Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 10:43

General

  • Target

    4606ae14d89adb2cd3979f325d77c675.exe

  • Size

    8KB

  • MD5

    4606ae14d89adb2cd3979f325d77c675

  • SHA1

    d3accf8754c187e9f66595bc81ccc9a612e0c66e

  • SHA256

    108e18039beb1a205f8dfa2fd86e742ba9949504192e5b259eb4badbd6996733

  • SHA512

    ed8a67d28b8c3d977b81cfee2408829e1e6b58a02aaea373f0ce070b2809964f18c2f2b0eeceac926138a4a116eff2170b2955e355843915d129adb81b80e3ff

  • SSDEEP

    192:EGvuGR4XpmOU54AxAwCMrpY728LqPZo5LdCfSZ/5nSO3:G+Ks4AxAr6+29PfS7nd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4606ae14d89adb2cd3979f325d77c675.exe
    "C:\Users\Admin\AppData\Local\Temp\4606ae14d89adb2cd3979f325d77c675.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\program files\Internet Explorer\IEXPLORE.EXE
      "C:\program files\Internet Explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a11d742c04ffbce3859992901a35712d

    SHA1

    a1da9705d6642128f94c009f556f9501de2bf81a

    SHA256

    04b51a8e62aa7b9d92875b7a252e62e5a36d00157c25c4ca7abc8bb277e07dbd

    SHA512

    619bafd3b83b598988d36ecef423181499caf6c8e3079b186869f5a1c3fe7640edc9b8d622bd200b666867b401e7bc78c869b5451096d6760e56576bc72651ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ed449c57210bdc0bebc8a24ca668494

    SHA1

    dc9dd979543128c2e84b5b1e8ef7cbcea41cd5b3

    SHA256

    4cc43b0053b1f1ada2a9fd08b13eeacb7058498f392df4aa3d112ededa9d8e2f

    SHA512

    a8bd9fc38d0228d156373de22e98447e03c881bf92019eadfb345ca49959b901619d57dc27e790bf66a752e51ae60ccc597730f939a2c86077ba744c5c19090e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18c1fd785c5d99fcfcbc3f1b19c8e908

    SHA1

    3f9ac282f44eb8502255544b79f887c8fff04186

    SHA256

    99a9466bcca6edf13398f5652dfafef5cc45517620b016aa64f81a5522ca9942

    SHA512

    4f05eab72bee4c03d3ffa18ce56b95298ad7dc8b20cf6f0eab326a448423e1169b399f7595d1d3d641ffbc4b128fea4f6236defbd85490043b16938944c42901

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    658d336ca141a5228dd1e31c0733285b

    SHA1

    78426791906a3874a97c4343106b4d7c7850d459

    SHA256

    02b1fff99c1473ee3c2679221360efbd04d285f51d0e9ad231bf5b616e044a26

    SHA512

    5ab5f414b468e4c112a3ebe8867a1b9549d670b15890c7f1ddcf8c7d5d6f0bc55ba178e473a6ab032018e1ce8c6a09516514bb5f3137cdd13e19087d6dcbaa13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b428fc1cb7dcf55a53ec7145768f1c78

    SHA1

    ff7903e11b475f77a10bfbe5d4fed78751fb61d4

    SHA256

    733e2a20564d6011bfef0b4d8877813f2ce459116edcd3ed58d97a14bbb545de

    SHA512

    c8246406330d0f25a6056c336b7df027987eec4eb6d19b9204c555a3dd224153f94530f8e6ec7edb7eb792afa12b8def24d37fea415beb094be91fa4989ed9e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    937df95011fdc857fa21c4f9a41567ea

    SHA1

    2c0696daae29b7e4f2c924fcdf187e0270bb43fd

    SHA256

    eee70d2a8d576d7539177cce68444e7c952d189cb9f224b3d0310f9504461bac

    SHA512

    1f863355984c6e7f1cd4fabba65235d781a9da067c081506e121d8c806b4cc961004d5a1fde68933a71ee76fa0520b60adde15c374ae599ac0ea6002fbd94131

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    724b41d67dc3cd0a9f443e5a3874e434

    SHA1

    be4e90a4ecb45ad689d48673fa66b5b3e59d1121

    SHA256

    8ee7fd38b42fb0f7b78070e818f13b5e216fcefa37c50166ec14a136016efd12

    SHA512

    106a8fcb0ff90f3535c3c931466e3ba62ac2bc7aef2bb1abfd101a0fc4685d0c0975b5ee3cd281d8583298273c5005f4c1d75d01f3d922c525178de19b765d14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5aa7a6dd1fbd27707dca9fa658d9e7a3

