Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2024, 05:59

General

  • Target

    5c500766bcc9cb57c19ba86862fe6e4a.exe

  • Size

    75KB

  • MD5

    5c500766bcc9cb57c19ba86862fe6e4a

  • SHA1

    4604daa0cee7d3a2ad4342efa427f3a32e8e8389

  • SHA256

    0475e65915199e7d4dbcf022dd171a27a2fe9a8432429e3d93bc41e36b01a3ad

  • SHA512

    f6fa2318bb3278d459f80f11374fcc996833a0d36fd8bef062de99727efab3eee7eca64b1f5f204fcc6faab20ff8a41157e80bd3aa124ee6dee3b03e1098ba12

  • SSDEEP

    1536:D6fAF7aYocj2IwW3ER/c+66adTSPA0bzZfL1kClQJZUTcJ4QKI3GuEMk:JaYocj1wJ/C6aBSI0hplQJZUTuKYGvf

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c500766bcc9cb57c19ba86862fe6e4a.exe
    "C:\Users\Admin\AppData\Local\Temp\5c500766bcc9cb57c19ba86862fe6e4a.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2620
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\$$30689.bat
      2⤵
      • Deletes itself
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    012c2b3eb8a51979e90535dc83612702

    SHA1

    7236f5fe26bff5b494fb67af03355562a25006f0

    SHA256

    02b860e1c008d08e1a6febfd8d2aeaf8d3720ebde10e02fc100ded5f8aa4a873

    SHA512

    786aaed2da99558910b7e71f676077c8e0c15a2c3a529119bcf425c7956d7d76dc4c3d24e2ac7f83e9571f883079ac7d0926ba15a16358e02ac8ff4cbd468a46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fec137642df1a8ffb36ce581273e4f6c

    SHA1

    ccb8f7b5747f24bd911f52f8bb07900d9f128caf

    SHA256

    b03c33156ff6344bcb4e8aebc5937dfcef4e9c279e76dbd7230ee9c7d12ac6d5

    SHA512

    a528409dd5a6ec0e2702b679e58b84c30fbe44c2c8e650b4aca23345d594f54e630eebf1fe39c5afd71584030828c4744b310eb501cb40323cbb6f4b62469d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e4318e0fce173c5afe6d16388f815e6

    SHA1

    875dc27dd76aba9a4fb76ce20182ea91d0a0e7fb

    SHA256

    53f71cfb2d78d5134bd73f49f9ce90b1aa97bfb06a8b33f0e8b658cdfb06e872

    SHA512

    f01f3932e9e7e5152e1149c6481044f06605c31c17a3abb578954386b9253ea1060db5a68b2be4447d0fab4105cc037cb84aed57e03437a2355fb7ed7bd21495

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9da0e15e732671208a25a4f589e9dc3

    SHA1

    a7af27d1fd5e15b47eeeffd094469c538bd23812

    SHA256

    754814962395036f3239b96f6df8d135f5a93692b52137ebc9e3231f477ac812

    SHA512

    36ca1510621d8d17907572525e16eb00be2fceb4e8a44b8cd38aef64f471464eb80633e96269685da3c0885624c316b9ed08d985ebc270b30c49d794c4f28fd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6dafa99b7ce85c0976f34dac86ea6834

    SHA1

    76183b2839ebb9c1ee738f37d3e001581ffca509

    SHA256

    dda328f3f1b145b5bb984b4b487d2f0c910ad0b804dc646781f0f0edf7a65215

    SHA512

    11e5d4f1ec1f36c3120c8ad711857863f0e3978d119be2a0d974ed5c11ebf2c68ab99f5e64dabf4390e895435bba6a2a9abf39951d4e756eb7d6c3c4a5b895a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f455349cd2998b8497a5761feeca4eb6

    SHA1

    5e64966ee7985309105dd4d7ec5d239b7ab1d3e0

    SHA256

    3b77002aa5dab94e76fed127404196e833a0c883d0eff929bebe3805afc07be8

    SHA512

    57a5eac7bea70beec2d2f8afcb603be5112bd263ca927d452f18a8b00d46c094efc1cdf5054c8c67aab35a2227084fbb860c03b9b987608da89b24d41a4023e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8acffcc9e8596091366309435c76f70

    SHA1

    adaed4e422d189d5fb2b0366804bb06dc4f13c3c

    SHA256

    591718f5136737587b0f78d913962bfd4a2341563d975f12b03013546922dfcf

    SHA512

    0e2aba78e5e227d6ef8375e85202d3c7669b9ff4ae8673ae801e75381b4bf0610af29f1ffc01aea36e8b7bb8e22707635d025a31bb72c00966095ca1e5f200dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61f9dfcd5f1028ca83b96a3733469f69

    SHA1

    2bcb06f89c33786ab4f97921c9bbe86d1a1ed6a0

    SHA256

    efc57f516bf2711e54fa38bedc13fa237986fbdfeedf42a7d93be6dd789b4de6

    SHA512

    be66326589c1eafb9611fa376f60a9d60251166f9477cdd37521d1a995833ec8d0e7196cc4e3c65dedf8244e067232685b2c6407f7646f3bc49080bce0ad7d1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    30e74a58715fdb9e9a25293484775947

