5afcdf6152ca12b99385bc8189f4a8c0e39aee408e621d173a9d7b9aadb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ceae6825b7f620ff8d59933563c847da

    SHA1

    0f85c6397dec47394fb0d0fd868d42d870b6a6a2

    SHA256

    2bccb32b97bf108781032d57cfe9af14604e2112cc4bc5d54f365bf1e105d88d

    SHA512

    63d7a9fc38931a245bb71a60f58db75bfb2c0f512fcfb8af3aa19be451f4c2de62d99f258fb94ee1a3fefbef2986549198d3318f788e862f4b9583437034077d

  • C:\Users\Admin\AppData\Local\Temp\Cab4627.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4669.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06