    SHA1

    1004d7db82af4ac9596d89be3e82c65146e373b2

    SHA256

    3436fdc177a2bbb08b00b17845fcf57b9b9287c5e2084321426ea86fd1d36ff8

    SHA512

    d6deaa4d8b646a1dabab33a90fee39b7af9c93a379e55c46458d051acbc702dc04a41d3599111ed88405626c715da48c97777e96c45c73e0a3d933b2ff20fc55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18a485e452dbc0ef14c2628001d990fe

    SHA1

    1ae2972763f8fde26c25f363796bf52280de861a

    SHA256

    7dbb4fa2466a682eb7f78fd6ee7394d05aaf2b7bc70decd7b3b2095767f5313d

    SHA512

    c6a770a4b009091cace3be0a190e65fb770bbe5be784f535ae0c130fe9394a050d6c94d873c9ad80b769d65558d831d946a413beb6940e4851f9a7213831b6f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b9523041a94a70de7d08ed3771e89eb

    SHA1

    b46db1cd9d1ed635d42a2571ecfb8ad616c4dc2a

    SHA256

    c1523f10c24179ef607ce7cfb1412c0c93b5b3feea3ef07684433cd4bf81bdac

    SHA512

    e327ff823a52f932c1e94b3d4002c84f4beab4abf29a0329d4ec919b0c5713562965d0b511b007b3ac6ab0a1d7bef82cbddbf2c0983038c630cbbc5de6b069f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79846dec3e23ef874bf86ebc4ea7d9f2

    SHA1

    608dff2bb47ead7eec587f9aa269b00b04ee6bf7

    SHA256

    78446a9231f8df880eeba4ad535ae7ca6d4dd17cd18bbee13f55a11e7bd50523

    SHA512

    044a8d2da7015eb7b6f92caacf2e20a247d6a9c186e6fd2c05721aad7ec9d0ca9d29ad914eb6dc92ec9368d99be92168a16784cec3eea8c80264c8abcb7bc858

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43cf4786336c94a1c62ac0dd60818c69

    SHA1

    ba097733203cf92506b0d9aa091677d3153da94c

    SHA256

    5a4ae0c9619f66ee108c224eabdf08d47fc9497b04b5241f8892ae8ed7c81c81

    SHA512

    a75e39bc3e6acd2e390a9fcbe0816721929072b63f6b0cbfaa30bcd2e2d3401740863dc8d33dacaaca7d1b43e715cbbc2bf147db7d02d381cc8d4f4c72043e6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    526d5b3662dd1a823bb5c2570a38655e

    SHA1

    5d99cfad73e2f8f4bd51c591de442082dce50b6f

    SHA256

    28a3fa7c10cba9c301e889598fd19a4af45113d0e3b67b26f43f1e4f830f0c95

    SHA512

    2892ee4181406fa8f3a64c6a8d53ec6f2a26ddd2f60d03e08908010282e04947eb8ea9ce4ede1a9475195312f92343b9c408ebdc308318d0808a50e19c02a574

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7df6d67d677717649c33ade3ef0ea076

    SHA1

    2ddcfd003b769f83f816dc9f2a5ba8892c3a4d01

    SHA256

    49fec73a593f1ed15e614cce72027bb213e0cf315c8247cc92565231f1f72afe

    SHA512

    0b4b803cd46c1fed5005a9835b7d9a38df168e596f59e88d737ec350bde7c27e3d52b758ba69eafc18485891086a5af91ccd7e39df4d73b33dcb7c8dcc63cb20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dcd188547349ea261c72d0ca75aaf329

    SHA1

    c6e2ce77e2f42e69e3a97b329b7446bf2eb99ebf

    SHA256

    4747a99c9432ef11ba3c9757bc76ace597a79fe6ed424414b1c4abe5bd10fe1b

    SHA512

    0c85a9a65e29a069533f03465b3223f81f4d0bd6ec363b2d8c06a4443be101ebad9b188ce366eb5c68e80f9fb2d1045e2810b54c64d28013df372603814317e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    424a0934b51e1ff552e604a4677379a2

    SHA1

    79eb91883d07e267b7c174bc1882b730ed336424

    SHA256

    c298b810bb884a0678927d3d791a451db3efa2899612531c7a90040710e6ceb0

    SHA512

    488aa4d2a2ba89d7b6862d0f99040b3470538eb000a63fdc3f5541f6a14e4dd7805b0d43a3b111fa908a6a2bae85c8ca306c3a239983d202bd8baa6e22fef15a

  • C:\Users\Admin\AppData\Local\Temp\Cab84DC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar84FE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2480-0-0x0000000013150000-0x0000000013157000-memory.dmp

    Filesize

    28KB

  • memory/2480-1-0x0000000013150000-0x0000000013157000-memory.dmp

    Filesize

    28KB