Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 10:44

General

  • Target

    652efa6717c208e46b8747b9f5fbc785.exe

  • Size

    168KB

  • MD5

    652efa6717c208e46b8747b9f5fbc785

  • SHA1

    c1382fbd9da59821d268cd78522b2c4c24e6cd02

  • SHA256

    d7be188a60395ea778b13718503d7ae5685124e9e9a731c491602e90d4a37dc0

  • SHA512

    b4855a3c07e6a490b8c385d5866dfc8de15de5df4a57e73ba83a1c303f333db40a2c622119bd374f0781a618d6efcdbef548964af79a9dfba0e36a9ebe80a194

  • SSDEEP

    3072:rj8De9llJ6KzuHe6Wv66C7gYjOfXOGGBlfTyKjLh/Ias0xqhh7s4FKC1d0rU0:rj8Clcl5t6C7gYKfOXbHqWxqPZF31iX

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\652efa6717c208e46b8747b9f5fbc785.exe
    "C:\Users\Admin\AppData\Local\Temp\652efa6717c208e46b8747b9f5fbc785.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\652efa6717c208e46b8747b9f5fbc785.exe
      "C:\Users\Admin\AppData\Local\Temp\652efa6717c208e46b8747b9f5fbc785.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2644
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52bb0c12c4a1e18d3b10ac7251161021

    SHA1

    57d28f2d65296841a7030e89a4761c794e3e7b8b

    SHA256

    f4ee7c7a7e50d20f445c8ab262b860ab25c3b1829cfb1ae3fc62dd0dfde7ad24

    SHA512

    0c4ab2ce0e8f7c21f7b02a85e8411c8f52b71eb96b31cca948fd108e1cf289925ac1e8bd454aac86f1bd439306207fa199a2f55cc1c84ce7063fb0a7e2886389

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    670fc3134cb16c8f7881b81e522fa581

    SHA1

    8a84073f53aff249210ffca36e07a03b7e53c323

    SHA256

    d70c72cfea7111b00174b1b10dfc7bb1a36dfcfeb5e8f894681205bf82a07cc9

    SHA512

    26a8c6119be6c5add1172e8e573112cf9ac92bb15db5a5aff42e4a47e173a94f335a2ca5e88595abf2617f828dc9d96301ccad2f8475c5da5a3cba7b9b9b31f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    637933aea21072a6bbe1dd5c604ba2a5

    SHA1

    58bd7d87102887fbad8858e1cd3193e8ef7924d0

    SHA256

    88f88b8fc7b7976dcb6b26564e9d432c7884d03cdb93ec4f8de1dd54a7606a15

    SHA512

    683f95890b92223ad58a42065fc773b1774aff1d1584b576744081dafa04c2ac29ac2f37782c64ae9a7d375a1e302f8351f62807a7a869c485fa2419b94fba46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fed1832f7eb61a0b9f061c340a1b302f

    SHA1

    30c96046a9a434dd3348e578d35dce7585a60b52

    SHA256

    e497a9615a2ce05a5f1ad27232e2b61eda3a1b40caa0947d4a0be40f6e880f43

    SHA512

    0d69641b2f97853dc67ef9d7299670a970431814617bbc5e441d556a0e427c070a93d19cab8215687f6b1aa3b51aa75fc7273816570fab22889ac94226fde681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    20e5fa6becd3b824f78c1c63418ba4bf

    SHA1

    d962731a5ed1e096b3d517fba3c02f23ac240729

    SHA256

    1d67884c327cfbcd480cff0bc1fa357758ffee62406413cde6f5b40c04d7bfa9

    SHA512

    2b6200f213e83278bc2cbfc8ffe271b27dbfa5977f845cf79c5a8ca63425ab6acc5340e28728d0a74d5d38e58f6ae92d1e5008e07da53407b256934258e36f0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26384323d4479b8aa61471639542e0c9

    SHA1

    20491bf829bbf55a2963f2937442e6744f1f61d4

    SHA256

    8066d8b918e058a321bc2c6fac81c22b737e011fb08de46df00a6f65eb5c2977

    SHA512

    6fb967c120fa0eba3d884a47d06c94177abeb3fce28808085e15eac6d14dce87dcc095248eeef11a3ab9bdb53a593b4653a652a77e2d31d6c0048ebf505dcb6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7ca433b4a8a1f68c845349a883a0a7a

