Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    362s
  • max time network
    367s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2024, 15:12

General

  • Target

    https://cdn.discordapp.com/attachments/1169014829235830866/1191759612567879721/HoaExternal.rar?ex=65a69ba1&is=659426a1&hm=ab9ab0c0bad33f7413557b4335d5987cce511cfa7179b678522af7f1cce71e3e&

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/1169014829235830866/1191759612567879721/HoaExternal.rar?ex=65a69ba1&is=659426a1&hm=ab9ab0c0bad33f7413557b4335d5987cce511cfa7179b678522af7f1cce71e3e&
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2720
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\HoaExternal.rar"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FA6EEA7\installpy.bat" "
        3⤵
          PID:1176
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAD9C28\installpy.bat" "
          3⤵
            PID:2188
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAC9A38\installpy.bat" "
            3⤵
              PID:1956
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAB3308\open.bat" "
              3⤵
                PID:3060
              • C:\Windows\system32\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAC3718\installpy.bat" "
                3⤵
                  PID:772
                • C:\Windows\system32\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FA55E78\open.bat" "
                  3⤵
                    PID:2820
                  • C:\Windows\system32\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAB0778\open.bat" "
                    3⤵
                      PID:2392
                    • C:\Windows\system32\cmd.exe
                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FA92948\open.bat" "
                      3⤵
                        PID:1948
                      • C:\Windows\system32\cmd.exe
                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAB3048\open.bat" "
                        3⤵
                          PID:456
                        • C:\Windows\system32\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FACEC58\open.bat" "
                          3⤵
                            PID:2108
                          • C:\Windows\system32\cmd.exe
                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAF3958\open.bat" "
                            3⤵
                              PID:2984
                            • C:\Windows\system32\cmd.exe
                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAF3658\open.bat" "
                              3⤵
                                PID:632
                              • C:\Windows\system32\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FA613A8\installpy.bat" "
                                3⤵
                                  PID:1052
                                • C:\Windows\system32\cmd.exe
                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAB89B8\installpy.bat" "
                                  3⤵
                                    PID:1628
                                  • C:\Windows\system32\cmd.exe
                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FA647B8\installpy.bat" "
                                    3⤵
                                      PID:984
                                    • C:\Windows\system32\cmd.exe
                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FAF3D88\installpy.bat" "
                                      3⤵
                                        PID:2728
                                      • C:\Windows\system32\cmd.exe
                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FADB488\installpy.bat" "
                                        3⤵
                                          PID:2892
                                        • C:\Windows\system32\cmd.exe
                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zO8FACC188\installpy.bat" "
                                          3⤵
                                            PID:1972

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        63d5036bb34c24e6a986c7673bb1731e

                                        SHA1

                                        4da6f23cdba549fe3807d4c087361a60b99fd539

                                        SHA256

                                        057eb3af21907fbb541bf1d9d04f28ba51d1dd58278850654c3b9638a706b146

                                        SHA512

                                        a586e16b3feb5d42865eb715fd54082a008de4c1fe2a95cfde573b76ab61404d29620dc8b3832acefbc7ba72e56fe923a1bf3242edf3f286b7b8b98fbab5b978

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        82398fb155912d9f7f9ba9fd094d14bc

                                        SHA1

                                        3438e87be9f67836a4f44c1be2bc235962fdc19e

                                        SHA256

                                        dd7eae489a814fb64e6904c385e566f278d756ab35b24de01d13259b27387892

                                        SHA512

                                        e86d67c806994e8f4a5fd4dbf831b21344307527eb54c15d0523d20986d2c9ac0e9abe8993533a78733b38bb48ae3c674af62e6f7a7e05662238165394cd71db

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        a669464bc6cd301fdad35630a71cf9a8

                                        SHA1

                                        c37c0e9440c1877022727ba9ed548eb0639eaa1d

                                        SHA256

                                        fed216223f021ae97532e68aac4438f6b8e580ddf27967984026278a1c54a42b

                                        SHA512

                                        72effd816865e41669420b044ca7ba318c50bab8f9fe653677473d394927db2e13994c0c7da8d845c2df55264a648eccf7cdafc1190911cd900fb82cb5cbad26

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        bd9cdc745c50f8477da23ed7729a884c

                                        SHA1

                                        8e6a2ce4fe6ba8763d625870cd6830d9fe66c4f3

                                        SHA256

                                        baeb18c100fa270f356c2755277014e81008d7752437d996ab2885a188ab6037

                                        SHA512

                                        6a182d65881962007e91893a4a446863d2775c1e8f9c866e56ddedd20992141b34663a077ba5508fd5af95bf0f7f44eeddc6691b15353c034ac844f601fdbf98

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        394d23506cddb271f77507e403e1e0bd

                                        SHA1

                                        561c2e26b2436c6af7270b4048cecaa2716e55e1

                                        SHA256

                                        da4710bab47f5458072b19999d2833e9439b68ac5b1838aed65ae41e2a347345

                                        SHA512

                                        0623b37d65e7353436e67f8deb4db2a939081227c2f85206d7e0842012f10cb50d280584a91f0b6447d029455da29340ea37f3e94b5270e5c08c4c012cbfceeb