    SHA1

    205c62e44db34634ebb3f448bcc7f8cf0585e325

    SHA256

    51ad9ac7d62c394419ea14957ee353bf6cfc05867af73a7827b6b825f6a7a1ce

    SHA512

    8b43d6edd6ad1e83d11e09b69d90d555f5ca265ced942878d1585700f1406826038304b89b49bf680563659b0f396b9976c619c7906d28dff7f1786a13cb37e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da9b194ad60eca32284fa8019396597c

    SHA1

    0d772362951edad1a7f44c2ad599ab3bccace75f

    SHA256

    e56bc6d91e3d2510f9a0df51ea4b932a9f35a087e6518f253cd59cfeec2e6846

    SHA512

    9e9257cee256df2337916c022411b0eef998208fb9b7d4e0a308b412c13db4ea4d245ba35e6510f5cc5152f80b496345cc4f08a64d562e46f99030dd5dc7b005

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eaf284b826ef21c23bc7b9d1a7b36c8b

    SHA1

    d397349386e8d6370ce5e79017f6fe75e59e9ac2

    SHA256

    9b45caf8610e41352aa578b46fb34b001c109c1bf3be445ae02f376fe6694f86

    SHA512

    8dea373291a88ebc4b5a40589f11ad2f64d7a1cc236b3764feca86106ad8455c0be0b6e4255f97dd12feb36048ac7b902220404202b76a511ba841bb09b2153f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb32cbe5f982ab829503ab91d452ec2a

    SHA1

    03eb356355842992193d8f293b5affc8ace08105

    SHA256

    7a711b473bd1b14e499a1ada6a7e9fb11bb686b47e893716bfb50ba61bb68209

    SHA512

    d825c804ca7d5a25876675f739d0afacead28b1631ff2e3816bfbc60bab6773232af11a54c7b0c5464981a5db8ba113ade66786012ec9511d3cdeef191e6cd87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7fc2cf055b34ad4dc1066d63d906ae60

    SHA1

    9eaf24a27e32e4915ac0cea61696973830e97b09

    SHA256

    f4d3153271ab3cd6e3d219f24ffb224a85b3bff8dcedacc8ef5a0552051673c1

    SHA512

    073cffe551ab7850475c9207f6710855923e37a7f69d7b3cb802efd636bf4d279e50533e0dbce1fc3e0ab1ec4f1ba5a83bf7410f1f76cd6c7d1a98cc5775fec5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e991f37d7b066aac31db34f9c61b2738

    SHA1

    00e8a72a8f1f8512153644e32fb137c1fb1469da

    SHA256

    5b8c40d568f0ceeeb8e22b62eb2859296d581791cfe148faf588eb78bd14986a

    SHA512

    5898a12d90c71e1dcdb494e7fe164c2aa267da43128cd7b1e74639655ba447cf6dfc6a0369da0d93c0afe27bdf5bfd403c92ed0db7bdc6bd56525eaa5b183551

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa51f218c7f9b2957dd44da69154d577

    SHA1

    06bc27af463ff4a9df9854013e36dde94fceaa76

    SHA256

    5da2279841aebf23e0b008dc5b6bb9ead459bc362f9dff3f63462d85663ddf0e

    SHA512

    cbed42cb596fe315cc3efede9bc2d834e4148322fc1ed3a93ac92cdc2a9f8c8f1382d291ce184b411737c28d28388c11bfaa582612d09523ac3a181c5bc2e07e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91164a500f5f9a73f867576c513f61b4

    SHA1

    faf7c37a45f332778194727dfc3f07a93e07442e

    SHA256

    d5b3007b1a374909908177ac346a8f5ef5170c0882022d50e40c43a0c7472c97

    SHA512

    367bbdcd23086aee9db9b54ccefd88d9295690dff5b6a3df6242b4089009f8f78390baf0d5d739d15fb52d18c2a710cec3044d8bf3cc2f503cffde593139fe0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09545adbab64d526420d78ff81d16368

    SHA1

    62669e73fcc2da222dea7647851b688013ef3f5f

    SHA256

    0c0768d9b2bd850d40e0f421817d430136ad9ff374f9b19a893ae18b6a45881b

    SHA512

    c3ca605da96a2a7d09f7adc764e7ec52f63f5bc5b24d54b515ed34616d2467f595c4d06450c2ab67aef7b1f6d37c5106573cf56fdb40c8257215584eab711970

  • C:\Users\Admin\AppData\Local\Temp\$$30689.bat

    Filesize

    181B

    MD5

    d7c115f91a35f22899012846521eda4f

    SHA1

    d443831f99ac8c72378af335a99e50b559e163da

    SHA256

    14eb1c4efaf9c0a6ce663ad4b9b177499ca26c11069ab476fc835cbbdfa5cd9f

    SHA512

    4fb3c6a3b64e77dae991a367be97bbf81dc374d2680a9c0f48942394dcb8da5daf131805653779c609b15a03d0509fa9c0c9bc2e8f38d3fc8375b1a48958a29a

  • C:\Users\Admin\AppData\Local\Temp\Cab981E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar989F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2528-9-0x0000000013140000-0x000000001316C000-memory.dmp

    Filesize

    176KB

  • memory/2528-0-0x0000000013140000-0x000000001316C000-memory.dmp

    Filesize

    176KB

  • memory/2528-1-0x0000000013140000-0x000000001316C000-memory.dmp

    Filesize

    176KB