    SHA1

    0f216710b97c94f5ce9f11bf5ec7edcd04a99a1d

    SHA256

    3a9554fe1ccced17daf2f932fc58f8e2561dfd6606f1d707d1d59d35d1035573

    SHA512

    1dba59004f6a0306104ad04d369a09942c3c1ecf8c7a57c01198de2d26b239d7c3808b0d7a0df9e8c4b7da0688f757f841d3bf7702ddc854731edd92f7c6be1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c3afe0716c7a8685d8ae619f5b74f3c

    SHA1

    fd7aa9c1218a8dabee06098ac6f8bd0cdbf78581

    SHA256

    1a8394e13491282b9e95ee79ae25fee3b63fa432503e0bad9dee0a3ab2758e5f

    SHA512

    32a66f21297809f57c9a43bec12e51b1a4f2488c738216cf3f6998bc386a8c8bc881b49c70a9e1724c9928ca3c8812adc3351249e8e4d394d58cbed1e5665c3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50424ae803bb8c43d10cfe6c69857bf1

    SHA1

    838c51d7b72130e1dce3601444460bf9627ba783

    SHA256

    c9991ab4c9798c421fa0143c2e7dd378f6307d75ded07a72c02aea441dcbf5b0

    SHA512

    1854e4b0d8632a306925a28e59d0627ff4b1ffc821d39b38e6b37f2e2b971b5166c99a205700dc714067cdc80d4aeee0d342e247b14ad99c5d276bcdbb74af4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d9aaf750d2cefea8390b0bdcd5c8ba0

    SHA1

    f42448447624807cf9d92256ed176eaf683589bd

    SHA256

    511c8a268a792ddbffa8dd4fdc702c0e7ebef646f7bed41c97c529ece510077b

    SHA512

    9256421c0526d584e005e2a32c0603d3232c3c1d0eb0e5caaf0ad5cdc99602008279ce0da63372905ab8f733171efad3c540b3d7239b46479498ccb85cb4bd23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0fb00ebe191a8d58b12f3312128a92c6

    SHA1

    57680e4c8db5cf652674ec9893b2247e3f2e2d8a

    SHA256

    0ea3a6de2af5f6a4f215dcdaa1463567eb550b2bb9aa2feaaed5287e933d919c

    SHA512

    94d6e87c5cd096c41bcc457a9baa469a7e5e0c1862f51ee0f90122d85ab84889413bebb116aa74db299e1147b0b9df2f8ef83e5183f022a5eef1f1d8fc306474

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c09f0b7c4d1fb8fe84f63ba671a1d2c

    SHA1

    a6ade3cb05731319fee053ac41f2c9377f720104

    SHA256

    2f18d6d9b7eed937ef630c65593c3a8927a852bd3471a0d4810ebc8aa392c5b0

    SHA512

    4c004b2ce6d5981f0b2dc3a900ccf5f93f5b43c37db62e59419b8819b62926f5f4ff7ef342d59539a98aedc49aea084e9d4c8e068556e2f742cb52aa1be627f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66ec88f5f248fcf88380b7d7b3a0bfb0

    SHA1

    dacd9081b9b4a6f091bbfd2e6e506f4e3811b2d0

    SHA256

    e9c89371b92b7c1a1ba595a6d460a527f95eda1a085395fa6abf98b66f722b72

    SHA512

    5a075bd954c20daf246180c775e02b5d88a108b65a41eb64a39c56e7f0ad0d1866759bfdf0e8ad53388a66e66a16455eebbf33743793e1ee88fc666d9eebfb87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4cd86bdbad1aa51e8d01a612386e909

    SHA1

    3b4f2faf7eebc9ab7d6efacb64382409e661a4ba

    SHA256

    d01779adb77a88bd95394a1a2618f90e8e058f6a90aac433cd26a8985b809e7f

    SHA512

    49016e43be28b15d81fb4143e95d0cf52df5bb640c36539e36bb68bc2f869ece6e6070197bf926821cdc01e9823d2d200dc7994b5ff22e51769d1ff6cc18cebc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8271d887e9ec252356963ca7fe08cdd1