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        cc5cc116f299cef380cb0ceb8ca86cc4

                                        SHA1

                                        0909b4f5bdd3485eb73f4974a928c30b3da0d140

                                        SHA256

                                        cdac365652d526694b71857f59f7e994cd0ce0f31f08d8b2c408d0748590431c

                                        SHA512

                                        e3807efb2a7f685e53ef038703e97d69b6e13cd6977d7bab53ee9375f442cf94b5fc765a7a5101c7c3d896a21b4916c7fc3d5fb20f29ded57acdc1bcc82501b8

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        ce092843065b12f09ce77d82bc143013

                                        SHA1

                                        60e2f922373481e69cddff60b91ccb6e267f87a3

                                        SHA256

                                        f361cea14d008f9c751d85b55a892adba7091a4c95a56160ebc80b5c0e1ce8f4

                                        SHA512

                                        045a90a6ee54f63eef1f1de3906ac4c3588ac197d96cefc29e1313460e76706d65ac0fedc08d77b4d468a285d537544c92627a2a174ce9ff463a136dcb6395ab

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        1defbc82418bbe1a5c933310b1e0274d

                                        SHA1

                                        853ffa1f1249263d892e00db7ad58761b3251069

                                        SHA256

                                        e5eb881afe143fb5b0e5febcf2401099e4c79f6b2a2dee6a20653eb25c7e8d48

                                        SHA512

                                        d5d47f379b660232b74b63594445b6b8611d59a8a9db0610ad665fa8d0ced809bf8a332998023920380d53cc0604e8823838e4519a5bca2acc1a7cb022191a93

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        60300f01cf347963c1ec3bf402267e5c

                                        SHA1

                                        c7458900faaa26490f4c34769bc9d65d8fa43e28

                                        SHA256

                                        cfc5a49a927be9e05d5738e4a002e324daa3d3156dfe3bd71fc06f08f95ac5e4

                                        SHA512

                                        7e851237367fb4cb7f8ecb66c9308e89e93444e8406b8d14e6ca6eb56c390b49e50a0d02d82a247d3d424be904a575c200c7ac58c2d59f29a7bb3212153fef0e

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        68d48330a42720d5667faddfff549653

                                        SHA1

                                        55873c79879db49043d3af1237cc481524b2f518

                                        SHA256

                                        a6b02e9090aa384cab728e54003d56befb26b83e1666df083b58e8fda6407aa6

                                        SHA512

                                        0a0ae4b9a5c8d14855ef3661a40b26bc8544535c28725f397c33b27b1f8425669686156caecdb192a07bf46b2ac3726d5a6f3c185835b6168e448b5d34c2bc95

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\HoaExternal[1].rar

                                        Filesize

                                        6KB

                                        MD5

                                        55e2602b395b323781ffe5b910ad7789

                                        SHA1

                                        d5d335710ed273575847a2e899bab50a3c220a1d

                                        SHA256

                                        e5947a88b30fa8dce8ef0e0c35a8696f8e10d2c95b3358f2433a245cc2471a99

                                        SHA512

                                        7650e6edf83b1f1e1a50051fdb35245aefa21d0a79d131ee148e6d986cf3ff61c0e0aebaf1bc01bade8fb520ec83911f817161dd64f50ba088db3892c4bee07d

                                      • C:\Users\Admin\AppData\Local\Temp\7zO8FA6EEA7\installpy.bat

                                        Filesize

                                        598B

                                        MD5

                                        f3cc941cdcdaaa4199007c9f3ba778df

                                        SHA1

                                        5c2308d940821b84927640a4da1c9c6c353a12c3

                                        SHA256

                                        8068c6d4a453730306714fb6b6e8d3b3d33ded7fd0cd24e249bc2a70a03c2947

                                        SHA512

                                        96bae023796bcb793974015c8c1a9e60819b91688215f07164e0eb5b54db3917f91b6fe7b7db4e4ca8e9e0d5a75c1cc562d863642866771cc9c3d5d94e2cd4af

                                      • C:\Users\Admin\AppData\Local\Temp\7zO8FAB3308\open.bat

                                        Filesize

                                        25B

                                        MD5

                                        25deefec15fe4849328481506a7cf682

                                        SHA1

                                        334d4490370bfab1e34cbe5e3042ebc04339fa11

                                        SHA256

                                        a6fc69b1883ee88c007950c7ded068808eb7100a71bcaf93ceaf4c50441713e2

                                        SHA512

                                        57558420afc50f864f31354aa709fdd9d85cdbb707734c95a10e8cd88f5b78b0475be0a076acbfc70bb91c488278f200ac035f58c891546398148f0827c81013

                                      • C:\Users\Admin\AppData\Local\Temp\Cab759F.tmp

                                        Filesize

                                        65KB

                                        MD5

                                        ac05d27423a85adc1622c714f2cb6184

                                        SHA1

                                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                        SHA256

                                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                        SHA512

                                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                      • C:\Users\Admin\AppData\Local\Temp\Tar75F0.tmp

                                        Filesize

                                        171KB

                                        MD5

                                        9c0c641c06238516f27941aa1166d427

                                        SHA1

                                        64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                        SHA256

                                        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                        SHA512

                                        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06