    SHA1

    adc0a04e8dd9c6edab1b837e1eaae0da00e23696

    SHA256

    6f7453eb82ef92864e6f0ace5d916c8e761b6453d93e92fe89cc3d9adeea55e8

    SHA512

    fadcb90c98673c81a0faf99f7be8ade433cd7f1c11d6e43cc75f068803d09611ab2a571705c6da682b5a5e74c7b7977083b162c4a2e5b9418d52fb31dc936e69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    12de5b176308328290b887acdfb0eaa4

    SHA1

    5b8c59658e291e9436d346eee19512c1883dd684

    SHA256

    1f4015d9896f28baa84bd501dc9e25d4c65c8d60a8df28ab4b050ca2dbaae946

    SHA512

    5c7e4ccb6a9255cb1c6b69ab514ad17d875310ab647465709c6ceb5ed8b6de0e735532e813e652f82029bd7c795a8435a265c77636be0f05cd413e17a0f150f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52264abb0721e708c4e69603744d95d7

    SHA1

    8824ce289e038be2a30ef30faa28324c76d83c25

    SHA256

    8ac8740a74bf1f2974254b467be5e534f8233e14738926bf612fd13f5319b53c

    SHA512

    8db21bcfded51193cb445dc3a137e4ee235ef8814778f658237e3ae2cc8d3c9f69f0b5d6a051178fbf8fd9408fcd532ab4a372716c78da4091b9b59580bc5995

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51b6be219e71bdfe05f2306ddc2d5ea9

    SHA1

    d021a6d803687fb35dce5681e2fcdb9d8c88f97d

    SHA256

    39756c9a3006cb8332dfcf7b1e1b5673b3a0ed3270e960ed16d65170cb0352f2

    SHA512

    58374a47fdf6a0320ade9870ada1cce6618b7985cba88ef85dd40f961bfbd92003ca69091125dcc3b5566af2f5e0c1b43fc7136eba561fe2414e010bbbbb02f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17fcb809f4de4765ab190efba016c838

    SHA1

    d43dfd880d437bd176b5def9471000c0172f032c

    SHA256

    fdadc5ca57ac387c4660b9a4b8762d4afb647f2cc80f49fd5a2fdb820241fd6d

    SHA512

    c23ab99512646bb57e3b6e7f881b975f61f4a4492da3e8f42d640086dac8986132fbcca2502109b8c6ca501073142afdba5812cf0d3e71d7a0f2e7ab807c1c76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ab590d8112d65e52459ee45a8436549

    SHA1

    ca554690d1f0c3be2f022cc5869d71cda1eef46c

    SHA256

    6b5ee4b8b45f6ece604c8d9bb9e7bcbc54ba0c95a3ed90b5e9b6e84a4ee6e545

    SHA512

    89602c25236f1ee2e1fa810db87896868bfdf23fe259c243b72b3089a57d3ca7dfd931c64922e408dec8d686e5e8c6f3cfcc68be38979f283ccfbeb6e7ef4989

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a53d107f74e7f86a7d3f27c38fa40981

    SHA1

    382512e2cf7875aeb8645e3badb650272ecb1fbd

    SHA256

    edcc3c307cc05a26767e36d446fe9f656123bfa0f4bcbec96f7c3ca2197d61f3

    SHA512

    3802e5ec87538d3fb2ebbcdaecb7f9ed794b29e18097535e78c506715eed72c95a10da03c623e1722e2b0d748838e724533d50d26ab2037b826d44b18a81773e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23ab6589d439fd5a36bcb8b3790ed837

    SHA1

    7a6b0e39c874223ea4cdd72e6c952531540016d3

    SHA256

    3fd50540b9e030254f6e06021f4bba66085552683b9ccd583a4e7f69984401a6

    SHA512

    8abb2c59452a43fb395b117309ba927d78a8a87c03a50746222db5df43ddc0c5544b1982e7683942e1371aca4e15ba93a1d142af0edaece855b21dde498dc7bb

  • C:\Users\Admin\AppData\Local\Temp\Cab99D0.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9ABF.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1204-0-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/1204-1-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2600-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-21-0x0000000000290000-0x00000000002DE000-memory.dmp

    Filesize

    312KB

  • memory/2600-17-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/2600-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-22-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2600-10-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-6-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-4-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2600-24-0x0000000000290000-0x00000000002DE000-memory.dmp

    Filesize

    312KB